Book Excerpt: Ghost Wars
There are scores of books written about the CIA (and its
dubious activities), the Soviet invasion of Afghanistan, the rise of Islamist
terrorism, the birth and growth of Al-Qaeda, and 11 September 2001 attacks in
the United States. Of several such books that I have read, Ghost Wars, by Steve Coll, is, by far, easily the best work.
Coll takes us into the dark world of false friends, true
enemies, and permanent national interests, all of which signify the mad, bad, chaotic
world of international politics and diplomacy.
Ghost Wars won the 2005 Pulitzer Prize for General Non-Fiction.
In the pages featured in the below space, you can read the story behind the story of the Kargil episode and how former Pakistani military
chief and dictator, Pervez Musharraf, blinded by his extreme hatred of India, manipulated
the military and political machinery to harm India and wrest Kashmir.
Title: Ghost Wars
Author: Steve Coll
Publisher: Penguin
Pages featured here: 479-484
Note: All copyrights/trademarks belong to the owners of the publication/author(s). It is not my intention to profit from their work. In fact, I just wish that the readers of this blog are encouraged to buy/read the works represented here.
Required Technical Skills to be a Hacker
Computer Networking
Operating System Skills
Programming & Scripting Languages
There is a saying that, “Programming is not necessarily required to become a hacker/infosec professional”. Let's break it and try to understand this saying, it is true that most of the successful penetration testers don’t write code but it does not mean that they can't write or they don't understand the coding. So understanding is the KEY, you should understand the tool you are using for your test and don't forget the importance of manual penetration testing and code review.
Conclusion
Must Read
ESXtopNGC
ESXtopNGC is a VMware fling that adds ESXiTop functionality to the vSphere web client.
Mail Protection Reports for Office 365
Mail Protection Reports for Office 365 is an add-on for Excel to obtain more detailed information on email traffic within Office 365.
http://www.microsoft.com/en-us/download/details.aspx?id=30716
SELKS
SELKS is a specialist Debian-based distribution that ships with a variety of pre-configured network security management tools.
Bitnami
Bitnami is a library of popular server applications and development environments that can be installed with one click, either in your laptop, in a virtual machine or hosted in the cloud. We take care of compiling and configuring the applications and all of their dependencies (third-party libraries, language runtimes, databases) so they work out-of-the-box.