The Fictioning
 
 

Special Offers see all

Enter to WIN a $100 Credit

Subscribe to PowellsBooks.news
for a chance to win.
Privacy Policy

Tour our stores


    Recently Viewed clear list


    Original Essays | September 15, 2014

    Lois Leveen: IMG Forsooth Me Not: Shakespeare, Juliet, Her Nurse, and a Novel



    There's this writer, William Shakespeare. Perhaps you've heard of him. He wrote this play, Romeo and Juliet. Maybe you've heard of it as well. It's... Continue »

    spacer
Qualifying orders ship free.
$4.50
List price: $29.95
Used Trade Paper
Ships in 1 to 3 days
Add to Wishlist
Qty Store Section
1 Local Warehouse Networking- Computer Security

Steal This Computer Book 4.0: What They Won't Tell You about the Internet

by

Steal This Computer Book 4.0: What They Won't Tell You about the Internet Cover

 

Synopses & Reviews

Publisher Comments:

National bestseller with over 175,000 copies sold!

If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths, and never accepting at face value anything authorities say or do.

The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first three editions hugely successful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality, social engineering and lock picking, exploiting P2P file-sharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information. Wang also takes issue with the media for "hacking" the news and presenting the public with self-serving stories of questionable accuracy. Inside, you'll discover:

  • How to manage and fight spam and spyware
  • How Trojan horse programs and rootkits work, and how to defend against them
  • How hackers steal software and defeat copy-protection mechanisms
  • How to tell if your machine is being attacked and what you can do to protect it
  • Where the hackers are, how they probe a target and sneak into a computer, and what they do once they get inside
  • How corporations use hacker techniques to infect your computer and invade your privacy
  • How you can lock down your computer to protect your data and your personal information using free programs included on the book's CDIf you ve ever logged onto a website, conducted an online transaction, sent or received email, used a networked computer, or even watched the evening news, you may have already been tricked, tracked, hacked, and manipulated. As the saying goes, just because you're paranoid doesn't mean they aren't after you. And, as Wallace Wang reveals, they probably are.The companion CD contains hundreds of megabytes of 100% FREE hacking and security-related programs, like keyloggers, spyware stoppers, port blockers, IP scanners, Trojan horse detectors, and much, much more. CD compatible with Windows, Mac, and Linux.
  • Book News Annotation:

    In addition to writing computer books for No Starch, Wang is a stand-up comic and anarchist. Here he offers a philosophical book about the implications of hacking in the broad sense of exploring, extending boundaries, and searching for knowledge for its own sake. He helps readers think like a hacker, both to engage in it and to protect their computers from hackers trying to steal something. The disk contains free hacking and security-related programs, and will work with Windows, Mac, and Linux.
    Annotation 2006 Book News, Inc., Portland, OR (booknews.com)

    Book News Annotation:

    In addition to writing computer books for No Starch, Wang is a stand-up comic and anarchist. Here he offers a philosophical book about the implications of hacking in the broad sense of exploring, extending boundaries, and searching for knowledge for its own sake. He helps readers think like a hacker, both to engage in it and to protect their computers from hackers trying to steal something. The disk contains free hacking and security-related programs, and will work with Windows, Mac, and Linux. Annotation ©2006 Book News, Inc., Portland, OR (booknews.com)

    Synopsis:

    From the earliest phone phreakers to today's most pernicious phishers, Steal This Computer Book Reloaded explores the world of hackers, crackers, virus writers, scammers, and other members of the Internet underground. Essential reading for anyone connected to the Internet, this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first four editions hugely successful, Steal This Computer Book Reloaded will expand minds and raise eyebrows. The entire book has been rewritten, and key sections have been revised to expose the latest dangers lurking online and off as well as the increased political ramifications of hacking by both corporations and national governments. New chapters discuss cyberwarfare, recently discovered security vulnerabilities and hacker tools, remote attacks, and digital spying programs.

