Wednesday, October 8, 2008

Visual Studio Hacks: Tips & Tools for Turbocharging the IDE


Visual Studio Hacks: Tips & Tools for Turbocharging the IDE (Hacks)
By James Avery


With start-up templates for projects ranging from Windows applications to web services, and extensive help and on-line documentation, Visual Studio .NET might be mistaken for a tool for unsophisticated users. It's true that most developers soon discover that the basic operation of Visual Studio is fairly self-explanatory; less obvious are some of the suite's more advanced built-in features. Visual Studio .Net includes a wealth of little-used capabilities, is very customizable, has a complete automation model, and much more. On top of its regular feature set, there are hosts of free add-ins, macros, and power toys that can further enhance the functionality of Visual Studio. This book is all about exploring these things, and in doing so, becoming a better and more efficient developer. Developers will learn how to:

  • Get the most out of projects and solutions, including getting down and dirty with the undocumented format of project and solution files
  • Use these editor features to the fullest, and add additional functionality to the editor through the use of third-party add-ins
  • Learn smarter ways to navigate the application and your own source code
  • Customize shortcut keys, toolbars, menus, the toolbox, and much more
  • Use the debugger successfully not only on your source code, but with T-SQL and scripting languages as well
  • Automatically generate code
  • Learn how the server can be used to interface with databases, services, and performance counters, as well as WMI
  • Use and create Visual Studio add-ins to extend its functionality
Offering valuable tips, tools, and tricks, Visual Studio Hacks takes you far beyond the suite's usual capabilities. You can read this book from cover to cover or, because each hack stands its own, you can feel free to browse and jump to the different sections that interest you most. If there's a prerequisite you need to know about, a cross-reference will guide you to the right hack. If you want to experience the full spectrum of Visual Studio's functionality and flexibility, you'll find the perfect guide for exploration in Visual Studio Hacks. Once the final page is turned, you can confidently say that you've been exposed to everything that Visual Studio .NET is capable of doing.

The PHP Anthology: 101 Essential Tips, Tricks & Hacks (Anthology

The PHP Anthology: 101 Essential Tips, Tricks & Hacks (Anthology)
By Ben Balbo, Harry Fuecks, Davey Shafik, Ligaya Turmelle, Matthew O'Phinney

The PHP Anthology: 101 Essential Tips, Tricks & Hacks, 2nd Edition is a collection of powerful PHP 5 solutions to the most common programming problems.

Featuring best-practice code and a commonsense approach to development, this book includes coverage of:

  • Manage errors gracefully.
  • Build functional forms, tables, and SEO-friendly URLs.
  • Reduce load time with client- and server-side caching.
  • Produce and utilize web services with XML.
  • Secure your site using access control systems.
  • Easily work with files, emails, and images.
  • And much more

    The question and answer format will allow you to to quickly find and reference any of the 101 solutions, saving you hours of Internet research or painful trial & error. All solutions are fully explained and the ready-to-use code is available for download.

  • PHP Hacks: Tips & Tools For Creating Dynamic Websites (Hacks)


    PHP Hacks: Tips & Tools For Creating Dynamic Websites (Hacks)
    By Jack Herrington

    Programmers love its flexibility and speed; designers love its accessibility and convenience. When it comes to creating web sites, the PHP scripting language is truly a red-hot property. In fact, PHP is currently used on more than 19 million web sites, surpassing Microsoft's ASP .NET technology in popularity. Not surprisingly, this surge in usage has resulted in a number of PHP books hitting the market. Only one, though, takes the language beyond traditional Web programming and into mapping, graphing, multimedia, and beyond: "PHP Hacks,"

    In "PHP Hacks," author Jack Herrington wrings out his 20 years of code generation experience to deliver hands-on tools ranging from basic PHP and PEAR installation and scripting to advanced multimedia and database optimizing tricks.

    On the practical side of things, "PHP Hacks" helps you develop more robust PHP applications by explaining how to improve your database design, automate application testing, and employ design patterns in your PHP scripts and classes. In the category of "cool," Herrington explains how to upgrade your Web interface through the creation of tabs, stickies, popups, and calendars. He even examines how to leverage maps and graphics in PHP. There's also a bounty of image and application hacks, including those that show you how to:

    Integrate web sites with Google maps and satellite imaging

    Dynamically display iPhoto libraries online

    Add IRC, SMS, and Instant Messaging capabilities to your Web applications

    Drop the latest Wikipedia dictionary onto your Sony PSP

    Render graphics and user interfaces with SVG, DHTML, and Ajax

    Whether you're a newcomer or an expert, you'll find great value in "PHPHacks," the only PHP guide that offers something useful and fun for everyone.

    VoIP Hacks: Tips & Tools for Internet Telephony (Hacks)


    VoIP Hacks: Tips & Tools for Internet Telephony (Hacks)
    By Ted Wallingford

    Voice over Internet Protocol (VoIP) is gaining a lot of attention these days, as more companies and individuals switch from standard telephone service to phone service via the Internet. The reason is simple: A single network to carry voice and data is easier to scale, maintain, and administer. As an added bonus, it's also cheaper, because VoIP is free of the endless government regulations and tariffs imposed upon phone companies.

