O'Reilly logo

Steal This Computer Book 4.0, 4th Edition by Wallace Wang

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 18. Identity Theft and Spam

technology writer

The rise of computer crime and armed robbery has not eliminated the lure of caged cash.

JAMES CHILES

Not everyone who can manipulate a computer is a hacker, and not every hacker is a computer expert. Hacking is an attitude of exploration. However, real hackers can often use their computer skills and knowledge to take advantage of other people. When hackers want to use their computer skills to steal from other people, they usually engage in some form of identity theft. When hackers want to use their computer skills to bombard people with advertisements for legitimate (and not-so-legitimate) products, they use spam.

Whatever the motivation may be, the end result of identity theft and spam is the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required