Neil Gaiman
Read
Its all about books: from classics, to hard to get including banned books and audio books
Abstract
Wireless LAN discovery through the use of applications such as NetStumbler, DStumbler,
Wellenreiter and others is an increasingly popular technique for network penetration. The discovery of a wireless LAN might be used for seemingly innocuous Internet access, or to be used as a “backdoor” into a network to stage an attack. This paper reviews some of the tactics used in wireless LAN network discovery and attempts to identify some of the fingerprints left by wireless LAN discovery applications, focusing on the MAC and LLC layers. This fingerprint information can then be incorporated into intrusion detection tools capable of analyzing data-link layer traffic.
Mastery of Self for Wealth Power Success – Frank Channing Haddock
A tactical manual for the revolutionary. First published by the Central Intelligence Agency and distributed to the Contras in Central America.
PAY NO FINE – A User Guide to Successfully Fighting Traffic Tickets
Welcome to PAYNOFINE’S User Guide to Successfully Fighting Traffic Tickets. Since you are reading this, it can be presumed that you are one of the approximately 35 million people who received a traffic ticket this year. That actually breaks down to about 100,000 tickets a day! Our hope is that you will be one of the small and silent minority who successfully fight the system each year.
9/11 SYNTHETIC TERRORISM MADE IN USA – Webster Griffin Tarpley
TABLE OF CONTENTS
INTRODUCTION
CHAPTER I – THE MYTH OF THE TWENTY-FIRST CENTURY
CHAPTER II – THE THEORY AND PRACTICE OF SYNTHETIC TERRORISM
CHAPTER III – THE ROOTS OF 9/11: THE GLOBALIZED CRISIS OF THE 1990s
CHAPTER IV: AL QAEDA: THE CIA’S ARAB LEGION
CHAPTER V: COULD THE ALLEGED HIJACKERS FLY THE PLANES?
CHAPTER VI: THE COLLAPSE OF WORLD TRADE CENTER 1, 2, AND 7
CHAPTER VII: WHAT HIT THE PENTAGON?
CHAPTER VIII: SHANKSVILLE
CHAPTER IX: “ANGEL IS NEXT” – THE INVISIBLE GOVERNMENT SPEAKS
CHAPTER X: ANTHRAX
CHAPTER XI: INSIDER TRADING; CELL PHONES; MI-6 AND MOSSAD
CHAPTER XII: CONSPIRACY THEORY: THE GREAT AMERICAN TRADITION
CHAPTER XIII: THE 9/11 MYTH: COLLECTIVE SCHIZOPHRENIA
CHAPTER XIV: NETWORKS OF INTEREST
CHAPTER XV: ISLAMIC FUNDAMENTALISM: FOSTERED BY US FOREIGN POLICY
CHAPTER XVI: ELECTION 2004 IN THE SHADOW OF SYNTHETIC TERRORISM
AND WAR
AFTERWORD: 2004: NOT AN ELECTION, BUT A CIA COVERT OPERATION
BIBLIOGRAPHY