ebook img

HOW TO BECOME THE WORLD'S NO .1 HACKER PDF

342 Pages·2010·20.84 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview HOW TO BECOME THE WORLD'S NO .1 HACKER

“Computer hacking will never die H O – just multiply!” W Every day, we hear and see in the news about con- stant cyber attacks, where hackers have stolen iden- T tities, taken millions of dollars, or even shut down websites and companies in their entirety. The rea- O son why hacking will never die is because we hire IT-Managers, who are not hackers, to protect our B networks. Statistics show that every 6 seconds a E personal computer is hacked into. Many consumers rely on the concept that the applications that came C installed on their brand new computers, are kryp- O tonite and impenetrable by hackers. They believe M and trust that the “Geek Squad”, Norton and other anti-hacker applications can protect them. However, E this is entirely false!!! T We have all heard the adage, “In order to catch a thief, it takes a thief”, well, “in order to catch a hacker it takes a hacker.” Gregory Evans, world renowned se- H curity expert, will show you step by step what tools hackers use to get into your E network. Evans will then take those same tools and show you step by step how to hack into your own network. W O THIS GUIDE COVERS R L (cid:2) Installing Spyware (cid:2) Cracking Wireless Network D (cid:2) Hacking into a computer (cid:2) Hacking Web serves ’ S (cid:2) Tapping VOIP telephones (cid:2) Password Cracking N (cid:2) Hacking Voicemail (cid:2) Social Engineering O . (cid:2) Cell Phone Spyware (cid:2) Denial of Service 1 SHORT & SIMPLE (cid:2) Reseting Windows Passwords (cid:2) How to make money as a H Certified Ethical Hacker A (cid:2) SQL Injection AND MUCH, MUCH MORE! C (cid:2) Email Spoofing K E R $24.95 A Publication by GG DD.. EE RREEGGOORRYY VVAANNSS CyberCrime Media Writing & Publishing, Editing & Design Norcross, Georgia Copyright ©2010 Gregory D. Evans All rights reserved. No part of this book may be used or reproduced in any manner whatsoeverwithout written permission except in the case of brief quotations embodied in critical articles and reviews. CyberCrime Media Writing & Publishing, Editing & Design 6050 Peachtree Parkway, Suite 200, Norcross, Ga 30092 www.gregorydevans.com ISBN 978-0-9826091-0-1 Printing in the United States of America First Printing, March 2010 Gregory D. Evans “...Evans goal today is to help individuals and companies protect themselves against computer theft and security breaches.” – Jason McKay – BlackEnterprise.com “Innovator,” “leader,” “visionary”—just a few of the terms that describe Gregory D. Evans, and the extraordinary range of talents and expertise that distinguish this multi-faceted author and cyber-security expert. Gregory Evans is a man driven by two passions: technology and community, and he has made it his mission to use the former to serve the latter. It was this mission that led him to found LIGATT Security (LIGATTSECURITY.com) in 2004. Mr. Evans is a man of many sides, and wears many hats. The following is a brief look at some of the roles he plays in the course of his exceptional career. Worlds No. 1 Hacker Mr. Evans is not like most of the textbook hackers who received their CEH or CISSP and think that they are truly experience enough to consult on computer security. While in the 7th grade Mr. Evans performs his first hack on the schools computers, enabling him to change grades for all the students going unnoticed for 2 years. It was not until he hacked AT&T for the first time while in the 9th grade and his parents paid back $30,000. With the publicity he received Mr. Evans became a “Hacker For Hire” for some of the largest corpo- rations in the world. In 1996 Mr. Evans was hired to hack the largest telecommu- nications company in the world such as AT&T (again), MCI, Sprint and Worldcom. Making over $1 million a week, It was not until 1997 that it all came to a end when someone tipped off the FBI and brought it to a end. One of Mr. Evans conditions was to pay back $10 million in restitution. This was not to boast of Mr. Evans exploits over the years, but to prove the level of experience he provides. Entrepreneur Providing helpful services to the public has always been at the forefront of Mr. Evans’ mind. His abiding interest in the benefits