How Hackers Hack
저자: istm gwu
1. Got root?
1.1. little known commands to search docs in system's hard drive
1.2. Can route traffic to another website
2. Demon Dialer
3. Security software can't stop
4. Denial of Service
4.1. Zombies (controlled by Hacker)
5. Scanner
5.1. Pings