    VoIP is simply overflowing with hack potential, and VoIP Hacks is the practical guide from O'Reilly that presents these possibilities to you. It provides dozens of hands-on projects for building a VoIP network, showing you how to tweak and customize a multitude of exciting things to get the job done. Along the way, you'll also learn which standards and practices work best for your particular environment. Among the quick and clever solutions showcased in the book are those for:

    • gauging VoIP readiness on an enterprise network
    • using SIP, H.323, and other signaling specifications
    • providing low-layer security in a VoIP environment
    • employing IP hardphones, analog telephone adapters, and softPBX servers
    • dealing with and avoiding the most common VoIP deployment mistakes

    In reality, VoIP Hacks contains only a small subset of VoIP knowledge-enough to serve as an introduction to the world of VoIP and teach you how to use it to save money, be more productive, or just impress your friends. If you love to tinker and optimize, this is the one technology, and the one book, you must investigate.

    Hacker's Challenge 3 (Hacking Exposed)

    Hacker's Challenge 3 (Hacking Exposed)
    By David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi

    The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in Security

    Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you’ll get a detailed analysis of how the experts solved each incident.

    Certified Ethical Hacker Exam Prep (Exam Prep 2 (Que Publishing))

    Certified Ethical Hacker Exam Prep (Exam Prep 2 (Que Publishing))
    By Michael Gregg


    The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you the solid, in-depth coverage you'll need to score higher on the exam.

    Along with the most current CEH content, the book also contains the elements that make Exam Preps such strong study aides: comprehensive coverage of exam topics, end-of-chapter review, practice questions, Exam Alerts, Fast Facts, plus an entire practice exam to test your understanding of the material. The book also features MeasureUp's innovative testing software, to help you drill and practice your way to higher scores.

    Tuesday, September 16, 2008

    Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition

    Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition (Hacking Exposed)
    By Joel Scambray

    The latest Windows security attack and defense strategies


    "Securing Windows begins with reading this book." --James Costello (CISSP) IT Security Specialist, Honeywell

    Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and learn how the latest countermeasures in Windows XP, Vista, and Server 2003/2008 can mitigate these attacks. Get practical advice based on the authors' and contributors' many years as security professionals hired to break into the world's largest IT infrastructures. Dramatically improve the security of Microsoft technology deployments of all sizes when you learn to:
    • Establish business relevance and context for security by highlighting real-world risks
    • Take a tour of the Windows security architecture from the hacker's perspective, exposing old and new vulnerabilities that can easily be avoided
    • Understand how hackers use reconnaissance techniques such as footprinting, scanning, banner grabbing, DNS queries, and Google searches to locate vulnerable Windows systems
    • Learn how information is extracted anonymously from Windows using simple NetBIOS, SMB, MSRPC, SNMP, and Active Directory enumeration techniques
    • Prevent the latest remote network exploits such as password grinding via WMI and Terminal Server, passive Kerberos logon sniffing, rogue server/man-in-the-middle attacks, and cracking vulnerable services
    • See up close how professional hackers reverse engineer and develop new Windows exploits
    • Identify and eliminate rootkits, malware, and stealth software
      Fortify SQL Server against external and insider attacks
    • Harden your clients and users against the latest e-mail phishing, spyware, adware, and Internet Explorer threats
    • Deploy and configure the latest Windows security countermeasures, including BitLocker, Integrity Levels, User Account Control, the updated Windows Firewall, Group Policy, Vista Service Refactoring/Hardening, SafeSEH, GS, DEP, Patchguard, and Address Space Layout Randomization

    Monday, September 15, 2008

    Hacking Exposed, Sixth Edition (Hacking Exposed)


    Hacking Exposed, Sixth Edition (Hacking Exposed)
    By Stuart McClure, Joel Scambray, George Kurtz

    The tenth anniversary edition of the world's bestselling computer security book!
    The original Hacking Exposed authors rejoin forces on this new edition to offer completely up-to-date coverage of today's most devastating hacks and how to prevent them. Using their proven methodology, the authors reveal how to locate and patch system vulnerabilities. The book includes new coverage of ISO images, wireless and RFID attacks, Web 2.0 vulnerabilities, anonymous hacking tools, Ubuntu, Windows Server 2008, mobile devices, and more.

    Hacking Exposed 6 applies the authors' internationally renowned computer security methodologies, technical rigor, and "from-the-trenches" experience to make computer technology usage and deployments safer and more secure for businesses and consumers.

    "A cross between a spy novel and a tech manual." --Mark A. Kellner, Washington Times

    "The seminal book on white-hat hacking and countermeasures . . . Should be required reading for anyone with a server or a network to secure." --Bill Machrone, PC Magazine

    "A must-read for anyone in security . . . One of the best security books available." --Tony Bradley, CISSP, About.com

    Hacking Exposed Linux (Hacking Exposed)

    Hacking Exposed Linux (Hacking Exposed)
    By ISECOM

    The Latest Linux Security Solutions

    This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.
    • Secure Linux by using attacks and countermeasures from the latest OSSTMM research
    • Follow attack techniques of PSTN, ISDN, and PSDN over Linux
    • Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux
    • Block Linux signal jamming, cloning, and eavesdropping attacks
    • Apply Trusted Computing and cryptography tools for your best defense
    • Fix vulnerabilities in DNS, SMTP, and Web 2.0 services
    • Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits
    • Find and repair errors in C code with static analysis and Hoare Logic

    The Oracle Hacker's Handbook: Hacking and Defending Oracle (Paperback)

    The Oracle Hacker's Handbook: Hacking and Defending Oracle (Paperback)
    By David Litchfield

    David Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. This in-depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle and then it shows you how to find the weak spots and defend them. Without that knowledge, you have little chance of keeping your databases truly secure.

