Steal this computer book 4.0 what they won't tell you about the Internet

This offbeat, nontechnical book examines what hackers do, how they do it, and how readers can protect themselves. Informative, irreverent, andentertaining, the completely revised fourth edition of Steal This Computer Book contains new chapters that discuss the hacker mentality, lock picking, exploit...

Descripción completa

Detalles Bibliográficos
Autor principal: Wang, Wally (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: San Francisco : No Starch Press c2006.
Edición:4th ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009626937606719
Tabla de Contenidos:
  • Acknowledgments; Brief Contents; Contents in Detail; Introduction; PART 1: The Early Hackers; 1: The Hacker Mentality; Questioning Authority; Questioning Assumptions; Developing Values; The Three Stages of Hacking; 2: The First Hackers: The Phone Phreakers; A Short History of Phone Phreaking; Phone Phreaking Urban Legends; True and Verified Phone Phreaking Stories; Phone Phreaking Tools and Techniques; 3: Hacking People, Places, and Things; Social Engineering: The Art of Hacking People; Picking Locks; Exploring Urban Areas; Hacking the Airwaves; Hacking History (or, Hemp for Victory)
  • PART 2: The PC Pioneers4: ANSI Bombs and Viruses; The Making of an ANSI Bomb; The Spread of Computer Viruses; How Viruses Avoid Detection; How Antivirus Programs Work; Why People Write Viruses; Finding Virus-Writing Tutorials; Virus-Writing Toolkits; Virus Myths and Hoaxes; Learning More About Viruses; The Future Virus Threat; 5: Trojan Horses and Worms; The World of Trojan Horses; Worms: Self-Replicating Viruses; Stopping Worms and Trojan Horses; Tracking the Threats; 6: Warez (Software Privacy); Copying Copy-Protected Software; Defeating Serial Numbers; Defeating Product Activation
  • Warez WebsitesUsenet Newsgroups: The New Piracy Breeding Ground; PART 3: The Internet Hackers; 7: Where the Hackers Are; Hacker Websites; Hacker Magazines; Hacker Usenet Newsgroups; Finding Hackers on IRC; Hacker Conventions; Don't Panic: Hackers are People, Too; 8: Stalking a Computer; Why Hackers Choose Their Targets; Finding a Target; The Next Step; 9: Cracking Passwords; Password Stealing; Dictionary Attacks; Brute-Force Password Attacks; Passwords: The First Line of Defense; Blocking Access with Biometrics; Good Enough Security; 10: Digging Into a Computer with Rootkits
  • How Operating Systems WorkThe Evolution of Rootkits; Opening a Backdoor; Sniffing for More Passwords; Killing Rootkits; 11: Censoring Information; Censoring the Internet; The Internet Censors; Censorship Begins at Home: Parental Control Software; Avoiding Internet Censorship; Reading Banned Books Online; Is Anyone Censoring the Censors?; 12: The Filesharing Networks; A Short History of Internet Filesharing; How Filesharing Works; Sharing Large Files; The Problem with Filesharing; PART 4: The Real World Hackers; 13: The Internet Con Artists; Charity Scams; The Area Code Scam; The Nigerian Scam
  • Work-at-Home BusinessesPyramid Schemes; The Lonely Hearts Scam; Internet-Specific Con Games; Online Auction Frauds; Credit Card Fraud; Protecting Yourself; The Recovery Room Scam; 14: Finding People on the Internet; Who Are the Stalkers?; Stalking on the Internet; Finding Personal Information on the Internet; Stalking Celebrities; Protecting Yourself; 15: Propaganda as News and Entertainment; The News as Reality TV; Corporate Influence on the News; The News Only Reports the Facts - And Anything Else Anyone Will Tell Them; The News as History
  • Fear, Future, Fun, and Fakes: The Weekly World News as a Role Model for the News Media