issue149:critique_litteraire
Différences
Ci-dessous, les différences entre deux révisions de la page.
Prochaine révision | Révision précédente | ||
issue149:critique_litteraire [2019/10/01 09:00] – créée d52fr | issue149:critique_litteraire [2019/10/16 14:09] (Version actuelle) – auntiee | ||
---|---|---|---|
Ligne 1: | Ligne 1: | ||
+ | ** | ||
Website: https:// | Website: https:// | ||
Author: Occupy the web | Author: Occupy the web | ||
Price: $34.95 | Price: $34.95 | ||
- | At first I did not want to read this book at all. Two reasons: I judged the book by its cover (hey, who has not?), and it was being reviewed by so many other people online, another review would be pointless. Let’s touch on reason one. The cover is supposed to depict a “hacker” who is an angry teenager (clothing) who is a penguin, suggesting Linux is bad. This ties into the F.U.D. that had been created around Linux. When I recently suggested a customer switch to Linux – as they do nothing Windows-specific, | + | At first I did not want to read this book at all. Two reasons: I judged the book by its cover (hey, who has not?), and it was being reviewed by so many other people online, another review would be pointless. Let’s touch on reason one. The cover is supposed to depict a “hacker” who is an angry teenager (clothing) who is a penguin, suggesting Linux is bad. This ties into the F.U.D. that had been created around Linux. When I recently suggested a customer switch to Linux – as they do nothing Windows-specific, |
- | But with so many people actually reviewing it, could I still ignore it? See: https:// | + | |
+ | Site Web : https:// | ||
+ | Auteur : Occupy the web | ||
+ | Prix : 34,95 $ | ||
+ | |||
+ | Au départ, je ne voulais pas du tout lire ce livre. Deux raisons : je jugeais ce livre à sa couverture (Eh ! Qui ne l'a pas fait ?) et il avait déjà reçu tant de critiques en ligne par d' | ||
+ | |||
+ | **But with so many people actually reviewing it, could I still ignore it? See: https:// | ||
Instead of these top down reviews, I will give you a chapter by chapter review, to better understand the book. | Instead of these top down reviews, I will give you a chapter by chapter review, to better understand the book. | ||
- | First, something about Kali Linux. Kali Linux is one of the few security distributions not from Italy. It originates in Switzerland and is considered the de-facto standard for teaching penetration testers. | + | First, something about Kali Linux. Kali Linux is one of the few security distributions not from Italy. It originates in Switzerland and is considered the de-facto standard for teaching penetration testers. |
- | I am not going to harp on about ethical hacking, information is neither good nor evil, instead we jump right into the introduction. “What’s in this book” lays out each chapter for your perusal. If you feel you have mastered the basics, this lets you jump ahead with a clearer understanding of what you are letting yourself in for, than, say, an index. If you are a regular Full Circle reader, you can skip the rest of the chapter and go to one. A good breakdown of Kali Linux is given and examples are clear, with the last instruction being : “ go play now!” The second chapter felt a bit light and short, but you have to remember that this book is aimed at people who need to get up to speed with Linux quickly. The third chapter touches on Linux networking and “disguising yourself” - but the latter is not the case. No Proxy chaining, or DNS query encryption, etc, (though proxy chains are touched upon in later chapters). Chapter four is about apt in a nutshell. If you know how to install and update software, you can give this one a skip. For the regular Full Circle reader, the exercises may feel dumb, but again, you are not the target audience. If you are not afraid of your command-line, | + | Mais, puisque tellement de gens en avaient fait la critique, pouvais-je encore l' |
- | Chapter five, with file and folder permissions, can thus also be skimmed. Chapter six is processes, and I dare say that it sometimes does not seem so ‘white hat’. “A hacker often will need to find processes on the target they want to kill, such as the antivirus software or a firewall.” - judge for yourself. Chapter seven takes us to the environment variables, nothing you did not know, and no interesting snippets, nor code examples, nor exercises. Chapter eight is where the real hands-on approach starts, with bash scripting, but do not expect much. The constant references to ‘hackersarise’ website is the author’s home page. Throughout, the book is very basic, but also illustrates that Linux is not difficult at all. Chapter nine is compression, | + | Au lieu de ces critiques du général au particulier, je vais en faire la critique chapitre après chapitre, pour une meilleure compréhension du livre. |