of technology also enabled him to recognize the ways in which it could be misused by dishonest people—an Gregory D. Evans insight that also placed him at the forefront of the movement to establish effective means of cyber- security. Prior to founding LIGATT, Mr. Evans formed and operated The Cyber Group Network Corporation, a publicly traded computer security company specializing in stolen computer recovery. While at the helm of Cyber Group, Mr. Evans became the first African-American to write a com- puter encryption program: Password Protection Information Retrieval Technology (PPIRT), which was sold in all major computer retail stores across the United States. PPIRT was the first security software of its kind. With its 2,048-bit encryption program and com- puter recovery technology, it had the ability to track stolen computers over both the Internet and landline telephones. Since founding LIGATT, Mr. Evans has guided the company to spectacular growth. It currently has over 65 computer security experts on staff, and has conducted more security penetration tests— designed to evaluate the effectiveness of businesses’ information systems defenses against intrusion by hackers than any company in the nation. Its client list includes the FBI and other government agen- cies, banks, and even such entertainment luminaries as Jim Carrey and Chris “Ludacris” Bridges. Educator As a successful businessman, Gregory Evans has learned many secrets of success, and he shares those secrets with others as a renowned business educator. Mr. Evans has spoken and taught courses on many critical high-tech crime subjects, including Computer Crime Investigation, Identity Theft and Password Cracking and Recovery, to students and fellow professionals at dozens of community colleges, universities and government facilities, including Concordia College, Santa Monica City College, Irvine Valley College, Cal State Los Angeles and San Marcos, Pepperdine University, Anaheim City College, Rancho Santiago College, ITT in Duluth, Georgia., and Los Angeles City College. Media Personality Gregory Evans’ leadership in high-tech security has even extended to his presence in the media. Since the beginning of his career, he has been a consistent presence in broadcasting and print, informing millions of listeners, viewers and readers of ways to protect their valuable computer information against intrusion and theft. In 2000, he produced and co-hosted Cyber Crime Radio, one of the first radio talk shows addressing high-tech crimes, on KIEV in Los Angeles, the nation’s second-largest radio market. Mr. Evans also had a daily show, “The Cyber Security Minute,” on KNX 1070, on which he advised listeners on defending themselves against high-tech crime. Aside from his own radio shows, Mr. Evans has also been a guest on other high-profile radio out- lets, including the very popular syndicated Tom Joyner and Michael Baisden shows, discussing Identity Theft. In addition to radio, Mr. Evans frequently appears as an authority on high-tech crime prevention on television and in print. On The History Channel’s series, “Modern Marvels,” he demonstrated the invigorating capabilities of computer surveillance and the potential for destruction at the hands of cyber-terrorists, showed how spyware works, and taught viewers how to protect their wireless networks. In addition, he served as a consultant on NBC’s highly rated Dateline series, “To Catch a Predator.” In the first 30 days of 2009, Mr. Evans appeared twice on Fox network’s “Fox & Friends,” as well as CBS news, and the world-famous Frank Ski morning radio show on Atlanta’s v103. He was also named one of Black Enterprise magazine’s Top 20 “Masters of Innovation,” and has been fea- tured in numerous newspapers and magazines, including the LA Times, USA Today, Wells Fargo Business Journal, and JET magazine. Author Gregory Evans has written eight books on high-tech security issues. His first, dedicated to laptop security, was entitled, “Laptop Security Short & Simple.” He also authored the first book ever ded- icated to spyware, “The Spyware Reference & Study Guide.” Mr. Evans’ other titles include, “Memoirs of a Hi-Tech Hustler,” “The Hi-Tech Hustler Scrap Book,” “Hi-Tech Identity Theft Short and Simple,” “125 Ways to Protect Your Computer Short and Simple,” “How