Hacker Highschool Security Awarness for teens:
Lesson 5 System Identification
Lesson 5 System Identification
5.0 Introduction
It is obvious that someone who sits down at the keyboard of your computer can gather information about it, including the operating system and the programs that are running, but it is also possible for someone to use a network connection to gather information about a remote computer. This lesson will describe some of the ways in which that information can be gathered. Knowing how this information is gathered will help you to ensure that your local computer is safe from these activities.
For Download: