Uncompressing, Unzipping, Unstuffing, and So OnChapter 1—The Hacker MentalityChapter 2—The First Hackers: The Phone PhreakersChapter 3—Hacking People, Places, and ThingsChapter 4—ANSI Bombs and VirusesChapter 5—Trojan Horses and WormsChapter 6—Warez (Software Piracy)Chapter 7—Where the Hackers AreChapter 8—Stalking a ComputerChapter 9—Cracking PasswordsChapter 10—Digging into a Computer with RootkitsChapter 11—Censoring InformationChapter 12—The Filesharing NetworksChapter 13—The Internet Con ArtistsChapter 14—Finding People on the InternetChapter 15—Propaganda as News and EntertainmentChapter 16—Hacktivism: Online ActivismChapter 17—Hate Groups and Terrorists on the InternetChapter 18—Identity Theft and SpamChapter 19—Banner Ads, Pop-up Ads, and Search Engine SpammingChapter 20—Adware and SpywareChapter 21—Computing on a Shoestring: Getting Stuff for (Almost) FreeChapter 22—Computer Forensics: The Art of Deleting and Retrieving DataChapter 23—Locking Down Your Computer