    Hacker's Delight (Hardcover)

    Hacker's Delight
    By Henry S. Warren

    Veteran programmer Hank Warren shares the tricks he has collected from his considerable experience in the worlds of application and system programming. For anyone who wants to create efficient code. Self-directed study.

    Sunday, September 14, 2008

    The Best of 2600: A Hacker Odyssey


    The Best of 2600: A Hacker Odyssey
    By Emmanuel Goldstein

    Since 1984, the quarterly magazine 2600 has provided fascinating articles for readers who are curious about technology. Find the best of the magazine’s writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker’s perspective. Included are stories about the creation of the infamous tone dialer “red box” that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks.

    Hacking Exposed Wireless

    By Johnny Cache, Vincent Liu


    Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures.

    • Understand the concepts behind RF electronics, Wi-Fi/802.11, and Bluetooth
    • Find out how hackers use NetStumbler, WiSPY, Kismet, KisMAC, and AiroPeek to target vulnerable wireless networks
    • Defend against WEP key brute-force, aircrack, and traffic injection hacks
    • Crack WEP at new speeds using Field Programmable Gate Arrays or your spare PS3 CPU cycles
    • Prevent rogue AP and certificate authentication attacks
    • Perform packet injection from Linux
    • Launch DoS attacks using device driver-independent tools
    • Exploit wireless device drivers using the Metasploit 3.0 Framework
    • Identify and avoid malicious hotspots
    • Deploy WPA/802.11i authentication and encryption using PEAP, FreeRADIUS, and WPA pre-shared keys

    Saturday, September 13, 2008

    Gray Hat Hacking, Second Edition


    By Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness

    "A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce Potter, Founder, The Shmoo Group

    "Very highly recommended whether you are a seasoned professional or just starting out in the security business." --Simple Nomad, Hacker

    Stealing the Network: How to Own an Identity


    By Timothy Mullen, Ryan Russell, Riley Eller, Jay Beale, FX FX, Chris Hurley, Tom Parker, Brian Hatch, Johnny Long

    You Are Who the Computer Says You Are
    The first two books in this series, Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent, have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques and strategies. But what happens when the tables turn, and the criminal hackers become the targets of both law enforcement and each other? What happens when they must evade detection by creating new identities and applying their skills to get out fast and vanish into thin air. In Stealing the Network: How to Own an Identity, the hacker crew you've grown to both love and hate find themselves on the run, fleeing from both authority and adversary. They must now use their prowess in a way they never expected--to survive...

    From the Diary of Robert Knoll, Senior My name, my real name, is Robert Knoll, Senior. No middle name. Most of those who matter right now think of me as Knuth. But I am the man of a thousand faces, the god of infinite forms.

    Identity is a precious commodity. In centuries past, those who fancied themselves sorcerers believed that if you knew a being's true name, you could control that being. Near where I live now, there are shamans who impose similar beliefs on their people. The secret is that if you grant such a man, an agency, this power over yourself through your beliefs or actions, then it is true.

    Only recently has this become true in the modern world. The people of the world have granted control of their existence to computers, networks, and databases. You own property if a computer says you do. You can buy a house if a computer says you may. You have money in the bank if a computer says so. Your blood type is what the computer says it is. You are who the computer says you are.

    Wireless Network Hacks & Mods For Dummies

    By Danny Briere, Pat Hurley

    • Fun projects and valuable content join forces to enable readers to turn their wireless home network into a high-performance wireless infrastructure capable of entertainment networking and even home automation
    • Step-by-step instructions help readers find, buy, and install the latest and greatest wireless equipment
    • The authors are home tech gurus and offer detailed discussion on the next-generation wireless gear that will move the wireless LAN beyond computers and into telephony, entertainment, home automation/control, and even automotive networking
    • The number of wireless LAN users in North America is expected to grow from 4.2 million current users to more than 31 million by 2007

    Reversing: Secrets of Reverse Engineering

    By Eldad Eilam

    Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the variousapplications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language

    Hacking: The Art of Exploitation, 2nd Edition

    By Jon Erickson
    Published on: 2008-02-04

    Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

    Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.

    The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:
    • Program computers using C, assembly language, and shell scripts
      Corrupt system memory to run arbitrary code using buffer overflows and format strings
    • Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening
    • Outsmart common security measures like nonexecutable stacks and intrusion detection systems
    • Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence
    • Redirect network traffic, conceal open ports, and hijack TCP connections
    • Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix

    Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.

    Thursday, September 11, 2008

    Network Security Hacks: Tips & Tools for Protecting Your Privacy

    By Andrew Lockhart
    In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well.

    This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending and incident response.

    In fact, this "roll up your sleeves and get busy" security book features updated tips, tricks & techniques across the board to ensure that it provides the most current information for all of the major server software packages. These hacks are quick, clever, and devilishly effective.

    Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network

    By Rob Flickenger, Roger Weeks

    The popularity of wireless networking has grown exponentially over the past few years, despite a general downward trend in the telecommunications industry. More and more computers and users worldwide communicate via radio waves every day, cutting the tethers of the cabled network both at home and at work.

    Wireless technology changes not only the way we talk to our devices, but also what we ask them to do. With greater flexibility, broader range, and increased mobility, wireless networks let us live, work, and think differently. Wireless networks also open up a vast range of tasty new hack possibilities, from fine-tuning network frequencies to hot-rodding handhelds.

    The second edition of "Wireless Hacks," co-authored by Rob Flickenger and Roger Weeks, brings readers more of the practical tips and tricks that made the first edition a runaway hit, selling nearly 30,000 copies. Completely revised and updated, this version includes over 30 brand new hacks, major overhauls of over 30 more, and timely adjustments and touchups to dozens of other hacks introduced in the first edition. From passive network scanning to aligning long-distance antennas, beefing up wireless network security, and beyond, "Wireless Hacks" answers real-life networking needs with direct solutions.

    Flickenger and Weeks both have extensive experience in systems and network administration, and share a passion for making wireless more broadly available. The authors include detailed coverage for important new changes in specifications and in hardware and software, and they delve deep into cellular and Bluetooth technologies.
    Whether you need your wireless network to extend to the edge of yourdesk, fit into your backpack, or cross county lines, the proven techniques in "Wireless Hacks" will show you how to get the coverage and functionality you're looking for.
    function registerNamespace(ns)

    Wednesday, September 10, 2008

    Firefox Hacks: Tips & Tools for Next-Generation Web Browsing


    By Nigel McFarlane

    Firefox Hacks is ideal for power users who want to take full advantage of Firefox from Mozilla, the next-generation web browser that is rapidly subverting Internet Explorer's once-dominant audience. It's also the first book that specifically dedicates itself to this technology. Firefox is winning such widespread approval for a number of reasons, including the fact that it lets users browse faster and more efficiently. Perhaps its most appealing strength, though, is its increased security something that is covered in great detail in Firefox Hacks. Clearly the web browser of the future, Firefox includes most of the features that browser users are familiar with, along with several new features, such as a bookmarks toolbar and tabbed pages that allow users to quickly switch among several web sites. Firefox Hacks offers all the valuable tips and tools you need to maximize the effectiveness of this hot web application. It's all covered, including how to customize its deployment, appearance, features, and functionality. You'll even learn how to install, use, and alter extensions and plug-ins. Aimed at clever people who may or may not be capable of basic programming tasks, this convenient resource describes 100 techniques for 100 strategies that effectively exploit Firefox. Or, put another way, readers of every stripe will find all the user-friendly tips, tools, and tricks they need to make a productive switch to Firefox. With Firefox Hacks, a superior and safer browsing experience is truly only pages away. The latest in O'Reilly's celebrated Hacks series, Firefox Hacks smartly complements other web-application titles such as Google Hacks and PayPal Hacks.

    Hacking Firefox: More Than 150 Hacks, Mods, and Customizations

    By Mel Reyes

    They dreamed of a better browser . . . and before you could say "explore no more," Firefox was born. But already you want more. Tighter security, greater functionality. A custom installation for Linux. Maybe even that unique extension you've always dreamed of creating. Well, if you want to tweak the Fox, here are over 400 pages of ways to do it. From hacking profile settings to cracking links and cleaning out the cookie jar, this is the stuff that puts you in control.Step-by-step instructions for these hacks and dozens more
    • Settings, content, and extension hacks
    • Hacking the interface and themes
    • Performance boosters
    • Anti-phishing and security hacks
    • Toolbar and status bar tweaks
    • Navigation, download, and search hacks
    • Hacks for common plugins
    • Extension and theme creation

    Web Site Measurement Hacks: Tips & Tools to Help Optimize Your Online Business (Hacks)


    By Eric Peterson

    In order to establish and then maintain a successful presence on the Web, designing a creative site is only half the battle. What good is an intricate Web infrastructure if you're unable to measure its effectiveness? That's why every business is desperate for feedback on their site's visitors: Who are they? Why do they visit? What information or service is most valuable to them?

    Unfortunately, most common Web analytics software applications are long on functionality and short on documentation. Without clear guidance on how these applications should be integrated into the greater Web strategy, these often expensive investments go underused and underappreciated.

    Enter "Web Site Measurement Hacks," a guidebook that helps you understand your Web site visitors and how they contribute to your business's success. It helps organizations and individual operators alike make the most of their Web investment by providing tools, techniques, and strategies for measuring--and then improving--their site's usability, performance, and design. Among the many topics covered, you'll learn:

    definitions of commonly used terms, such as "key performance indicators" (KPIs)

    how to drive potential customers to action

    how to gather crucial marketing and customer data

    which features are useful and which are superfluous

    advanced techniques that senior Web site analysts use on a daily basis

    By examining how real-world companies use analytics to their success, "Web Site Measurement Hacks" demonstrates how you, too, can accurately measure your Web site's overall effectiveness. Just as importantly, it bridges the gulf between the technical teams charged with maintaining your Web'sinfrastructure and the business teams charged with making management decisions.
    It's the technology companion that every site administrator needs.

    Hacking GMail (ExtremeTech) (Paperback)


    by Ben Hammersley
    • The first book to unlock the true power behind Gmail, Hacking Gmail will immediately appeal to Google and Gmail fans
    • This is serious, down-and-dirty, under-the-hood, code-level hacking that will have readers eliminating the default settings, customizing appearance, disabling advertising, and taking control over their Gmail accounts
    • Covers turning Gmail into an online hard drive for backing up files, using it as a blogging tool, and even creating customized Gmail tools and hacks
    • Shows readers how to check their Gmail without visiting the site; use Gmail APIs in Perl, Python, PHP, and other languages, or create their own; and maximize Gmail as a host for message boards, photo galleries, even a blog

    Amazon Hacks: 100 Industrial-Strength Tips & Tools (Hacks)


