Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking the Cable Modem: What Cable Companies Don't Want You to Know

Buy
In the beginning there was dial-up, and it was slow; then came broadband in the form of cable, which redefined how we access the internet, share information, and communicate with each other online. Hacking the Cable Modem goes inside the device that makes Internet via cable possible and, along the way, reveals secrets of many popular cable modems, including products from Motorola, RCA, WebSTAR, D-Link and more.

Inside Hacking The Cable Modem, you'll learn:

  • the history of cable modem hacking
  • how a cable modem works
  • the importance of firmware (including multiple ways to install new firmware)
  • how to unblock network ports and unlock hidden features
  • how to hack and modify your cable modem
  • what uncapping is and how it makes cable modems upload and download faster

    Written for people at all skill levels, the book features step-by-step tutorials with easy to follow diagrams, source code examples, hardware schematics, links to software (exclusive to this book!), and previously unreleased cable modem hacks.

  • (HTML tags aren't allowed.)

    Watermarking Systems Engineering
    Watermarking Systems Engineering
    The growth of the Internet has fueled the demand for enhanced watermarking and data hiding technologies and has stimulated research into new ways to implement watermarking systems in the real world. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications presents the principles of watermarking system design and...
    Database Modeling for Industrial Data Management: Emerging Technologies and Applications
    Database Modeling for Industrial Data Management: Emerging Technologies and Applications
    Collecting and presenting the latest research and development results from the leading researchers in the field of industrial database modeling, Database Modeling for Industrial Data Management: Emerging Technologies and Applications provides a single record of current research and practical applications in industrial database modeling. This book...
    Hacking Exposed Cisco Networks
    Hacking Exposed Cisco Networks

    Implement bulletproof Cisco security the battle-tested Hacking Exposed way

    Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...


    Beginning Relational Data Modeling, Second Edition
    Beginning Relational Data Modeling, Second Edition

    Data storage design, and awareness of how data needs to be utilized within an organization, is of prime importance in ensuring that company data systems work efficiently. If you need to know how to capture the information needs of a business system in a relational database model, but don’t know where to start, then this is the book for...

    The Worldwide History of Telecommunications
    The Worldwide History of Telecommunications
    The first comprehensive history of the Information Age how we got there and where we are going

    The exchange of information is essential for both the organization of nature and the social life of mankind. Until recently, communication between people was more or less limited by geographic proximity. Today, thanks to ongoing innovations in...

    Using Samba
    Using Samba
    Samba, the Server Message Block (SMB) server software that makes it relatively easy to integrate Unix or Linux servers into networks of Microsoft Windows workstations, has to date been mostly explained as an afterthought. Most often, it's appeared in the latter chapters of books about Linux. It deserves better, and the authors of Using...
    ©2021 LearnIT (support@pdfchm.net) - Privacy Policy