O'Reilly logo

Steal This Computer Book 4.0, 4th Edition by Wallace Wang

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. Hacking People, Places, and Things

artist

Trust that little voice in your head that says “Wouldn’t it be interesting if. . . .” And then do it.

DUANE MICHALS

Hacking is more than just manipulating computers. As phone phreakers discovered in their quest to control the telephone system, hacking can be performed on anything, and as you’ll soon see, people have been hacking in a variety of ways for years. Hacking involves studying a system to see how it works, playing with the system to see how to control it, and then manipulating the system to put it under your control.

Social Engineering: The Art of Hacking People

Perhaps the oldest form of hacking is social engineering, which involves using people to get what you want. Unlike con games ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required