    By Paul Bausch
    Amazon Hacks is a collection of tips and tools for getting the most out of Amazon.com, whether you're an avid Amazon shopper, Amazon Associate developing your online storefront and honing your recommendations for better linking and more referral fees, seller listing your own products for sale on Amazon.com, or a programmer building your own application on the foundation provided by the rich Amazon Web Services API. Shoppers will learn how to make the most of Amazon.com's deep functionality and become part of the Amazon community, maintain wishlists, tune recommendations, "share the love" with friends and family, etc. Amazon Associates will find tips for how best to list their titles, how to promote their offerings by fine tuning search criteria and related titles information, and even how to make their store fronts more attractive. And the real power users will use the Amazon API to build Amazon-enabled applications, create store fronts and populate them with items to be picked, packed and shipped by Amazon. And just about anyone can become a seller on Amazon.com, listing items, deciding on pricing, and fulfilling orders for products new and used.

    Mac mini Hacks & Mods For Dummies

    By John Rizzo
    • Starting at $499, the diminutive Mac mini-2.5 inches tall, 6.5 inches wide, and 2.9 pounds-is expected to become Apple's bestselling computer, with projected shipments of 100,000 units a month
    • This book offers several projects-some easy, some more challenging-to help people tweak, modify, and transform a Mac mini
    • Modest modifications include creating a Mac mini home theater, an appliance controller, and a travel kit; other more complex (but very cool!) mods require wielding a soldering iron
    • Offers detailed, illustrated step-by-step instructions-including how to open the Mac mini, keep track of pieces, and avoid damage-that enable even novice tinkerers to complete the projects


    By Rael Dornfest, Kevin Hemenway
    Mac OS X is a marvelous confluence of the user-friendly and highly customizable Macintosh of yesteryear and the power and flexibility of Unix under the hood. Those coming to Mac OS X from previous incarnations of the operating system recognize much of the friendly face of the Macintosh but they are also plunged into a whole new world. Unix converts to Mac OS X find a familiar FreeBSD-like operating system at the core and many of the command-line applications that they're familiar with. This presents a unique opportunity for combining traditional Unix hacking and Mac OS know-how. Mac OS X Hacks goes beyond the peculiar mix of man pages and not-particularly-helpful Help Center, pulling the best tips, tricks, and tools from the Mac power users and Unix hackers themselves. The collection reflects the real-world know how and experience of those well steeped in Unix history and expertise, sharing their no-nonsense, sometimes quick-and-dirty solutions to administering and taking full advantage of everything a Unix desktop has to offer: Web, Mail, and FTP serving, security services, SSH, Perl and shell scripting, compiling, configuring, scheduling, networking, and hacking. Add to that the experience of die-hard Macintosh users, customizing and modifying their hardware and software to meet their needs: System Preferences, GUI mods and tweaks, hardware tips, vital shareware and freeware, AppleScript, AppleTalk and equivalents, keyboard modifiers, and general Macintosh-style tomfoolery. Each Hack can be read easily in a few minutes, saving countless hours of searching for the right answer. Mac OS X Hacks provides direct, hands-on solutions that can be applied to the challenges facing both those meeting the Mac for the first time and long-time users delving into Mac OS X and its Unix underpinnings. Mac OS X Hacks is the third in O'Reilly's new Hacks Serier which aims to begin reclaiming the term "hacking" for the good guys. In recent years, the term has come to be associated with those nefarious black hats who break into computers to snoop, steal information or disrupt Internet traffic. But the term originally had a more benign meaning, and you'll still hear it used this way whenever developers get together. Our new Hacks books are written in the spirit of the true hackers -- the people who drive innovation.

    The Mac Hacker's Handbook

    By Charles Miller, Dino Dai Zovi
    As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard’s security defenses, what attacks aren’t, and how to best handle those weaknesses.

    Tuesday, September 9, 2008

    Hacking Mac OS X Tiger : Serious Hacks, Mods and Customizations


    By Scott Knaster
    This serious, but fun, down-and-dirty book will let you make Tiger purr, ensuring that your Macs appearance, speed, usability, and security settings are what you want. Author Scott Knaster:
    • Shows you how to speed it up, lock it down, or pull back the curtains.
    • Dives into default system settings, unlocks hidden gems, and includes original Mac OS X programs with full source listings and explanations.
    • Shows heavyweight hackers the tricks and modes of OS X booting, tweaks for login screens, and how to customize or even kill the Dock.
    • Offers the inside scoop on Dashboard and Spotlight, including two sample widgets and one Spotlight importer, all with fully annotated source listings.
    • Demonstrates how to install and use Unix and X11 applications, take advantage of command line tools, and create system services and active Dock badges.

    How to Unlock Your iPhone


    By Max Goodwell

    A simple guide to unlocking ANY iPhone to work on any GSM network, such as T-Mobile. Includes detailed instructions for unlocking 4GB, 8GB and 16GB iPhones, including firmware versions 1.1.2, 1.1.3, and 1.1.4.

