
Security Basics mailing list archives
RE: learning ethical hacking
From: GuidoZ <uberguidoz () gmail com>
Date: Thu, 16 Sep 2004 15:23:20 -0400
I wanted to clear up some possible confusion on the eBooks I have and will be sharing. I recently received some words of caution (thanks Jonathan) reminding me that this is a public forum and to be careful of piracy. I am very careful to make sure I don't break any copyright laws! I remind others who would like to share to do the same. Just as I said in my last email, I am going to check over the eBooks that I do have to see which ones are freely distributable. Some of them I wrote myself, others were downloaded from free eBook sites, even others were free from a promotional thing. It is ok to distribute some eBooks, even if they have a copyright. (Similar to the GNU Public License in a way.) For example, I have a "Web Application Security" eBook from IBM that they had freely downloadable on their website early this year. Even though it mostly covered their own WebSphere application, it included a handful of useful security practices and guidelines that would help anyone interested in security. If an eBook seems questionable, simply contact the author and ask them if you are able to distribute it for free. (Many eBooks CANNOT be sold to others, but are allowed to be freely distributed.) I haven't checked through the ones I do have yet (haven't found the CD), though I know some I paid for and likely can't distribute. I want to be sure to not get anyone into trouble, including myself. I do appreciate the heads up, sincerely. I'm posting these comments to the list to alert others that we DO need to be careful and to be sure to follow all applicable laws. P.S. On a side note, the list moderator is on top of things! They have already emailed me saying posting a BitTorrent or a HTTP link to the list (for the eBooks) would be welcomed. I didn't even have to hunt them down. =) Kudos to them for being prompt and alert. Will start hunting through my office later today (just moved across country - things are in a bit of chaos) and also have time tomorrow, if necessary. Hopefully I'll have a link available by the weekend. If I do go through BitTorrent (BT), I'll be sure to post some FYI about how to use BT in case someone is new to it. -- Peace. ~G --------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ----------------------------------------------------------------------------
Current thread:
- Re: learning ethical hacking, (continued)
- Re: learning ethical hacking Marcos E. Rodriguez (Sep 16)
- Re: learning ethical hacking Jonathan Loh (Sep 17)
- Re: learning ethical hacking SecurityList (Sep 17)
- Re: learning ethical hacking Wayne M Burke (Sep 17)
- Re: learning ethical hacking Chris Griffin (Sep 24)
- Re: learning ethical hacking Mike (Sep 24)
- RE: learning ethical hacking Louie (Sep 15)
- RE: learning ethical hacking xyberpix (Sep 15)
- Re: learning ethical hacking GuidoZ (Sep 20)
- RE: learning ethical hacking Louie (Sep 28)
- RE: learning ethical hacking Balwant Rathore (Sep 29)
- RE: learning ethical hacking Philip Wagenaar (Sep 29)