Chapter 8. How Security Software Fights Off Invaders

Image

We should be grateful that most computer crackers are grossly egotistical. Breaking into a megacorporation’s servers, leaving a virus, or substituting a screen of his own scatological design for the company’s home page—that’s done by someone who wants attention. They can’t resist leaving a program or note that’s a digital sign of Zorro, something to let you know that although you might own the computer, the cracker owns its soul.

I’m using the term cracker here instead of hacker, which most people think of when they hear about some teenager who broke into the high school’s computer and gave ...

Get How Computers Work: The Evolution of Technology, Tenth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.