    Monday, September 8, 2008

    OS X for Hackers at Heart: The Apple of Every Hacker's Eye

    By Bruce Potter, Johnny Long, Ken Caruso, Chris Hurley, Tom Owad

    With sexy hardware, a powerful operating system, and easy-to-use applications, Apple has made OS X the operating system of choice for hackers everywhere. But as great as OS X is out of the box, hackers are eager to push the limits of what it was designed to do (surprise). Tweak and tune both software and hardware to start penetration testing or software development. See how the best and brightest use OS X for cutting-edge research, development, and just plain fooling around.
    • Add Interfaces to the Mac Add interfaces to create a multi-interface firewall or router, simulate a switch, add 802.3ad interface aggregation, or provide another media type.
    • Use the Mac as a Router See how a small low-power device such as a Mac Mini or an iBook expanded with USB-based Ethernet ports can push packets between networks.
    • WarDrive with Your Mac Configure and use the KisMAC WLAN discovery tool to WarDrive.
    • Penetration Test with OS X Discover how all the best tools can be run from the Mac: nmap, Nessus, Ethereal, Snort, and more.
    • Automate Your Mac! Learn how to use Automator, AppleScript, and the bash shell to automate tasks and create slick front ends for command-line favorites!
    • Discover Juicy Mac Hacking Tools Compile Open Source tools directly on OS X using mainstream compilers and interpreters.
    • Hack the iPod Open your iPod, replace the battery, upgrade a 5GB iPod's hard drive, and configure any iPod for Mac or Windows.
    • Use OS X in a Windows Environment Access file shares on a Windows server, mount network file systems via AppleScript, and connect to a Windows PPTP server.
    • PowerBook Mac TricksLearn cool stunts you can do with the Apple motion sensor, the Apple Remote Desktop, Gestures, Sogudi, and more!

    Big Book of Apple Hacks: Tips & Tools for unlocking the power of your Apple devices

    By Chris Seibold
    Bigger in size, longer in length, broader in scope, and even more useful than our original Mac OS X Hacks, the new Big Book of Apple Hacks offers a grab bag of tips, tricks and hacks to get the most out of Mac OS X Leopard, as well as the new line of iPods, iPhone, and Apple TV.
    With 125 entirely new hacks presented in step-by-step fashion, this practical book is for serious Apple computer and gadget users who really want to take control of these systems. Many of the hacks take you under the hood and show you how to tweak system preferences, alter or add keyboard shortcuts, mount drives and devices, and generally do things with your operating system and gadgets that Apple doesn't expect you to do. The Big Book of Apple Hacks gives you:
    • Hacks for both Mac OS X Leopard and Tiger, their related applications, and the hardware they run on or connect to
    • Expanded tutorials and lots of background material, including informative sidebars
      "Quick Hacks" for tweaking system and gadget settings in minutes
    • Full-blown hacks for adjusting Mac OS X applications such as Mail, Safari, iCal, Front Row, or the iLife suite
    • Plenty of hacks and tips for the Mac mini, the MacBook laptops, and new Intel desktops
      Tricks for running Windows on the Mac, under emulation in Parallels or as a standalone OS with Bootcamp

    The Big Book of Apple Hacks is not only perfect for Mac fans and power users, but also for recent -- and aspiring -- "switchers" new to the Apple experience. Hacks are arranged by topic for quick and easy lookup, and each one stands on its own so you can jump around and tweak whatever system or gadget strikes your fancy. Pick up this book and take control of Mac OS X and your favorite Apple gadget today!


    By Preston Gralla

    A smart collection of insider tips and tricks, Windows XP Hacks, Second Edition covers the XP operating system from start to finish. Among the multitude of topics addressed, this must-have resource includes extensive coverage of hot-button issues such as:
    • security
    • web browsing
    • controlling the control panel
    • removing uninstallable XP components

    pop-up adsYou'll also find timesaving hacks for file distribution; digital media, such as iTunes; and high-visibility web software, services, and exploits that have emerged since the book's last edition. Each hack in the book can be read easily in just a few minutes, saving countless hours of searching for the right answer. Now completely revised and updated to cover Service Pack 2 (SP2), the second edition of this bestseller carefully breaks down the new features that come with SP2, including IE pop-up blocker, Windows Firewall, and the new wireless client. Written by Preston Gralla, the compact and affordable Windows XP Hacks, Second Edition provides direct, hands-on solutions that can be applied to the challenges facing XP beginners, as well as the more experienced power user. Each year, Windows XP is pre-installed on 90 million PCs worldwide, making it the world's most popular operating system.

    Big Book of Windows Hacks

    By Preston Gralla
    Bigger, better, and broader in scope, the Big Book of Windows Hacks gives you everything you need to get the most out of your Windows Vista or XP system, including its related applications and the hardware it runs on or connects to. Whether you want to tweak Vista's Aero interface, build customized sidebar gadgets and run them from a USB key, or hack the "unhackable" screensavers, you'll find quick and ingenious ways to bend these recalcitrant operating systems to your will.
    The Big Book of Windows Hacks focuses on Vista, the new bad boy on Microsoft's block, with hacks and workarounds that also work for Windows XP. You can read each hack in just a few minutes, saving countless hours of searching for the right answer. The step-by-step instructions let you apply the solutions in no time. This book takes you beyond the operating system with hacks for applications like Internet Explorer 7 and Office 2007, and hardware such as the Zune, your wireless router, and the PC itself.

    Windows Vista Secrets

    By Brian Livingston, Paul Thurrott

    "If one book can help you master Vista, this is it." --Fred Langa, former editor-in-chief of Byte Magazine

    "These two know more about Windows than Microsoft does." --Chris Pirillo, editor of Lockergnome.com

    Go beyond Microsoft's Help guide and discover the true secrets of Windows Vista that are essential to power users. Written by two of the most recognized Windows authorities, this resource provides you with numerous tips, tricks, and undocumented features that aren't available anywhere else. You'll find extensive screenshots, tables, and illustrations that clearly show how to achieve optimal performance, fix desktop problems, and take advantage of the robust features of Windows Vista.

