Hacking a computer

ebook

By 'Herr Meier'

cover image of Hacking a computer

Sign up to save your library

With an OverDrive account, you can save your favorite libraries for at-a-glance information about availability. Find out more about OverDrive accounts.

   Not today

Find this title in Libby, the library reading app by OverDrive.

Download Libby on the App Store Download Libby on Google Play

Search for a digital library with this title

Title found at these libraries:

Library Name Distance
Loading...

Contents:

Routers and mail traffic are central points in networks that are both attack targets and security barriers. Attackers use various methods to hack routers or mail accounts and thus gain access to networks and connected devices. The most common attack vectors include weak or standard passwords, outdated firmware, open ports on routers and insecure functions such as WPS or UPnP.

Mr. Meier lists where and how possible dangers threaten and how they can be averted if necessary.

(Translated from German using AI.)

Hacking a computer