    Synopsis:

    This offbeat, non-technical book examines what hackers do, how they do it, and how readers can protect themselves. The completely revised fourth edition of this bestseller (over 150,000 copies sold) adopts the same informative, irreverent, and entertaining style that made the first three editions a huge success. New chapters discuss the hacker mentality, lock picking, exploiting P2P file sharing networks, and how people manipulate search engines and pop-up ads. Includes a CD with hundreds of megabytes of hacking and security-related programs that tie-in to each chapter in the book.

    About the Author

    Wallace Wang is the author of several best-selling computer books, including My New Mac, My New iPhone, and Steal This Computer Book (all No Starch Press). He is also a successful standup comic who has appeared on A&E's "Evening at the Improv" and appears regularly at the Riviera Comedy Club in Las Vegas.

    Table of Contents

    Praise for Steal This Computer Book; Dedication; Acknowledgments; Introduction; Your Own Revolution; What's in This Book; The Early Hackers; Chapter 1: The Hacker Mentality; 1.1 Questioning Authority; 1.2 Questioning Assumptions; 1.3 Developing Values; 1.4 The Three Stages of Hacking; Chapter 2: The First Hackers: The Phone Phreakers; 2.1 A Short History of Phone Phreaking; 2.2 Phone Phreaking Urban Legends; 2.3 True and Verified Phone Phreaking Stories; 2.4 Phone Phreaking Tools and Techniques; Chapter 3: Hacking People, Places, and Things; 3.1 Social Engineering: The Art of Hacking People; 3.2 Picking Locks; 3.3 Exploring Urban Areas; 3.4 Hacking the Airwaves; 3.5 Hacking History (or, Hemp for Victory); The Pc Pioneers; Chapter 4: Ansi Bombs and Viruses; 4.1 The Making of an ANSI Bomb; 4.2 The Spread of Computer Viruses; 4.3 How Viruses Avoid Detection; 4.4 How Antivirus Programs Work; 4.5 Why People Write Viruses; 4.6 Finding virus-writing tutorials; 4.7 Virus-writing toolkits; 4.8 Virus Myths and Hoaxes; 4.9 Learning More About Viruses; 4.10 The Future Virus Threat; Chapter 5: Trojan Horses and Worms; 5.1 The World of Trojan Horses; 5.2 Worms: Self-Replicating Viruses; 5.3 Stopping Worms and Trojan Horses; 5.4 Tracking the Threats; Chapter 6: Warez (Software Piracy); 6.1 Copying Copy-Protected Software; 6.2 Defeating Serial Numbers; 6.3 Defeating Product Activation; 6.4 Warez Websites; 6.5 Usenet Newsgroups: The New Piracy Breeding Ground; The Internet Hackers; Chapter 7: Where the Hackers Are; 7.1 Hacker Websites; 7.2 Hacker Magazines; 7.3 Hacker Usenet Newsgroups; 7.4 Finding Hackers on IRC; 7.5 Hacker Conventions; 7.6 Don't Panic: Hackers Are People, Too; Chapter 8: Stalking a Computer; 8.1 Why Hackers Choose Their Targets; 8.2 Finding a Target; 8.3 The Next Step; Chapter 9: Cracking Passwords; 9.1 Password Stealing; 9.2 Dictionary Attacks; 9.3 Brute-Force Password Attacks; 9.4 Passwords: The First Line of Defense; 9.5 Blocking Access with Biometrics; 9.6 Good Enough Security; Chapter 10: Digging into a Computer with Rootkits; 10.1 How Operating Systems Work; 10.2 The Evolution of Rootkits; 10.3 Opening a Backdoor; 10.4 Sniffing for More Passwords; 10.5 Killing Rootkits; Chapter 11: Censoring Information; 11.1 Censoring the Internet; 11.2 The Internet Censors; 11.3 Censorship Begins at Home: Parental Control Software; 11.4 Avoiding Internet Censorship; 11.5 Reading Banned Books Online; 11.6 Is Anyone Censoring the Censors?; Chapter 12: The Filesharing Networks; 12.1 A Short History