Human Hacked My Life and Lessons As the World's First Augmented Ethical Hacker

Detalles Bibliográficos
Otros Autores: Noe, Len, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Hoboken, NJ : John Wiley & Sons, Inc [2025]
Edición:First edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009853631206719
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright Page
  • Contents at a Glance
  • Contents
  • Introduction
  • What to Expect
  • Chapter 1 The Human Years
  • The Odyssey 2
  • The Commodore 64
  • Newb Before It Was a Thing
  • Windows into the Corporate World
  • A Hacker Is Born
  • A Life Divided
  • Flesh Is Stronger Than Steel
  • Chapter 2 A Change in Direction
  • Into the Light
  • Road Warrior
  • Chapter 3 Symbiotic Attack Vector
  • Tap-to-Pwn
  • My First Attack: Dinner and a Show
  • Chapter 4 Transhumanism: We Who Are Not As Others
  • A Brief History of Transhumanism
  • I, Cyborg
  • Bad Intentions
  • Notes
  • Chapter 5 Using Their Laws Against Them
  • Prepare for Takeoff Seat Backs and Tray Tables
  • Obfuscation by Law
  • Chapter 6 A Technological Rebirth
  • Finding My Techno-shaman
  • Honey, We Need to Talk
  • Chapter 7 My First Installs
  • Human MFA
  • Touching Digital
  • Cyberpunk in Downtown Austin
  • I Am Machine
  • Physical Meets Biological
  • Digital Lockpicks
  • Magnetic Vision
  • My Tools
  • Note
  • Chapter 8 I Am the Cyber Threat
  • Mobile Devices
  • L3pr@cy Attack
  • Fl3h-H00k Attack
  • Implant a Man-in-the-Middle Attack
  • Implant Phishing/Smishing Attack
  • Implant Automation Attack
  • Physical Access
  • H@nd-h@k3
  • Magnetic Tracing
  • Notes
  • Chapter 9 Living the Transhuman Life
  • VivoKey Chips
  • VivoKey Spark 2
  • VivoKey Apex
  • Cheeseburger Use Cases
  • Walletmor
  • NeXT Chip and BioMagnet
  • Chapter 10 I'm Hackable
  • Identity Evolution
  • Cultural Significance
  • What Is "Acceptable"?
  • Am I an Abomination?
  • Note
  • Chapter 11 Here There Be Grinders
  • The PirateBox and PegLeg
  • The HakLeg
  • HakLeg Antenna
  • A Grinder After All
  • Why Me?
  • Note
  • Chapter 12 Current Limitations of Transhuman Technology
  • Cyber Defense Against Humans
  • Technological Identification and Mitigation
  • Phishing Attack Defense.
  • Smishing Attack Defense
  • MitM Defense
  • Technological Work-Life Balance
  • Physical Access Attacks
  • Specialized K9 Detection
  • Notes
  • Chapter 13 The Future of Transhuman Technology
  • Brain-Computer Interfaces
  • Invasive BCIs
  • Early Issues in the Neuralink BCI
  • Neuro Rights
  • Partially Invasive BCIs
  • Noninvasive BCIs
  • Smart Devices
  • Internal Power
  • Sound Power
  • Glucose-Powered Metabolic Fuel Cell
  • Kinetic Power
  • Thermal Power
  • Batteries
  • AI: A Necessary Evil
  • Military Defense/Espionage
  • Haptics
  • Notes
  • Chapter 14 Transhuman Rights Are Human Rights
  • Transhuman Discrimination
  • The Hypocritic Oath
  • Transhuman, but Still Human
  • Notes
  • Chapter 15 My Future as a Transhuman
  • Final Thoughts
  • Notes
  • Appendix A: My Hardware
  • NExT
  • VivoKey Spark 2 (Cryptobionic)
  • flexNExT
  • flexM1 "Magic" 1k
  • flexEM T5577
  • Titan-Sensing Biomagnet
  • Walletmor
  • flexDF2 DESFire
  • VivoKey Apex
  • flexClass (HID iClass)
  • Appendix B: FAQs
  • Appendix C: Resources
  • My Body Mechanics
  • Organizations, Clubs, and Information Hubs
  • Implant Distributors
  • GitHub Repos
  • Open-Source Tools
  • Acknowledgments
  • About the Author
  • Index
  • EULA.