#2793
Good, convenient things will always be popular, get more attention from users, and followed by exposing more problems. The wireless network is one of such new things, which began to catch on around the world due to its application on mobile platform.

#2787
First of all, about the author of this book "Johnny Long", he has begun to research using Google to test the potential safety hazards of websites and computers as early as in 1995. What he does has developed and formed today's Google Hacking Techniques - the Google Hacking Database (GHDB) set up by him has been hosted by Exploits-DB now.

#2744
Today, wireless network has got very extensive application because of its convenient use and structure, and will eventually cover every corner on the earth, I believe. But due to its broadcast form of data transmission in a wireless network environment, that will inevitably lead to security issues. Of course we can ensure data security by setting different encryption methods in a wireless router, but some loopholes of Wi-Fi network or the router itself can often make every trained hacker be able to crack/hack it.

#2612
With the development of mobile devices and network, intelligent mobile phone has become a new paradise for hackers. Imagine, under this environment of everybody holds a smart phone nowadays, nothing is more active than the mobile phone viruses and the vulnerabilities' exploits of software and mobile network. Therefore, to understand and master some practical security tools seems necessary and meaningful.

#2311
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers is another bestseller written by Kevin Mitnick, which will lead you to deeply dig into the true story in real life behind hacking cases.

#2214
About Kali Linux, if you previously used or knew about BackTrack Linux series, then I will simply say, Kali is the upgrading product of BackTrack. From Kali, BackTrack will become history.