- | Again we move out of “ethical hacking” territory as was pushed in the beginning of the book to more “black hat” way of writing: “ Once you’ve compromised a Linux system, it’s useful to disable logging and remove any evidence of your intrusion in the log files to reduce the chances of detection.” Chapter 12 takes us into services, but does not touch systemctl? This book provides just enough information to actually be a danger to yourself if you would use it as a ‘hacking manual’. Chapter 13, becoming secure and anonymous, also has the basics, but does not touch the engineering part, or explain that most ‘hackers’ are caught hacking from home. Encrypted email is covered, but not anonymous email. Chapter 14 is Wi-Fi networks, which covers some of the basics and some of the tools, albeit very shallow coverage. Chapter 15 is kernel modules and it is at this stage that I wonder if the intent of the book is for you to break stuff, so you can learn by fixing them. This is a very rewarding, but also very frustrating way to learn. Here is a very brief touch on sysctl as the chapter would be broken without it. Only five exercises here, as it is not ‘hacking’ related really. Chapter 16 is Cron jobs, more or less. | + | D' |
- | When we get to chapter 17, it is touted as “python scripting basics” - which is really, really basic, then jumps into ‘building a TCP client’, which maybe can be said to be the practical part of the book. | + | **I am not going to harp on about ethical hacking, information is neither good nor evil, instead we jump right into the introduction. “What’s in this book” lays out each chapter for your perusal. If you feel you have mastered the basics, this lets you jump ahead with a clearer understanding of what you are letting yourself in for, than, say, an index. If you are a regular Full Circle reader, you can skip the rest of the chapter and go to one. A good breakdown of Kali Linux is given and examples are clear, with the last instruction being : “ go play now!” The second chapter felt a bit light and short, but you have to remember that this book is aimed at people who need to get up to speed with Linux quickly. The third chapter touches on Linux networking and “disguising yourself” - but the latter is not the case. No Proxy chaining, or DNS query encryption, etc, (though proxy chains are touched upon in later chapters). Chapter four is about apt in a nutshell. If you know how to install and update software, you can give this one a skip. For the regular Full Circle reader, the exercises may feel dumb, but again, you are not the target audience. If you are not afraid of your command-line, |
+ | |||
+ | Je ne veux pas revenir sur le piratage éthique ; les informations ne sont ni bonnes ni mauvaises. À la place, nous passerons directement à l' | ||
+ | |||
+ | **Chapter five, with file and folder permissions, | ||
+ | |||
+ | Le chapitre 5, sur les permissions des fichiers et dossiers, peut, lui aussi, être effleuré. Le chapitre six est sur les traitements, | ||
+ | |||
+ | **Again we move out of “ethical hacking” territory as was pushed in the beginning of the book to more “black hat” way of writing: “ Once you’ve compromised a Linux system, it’s useful to disable logging and remove any evidence of your intrusion in the log files to reduce the chances of detection.” Chapter 12 takes us into services, but does not touch systemctl? This book provides just enough information to actually be a danger to yourself if you would use it as a ‘hacking manual’. Chapter 13, becoming secure and anonymous, also has the basics, but does not touch the engineering part, or explain that most ‘hackers’ are caught hacking from home. Encrypted email is covered, but not anonymous email. Chapter 14 is Wi-Fi networks, which covers some of the basics and some of the tools, albeit very shallow coverage. Chapter 15 is kernel modules and it is at this stage that I wonder if the intent of the book is for you to break stuff, so you can learn by fixing them. This is a very rewarding, but also very frustrating way to learn. Here is a very brief touch on sysctl as the chapter would be broken without it. Only five exercises here, as it is not ‘hacking’ related really. Chapter 16 is Cron jobs, more or less. ** | ||
+ | |||
+ | À nouveau, nous sortons de domaine du « piratage éthique » comme annoncé au début du livre ; en fait, la façon d' | ||
+ | |||
+ | **When we get to chapter 17, it is touted as “python scripting basics” - which is really, really basic, then jumps into ‘building a TCP client’, which maybe can be said to be the practical part of the book. | ||
This book pretends to be a primer on Linux for ethical hackers, but does not stand in one camp, either be a manual on basic Kali Linux usage, or basic hacking, or concepts, but it is neither. This book is a waste of time for anyone who has encountered the command-line, | This book pretends to be a primer on Linux for ethical hackers, but does not stand in one camp, either be a manual on basic Kali Linux usage, or basic hacking, or concepts, but it is neither. This book is a waste of time for anyone who has encountered the command-line, | ||
- | I got through the book in one sitting, so it is very lightweight, | + | I got through the book in one sitting, so it is very lightweight, |
+ | |||
+ | Quand nous atteignons le chapitre 17, il est décrit comme « les bases des scripts en Python », ce qui est vraiment, vraiment basique, puis il passe à « construire un client TCP », dont on peut sans doute dire que c'est la partie pratique du livre. | ||
+ | |||
+ | Ce livre prétend être une introduction à Linux pour hackers éthiques, mais il ne choisit pas son camp, et est un manuel, ni sur l' | ||
+ | |||
+ | J'ai lu tout le livre d'une traite ; il est donc très léger. Cela dit, le prix est très lourd. En toute honnêteté, | ||
issue149/critique_litteraire.1569913240.txt.gz · Dernière modification : 2019/10/01 09:00 de d52fr