to become of the World’s No. 1 Hacker,” and “The Layman’s Guide to Fighting Hi-Tech Crime.” He has also written articles for Upscale and Essence magazines. High-Tech Innovator Gregory Evans not only writes about, but also contributes to, the state and future of high-tech security. He invented eSnitch(Electronic Snitching Device), the first wireless tracking device for com- puters, which makes it possible to track the position of a stolen computer anywhere in the world. Mr. Evans also developed and introduced one of the more sensational products of recent years with SPOOFEM.COM, a product that enables a caller to post any number in the recipient’s caller ID. Since it launched in January 2007, SPOOFEM has attracted over 100,000 registered users, gaining so much popularity that Viacomnetwork, BET, is slated to kick off a huge promotion cam- paign in the near future. Community Benefactor As a successful African-American entrepreneur, Gregory Evans realizes he has overcome the obsta- cles that block many others from similar accomplishments. He believes in giving back to the commu- nity that has given so much to him, and is very much aware of his power to serve as a positive role model for young people who might otherwise gravitate toward unproductive or unlawful lifestyles. Gregory Evans’ passion for technology was the key that opened the doors to his success. He wants to pass that key to young people looking for their way in life, and help open their eyes to possibilities other than the popular but often unrealistic desires to become famous entertainers or athletes—sparking a flame of interest in technology in inner city youth, so that more computer geniuses can be developed. One outstanding example of how Mr. Evans “walks the walk” in his efforts to serve his communi- ty is the computer giveaway program he created, in which he presents brand new laptop computers to four noteworthy students from inner-city churches and schools. In partnership with renowned bishop Noel Jones, he completed this program in Sept. 2007 at the City of Refuge Church in Gardena, California, one of the nation’s largest churches. In 2008, the City of Compton (Calif.) Planning and Economic Development Department honored Mr. Evans for his contribution of computers to the city’s Youth Day Celebration, as part of his ongoing efforts to increase technology awareness and knowledge in low-income communities Trailblazer Even after all his books, media appearances, and inventions, Gregory Evans still considers him- self as being at the beginning of his task, standing on the brink of the vast, still largely unexplored frontier of technological security. There is still much work to be done, and much to be discovered; and that is the way Gregory Evans likes it. Like those before him who set out in search of new and better solutions, Gregory Evans is a trailblazer, continuing his quest to excel and reach higher heights. Gregory Evans’ Media & Recognition Portfolio PUBLICATIONS (cid:2)Turning Point Magazine (cid:2)Upscale Magazine (cid:2)Sun Newspaper (cid:2)LA Times (cid:2)USA Today (cid:2)Black Enterprise (cid:2)Wells Fargo Business Journal (cid:2)CEO Watch (cid:2)ET Magazine (cid:2)Security Watch (cid:2)Essences (cid:2)…and over 100 more TELEVISION (cid:2)Dateline NBC (cid:2)BET (cid:2)CNN (cid:2)NBC (cid:2)History Channel Modern Marvels (cid:2)Fox and Friends (cid:2)Fox LA 11 (cid:2)…and over 10 others RADIO (cid:2)KABC Radio (Los Angeles) (cid:2)Tom Joyner (National) (cid:2)Michael Baisden (National) (cid:2)KFWB (Los Angeles) (cid:2)WBLS Williams (New York) (cid:2)KNX Radio (Los Angeles) BOOKS (cid:2)Laptop Security Short & Simple (cid:2)Memoirs of a Hi-Tech Hustler (cid:2)Hi-Tech Hustler Scrap Book (cid:2)Hi-Tech Identity Theft Short and Simple (cid:2)125 Ways to Protect Your Computer Short and Simple (cid:2)Spyware Reference & Study Guide (cid:2)Layman Guide To Fighting Hi-Tech Crime (cid:2)How To Become The World’s No. 1 Hacker AFFILIATIONS & AWARDS (cid:2)The Computer Security Institute (cid:2)The Association of Certified Fraud Examiners (cid:2)The American Society for Industrial Security (cid:2)The California Association of Licensed Private Investigators (cid:2)The Publishers Marketing Association (cid:2)NAACP Humanitarian Award Winner

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.