    Hacking Windows Vista: ExtremeTech

    By Steve Sinchak

    Vista is the most radical revamping of Windows since 1995. However, along with all the fantastic improvements, there are a couple of things that likely drive you up the wall. Don’t worry, though—just join forces with author Steve Sinchak and you’ll end up feeling as though Microsoft designed Vista just for you! He shows you how to tweak logon screen settings, build custom Sidebar gadgets, personalize Aero Glass with themes and visual styles, turn your PC into an HDTV media center, fine-tune your firewall, and more.

    Monday, September 1, 2008

    Hack Attacks Testing: How to Conduct Your Own Security Audit

    Learn how to conduct thorough security examinations via illustrations and virtual simulations
    A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits.
    Step by step, the book covers how-to drilldowns for installing and configuring your Tiger Box operating systems, installations, and configurations for some of the most popular auditing software suites. In addition, it includes both common and custom usages, scanning methods, and reporting routines of each. Finally, Chirillo inspects the individual vulnerability scanner results and compares them in an evaluation matrix against a select group of intentional security holes on a target network.

    Hack Attacks Revealed: A Complete Reference for UNIX, Windows, and Linux with Custom Security Toolkit, Second Edition

    The much-anticipated second edition of the bestselling book that details network security through the hacker's eyeSince the first edition of Hack Attacks Revealed was published, many new attacks have been made on all operating systems, including UNIX, Windows XP, Mac OS, and Linux, and on firewalls, proxies, and gateways. Security expert John Chirillo is ready to tackle these attacks with you again. He has packed the Second Edition of his all-in-one reference with forty percent new material.In this fascinating new edition, you'll discover:* The hacker's perspective on security holes in UNIX, Linux, and Windows networks* Over 170 new vulnerabilities and exploits* Advanced discovery techniques* A crash course in C for compiling hacker tools and vulnerability scanners* The top seventy-five hack attacks for UNIX and Windows* Malicious code coverage of Myparty, Goner, Sircam, BadTrans, Nimda, Code Red I/II, and many more* TigerSuite Professional 3.5 (full suite single license)

    UNIX Hints and Hacks

    UNIX Hints & Hacks is designed to instantly reward you through increased productivity and satisfaction with UNIX. Each and every hint and/or hack provides real value--not just a list of obvious procedures marked as secrets. Learn UNIX administration skills you can apply daily with UNIX workstations and servers. Discover networking tricks to make modifications safely over the network. Tackle security issues such as dealing with SuperUser accounts, permissions, and vulnerabilities in the UNIX operating system. Develop various ways to monitor the system logs and load averages, to aid in the tuning, fixing, and security. Also learn to add, manipulate, and modify user accounts in new ways, and improve your file management skills for modifying, viewing, and executin. With UNIX Hints & Hacks you'll look up from the reading and say, "I can't wait to try that!"

    Linux Server Hacks, Volume Two: Tips & Tools for Connecting, Monitoring, and Troubleshooting (Hacks)

    Today's system administrators deal with a vast number of situations, operating systems, software packages, and problems. Those who are in the know have kept their copy of Linux Server Hacks close at hand to ease their burden. And while this helps, it's not enough: any sys admin knows there are many more hacks, cool tips, and ways of solving problems than can fit in a single volume (one that mere mortals can lift, that is).
    Which is why we created Linux Server Hacks, Volume Two, a second collection of incredibly useful tips and tricks for finding and using dozens of open source tools you can apply to solve your sys admin problems. The power and flexibility of Linux and Open Source means that there is an astounding amount of great software out there waiting to be applied to your sys admin problems -- if only you knew about it and had enough information to get started. Hence, Linux Server Hacks, Volume Two.
    This handy reference offers 100 completely new server management tips and techniques designed to improve your productivity and sharpen your administrative skills. Each hack represents a clever way to accomplish a specific task, saving you countless hours of searching for the right answer. No more sifting through man pages, HOWTO websites, or source code comments -- the only resource you need is right here. And you don't have to be a system administrator with hundreds of boxen to get something useful from this book as many of the hacks apply equally well to a single system or a home network.

    Ubuntu Hacks: Tips & Tools for Exploring, Using, and Tuning Linux (Hacks)

    Ubuntu Linux--the most popular Linux distribution on the planet--preserves the spirit embodied in the ancient African word "ubuntu," which means both "humanity to others" and "I am what I am because of who we all are." Ubuntu won the "Linux Journal" Reader's Choice Award for best Linux distribution and is consistently the top-ranked Linux variant on DistroWatch.com. The reason this distribution is so widely popular is that Ubuntu is designed to be useful, usable, customizable, and always available for free worldwide.
    "Ubuntu Hacks" is your one-stop source for all of the community knowledge you need to get the most out of Ubuntu: a collection of 100 tips and tools to help new and experienced Linux users install, configure, and customize Ubuntu. With this set of hacks, you can get Ubuntu Linux working exactly the way you need it to. Learn how to: Install and test-drive Ubuntu Linux. Keep your system running smoothly Turn Ubuntu into a multimedia powerhouse: rip and burn discs, watch videos, listen to music, and more Take Ubuntu on the road with Wi-Fi wireless networking, Bluetooth, etc. Hook up multiple displays and enable your video card's 3-D acceleration Run Ubuntu with virtualization technology such as Xen and VMware Tighten your system's security Set up an Ubuntu-powered server
    "Ubuntu Hacks" will not only show you how to get everything working just right, you will also have a great time doing it as you explore the powerful features lurking within Ubuntu.

