Book description
This offbeat, non-technical book examines what hackers do, how they do it, and how readers can protect themselves. Informative, irreverent, and entertaining, the completely revised fourth edition of Steal This Computer Book contains new chapters discussing the hacker mentality, lock picking, exploiting P2P file sharing networks, and how people manipulate search engines and pop-up ads. Includes a CD with hundreds of megabytes of hacking and security-related programs that tie-in to each chapter in the book.
Publisher resources
Table of contents
- Praise for Steal This Computer Book
- Dedication
- Acknowledgments
- Introduction
-
I. The Early Hackers
- 1. The Hacker Mentality
- 2. The First Hackers: The Phone Phreakers
- 3. Hacking People, Places, and Things
-
II. The Pc Pioneers
- 4. Ansi Bombs and Viruses
- 5. Trojan Horses and Worms
- 6. Warez (Software Piracy)
-
III. The Internet Hackers
- 7. Where the Hackers Are
- 8. Stalking a Computer
- 9. Cracking Passwords
- 10. Digging into a Computer with Rootkits
- 11. Censoring Information
- 12. The Filesharing Networks
-
IV. The Real World Hackers
- 13. The Internet Con Artists
-
14. Finding People on the Internet
- Who Are the Stalkers?
- Stalking on the Internet
- Finding Personal Information on the Internet
- Stalking Celebrities
- Protecting Yourself
- 15. Propaganda as News and Entertainment
- 16. Hacktivism: Online Activism
- 17. Hate Groups and Terrorists on the Internet
-
V. The Future—Hacking for Profit
- 18. Identity Theft and Spam
- 19. Banner Ads, Pop-Up Ads, and Search Engine Spamming
- 20. Adware and Spyware
-
VI. Protecting Your Computer and Yourself
- 21. Computing on a Shoestring: Getting Stuff for (Almost) Free
- 22. Computer Forensics: The Art of Deleting and Retrieving Data
- 23. Locking Down Your Computer
- A. Epilogue
-
B. What’s on the Steal This Computer Book 4.0 CD
- Uncompressing, Unzipping, Unstuffing, and So On
- Chapter 1—The Hacker Mentality
- Chapter 2—The First Hackers: The Phone Phreakers
- Chapter 3—Hacking People, Places, and Things
- Chapter 4—ANSI Bombs and Viruses
- Chapter 5—Trojan Horses and Worms
- Chapter 6—Warez (Software Piracy)
- Chapter 7—Where the Hackers Are
- Chapter 8—Stalking a Computer
- Chapter 9—Cracking Passwords
- Chapter 10—Digging into a Computer with Rootkits
- Chapter 11—Censoring Information
- Chapter 12—The Filesharing Networks
- Chapter 13—The Internet Con Artists
- Chapter 14—Finding People on the Internet
- Chapter 15—Propaganda as News and Entertainment
- Chapter 16—Hacktivism: Online Activism
- Chapter 17—Hate Groups and Terrorists on the Internet
- Chapter 18—Identity Theft and Spam
- Chapter 19—Banner Ads, Pop-up Ads, and Search Engine Spamming
- Chapter 20—Adware and Spyware
- Chapter 21—Computing on a Shoestring: Getting Stuff for (Almost) Free
- Chapter 22—Computer Forensics: The Art of Deleting and Retrieving Data
- Chapter 23—Locking Down Your Computer
- About the Author
- Updates
- C. Cd License Agreement
- Copyright
Product information
- Title: Steal This Computer Book 4.0, 4th Edition
- Author(s):
- Release date: May 2006
- Publisher(s): No Starch Press
- ISBN: 9781593271053
You might also like
book
Impractical Python Projects
Impractical Python Projects picks up where the complete beginner books leave off, expanding on existing concepts …
book
Penetration Testing
In Penetration Testing, security researcher and trainer Georgia Weidman provides you with a survey of important …
book
Tiny Python Projects
The projects are tiny, but the rewards are big: each chapter in Tiny Python Projects challenges …
book
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to …