Chapter 8. How Security Software Fights Off Invaders


We should be grateful that most computer crackers are grossly egotistical. Breaking into a megacorporation’s servers, leaving a virus, or substituting a screen of his own scatological design for the company’s home page—that’s done by someone who wants attention. They can’t resist leaving a program or note that’s a digital sign of Zorro, something to let you know that although you might own the computer, the cracker owns its soul.

I’m using the term cracker here instead of hacker, which most people think of when they hear about some teenager who broke into the high school’s computer and gave ...

Get How Computers Work: The Evolution of Technology, Tenth Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.