    Linux Multimedia Hacks: Tips & Tools for Taming Images, Audio, and Video (Hacks)

    The fact that Linux has more multimedia application choices than Mac OS X and Windows combined may come as a surprise to many, but not to those who know Linux well. In Linux Multimedia Hacks, author Kyle Rankin showcases the best available multimedia tools so you can maximize the entertainment capabilities of your favorite OS. Included are tips and tricks for connecting to iPods, creating MP3s and Oggs, watching and making DVDs, turning your Linux box into a Tivo ala MythTV, and much more.
    You don't have to be a Linux server guru to make use of this book. Linux Multimedia Hacks takes the best of Linux's multimedia tools and with step-by-step instructions shows even novice users how to do cool and useful things with images, audio, and video. It includes entry level hacks that nearly all Linux users will want, such as installing codecs for audio and video playback and managing thousands of photographs. Later, you'll find hacks that cover a variety of advanced projects, from ripping and organizing media files with metatags, to editing video and audio tracks, to creating your own DVDs. Basic or advanced, each hack stands on its own, so you can feel free to jump around to only the sections that interest you.


    Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)

    Ubuntu, an African word meaning “humanity to others,” is the hottest thing in Linux today. This down-and-dirty book shows you how they can blow away the default system settings and get Ubuntu to behave however you want. You’ll learn how to optimize its appearance, speed, usability, and security and get the low-down on hundreds of hacks such as running Ubuntu from a USB drive, installing it on a Mac, enabling multiple CPUs, and putting scripts in menus and panels.

    The New Hacker's Dictionary - 3rd Edition

    This new edition of the hacker's own phenomenally successful lexicon includes more than 100 new entries and updates or revises 200 more. Historically and etymologically richer than its predecessor, it supplies additional background on existing entries and clarifies the murky origins of several important jargon terms (overturning a few long-standing folk etymologies) while still retaining its high giggle value.

    The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

    This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications.
    The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.
    The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger", Dafydd developed the popular Burp Suite of web application hack tools.

    Yahoo! Hacks: Tips & Tools for Living on the Web Frontier (Hacks)

    Yahoo! took the world by storm in the 1990s as a one-of-a-kind, searchable list of interesting web sites. But ten years later, it has expanded into a department store overflowing with useful and innovative tools and services-from email, blogging, social networking, and instant messaging, to news, financial markets, shopping, movie and TV listings, and much more. Today's Yahoo! keeps you connected with every aspect of your life and every corner of the Web.

    Google Hacking for Penetration Testers, Volume 2

    A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I know because Ive seen it with my own eyes. As the founder of the Google Hacking Database (GHDB) and the Search engine hacking forums at http://johnny.ihackstuff.com, I am constantly amazed at what the Google hacking community comes up with. It turns out the rumors are truecreative Google searches can reveal medical, financial, proprietary and even classified information. Despite government edicts, regulation and protection acts like HIPPA and the constant barking of security watchdogs, this problem still persists. Stuff still makes it out onto the web, and Google hackers snatch it right up. Protect yourself from Google hackers with this new volume of information.

    Google Hacks: Tips & Tools for Finding and Using the World's Information (Hacks)

    Everyone knows that Google lets you search billions of web pages. But few people realize that Google also gives you hundreds of cool ways to organize and play with information.

    Since we released the last edition of this bestselling book, Google has added many new features and services to its expanding universe: Google Earth, Google Talk, Google Maps, Google Blog Search, Video Search, Music Search, Google Base, Google Reader, and Google Desktop among them. We've found ways to get these new services to do even more.

    Google Maps Hacks

    Want to find every pizza place within a 15-mile radius? Where the dog parks are in a new town? The most central meeting place for your class, club or group of friends? The cheapest gas stations on a day-to-day basis? The location of convicted sex offenders in an area to which you may be considering moving? The applications, serendipitous and serious, seem to be infinite, as developers find ever more creative ways to add to and customize the satellite images and underlying API of Google Maps.
    Written by Schuyler Erle and Rich Gibson, authors of the popular Mapping Hacks, Google Maps Hacks shares dozens of tricks for combining the capabilities of Google Maps with your own datasets. Such diverse information as apartment listings, crime reporting or flight routes can be integrated with Google's satellite imagery in creative ways, to yield new and useful applications.
    The authors begin with a complete introduction to the "standard" features of Google Maps. The adventure continues with 60 useful and interesting mapping projects that demonstrate ways developers have added their own features to the maps. After that's given you ideas of your own, you learn to apply the techniques and tools to add your own data to customize and manipulate Google Maps. Even Google seems to be tacitly blessing what might be seen as unauthorized use, but maybe they just know a good thing when they see one.
    With the tricks and techniques you'll learn from Google Maps Hacks, you'll be able to adapt Google's satellite map feature to create interactive maps for personal and commercial applications for businesses ranging from real estate to package delivery to home services, transportation and more. Includes a foreword by Google Maps tech leads, Jens and Lars Rasmussen.

    Hacking GoogleMaps and GoogleEarth

    This one-of-a-kind resource contains 500 pages of jaw-dropping hacks, mods, and customizations. These include creating mashups with data from other sources such as Flickr, building a space station tracker, hacking Maps with Firefox PiggyBank, and building a complete community site with Maps and Earth. Now you can map out locations, get driving directions, zoom into any point on the globe, display real time traffic, and much more.