of Internet FileSharing; 12.2 How FileSharing Works; 12.3 Sharing Large Files; 12.4 The Problem with Filesharing; The Real World Hackers; Chapter 13: The Internet Con Artists; 13.1 Charity Scams; 13.2 The Area Code Scam; 13.3 The Nigerian Scam; 13.4 Work-at-Home Businesses; 13.5 Pyramid Schemes; 13.6 The Lonely Hearts Scam; 13.7 Internet-Specific Con Games; 13.8 Online Auction Frauds; 13.9 Credit Card Fraud; 13.10 Protecting Yourself; 13.11 The Recovery Room Scam; Chapter 14: Finding People on the Internet; 14.1 Who Are the Stalkers?; 14.2 Stalking on the Internet; 14.3 Finding Personal Information on the Internet; 14.4 Stalking Celebrities; 14.5 Protecting Yourself; Chapter 15: Propaganda as News and Entertainment; 15.1 The News as Reality TV; 15.2 Corporate Influence on the News; 15.3 The News Only Reports the Facts--And Anything Else Anyone Will Tell Them; 15.4 The News as History; 15.5 Fear, Future, Fun, and Fakes: The Weekly World News as a Role Model for the News Media; 15.6 Using Satire to Report on Reality; 15.7 Blogs as News Sources; Chapter 16: Hacktivism: Online Activism; 16.1 Virtual Sit-ins and Blockades; 16.2 Email Bombing; 16.3 Web Hacking and Computer Break-ins; 16.4 Computer Viruses and Worms; 16.5 Activist Video Games; 16.6 Google Bombing; 16.7 Becoming a Hacktivist; Chapter 17: Hate Groups and Terrorists on the Internet; 17.1 Hate Groups on the Internet; 17.2 Racist Video Games; 17.3 Terrorism: The Communist Threat of the Twenty-first Century; 17.4 The Future of Terrorism; The Future--Hacking for Profit; Chapter 18: Identity Theft and Spam; 18.1 Understanding Identity Theft; 18.2 Spam: Junk Mail on the Internet; 18.3 Why Companies Spam and How They Do It; 18.4 Protecting Yourself from Spammers; 18.5 How Spam Filters Work; 18.6 Stopping Spam; 18.7 Possible future solutions to spam; 18.8 A PostScript: Spam as Propaganda; Chapter 19: Banner Ads, Pop-Up Ads, and Search Engine Spamming; 19.1 Banner Ads and Click Fraud; 19.2 Pop-Up/Pop-Under Ads; 19.3 Watching Out for Web Bugs; 19.4 Spamdexing: Search Engine Spamming; Chapter 20: Adware and Spyware; 20.1 What Spyware Can Do; 20.2 Why Companies Advertise Through Spyware; 20.3 How Spyware Infects a Computer; 20.4 Where Spyware Hides; 20.5 Eliminating Spyware; Protecting Your Computer and Yourself; Chapter 21: Computing on a Shoestring: Getting Stuff for (Almost) Free; 21.1 Internet Comparison Shopping; 21.2 Buying a Refurbished Computer; 21.3 Save on Printer Supplies; 21.4 Free (and Almost-Free) Software; 21.5 Free Internet Access; 21.6 Free Email Accounts; 21.7 Free Web and Blog Space; 21.8 The Best Things in Life Are Free; Chapter 22: Computer Forensics: The Art of Deleting and Retrieving Data; 22.1 Recovering Deleted Data; 22.2 File Shredders; 22.3 Storing Deleted Data; 22.4 Computer Forensics Tools; 22.5 Commercial Forensics Tools; 22.6 Protecting Yourself; Chapter 23: Locking Down Your Computer; 23.1 Protecting Your Computer (and Its Parts); 23.2 Protecting Your Data; 23.3 What's Next?; Epilogue; What's on the Steal This Computer Book 4.0 CD; Uncompressing, Unzipping, Unstuffing, and So On; Chapter 1--The Hacker Mentality; Chapter 2--The First Hackers: The Phone Phreakers; Chapter 3--Hacking People, Places, and Things; Chapter 4--ANSI Bombs and Viruses; Chapter 5--Trojan Horses and Worms; Chapter 6--Warez (Software Piracy); Chapter 7--Where the Hackers Are; Chapter 8--Stalking a Computer; Chapter 9--Cracking Passwords; Chapter 10--Digging into a Computer with Rootkits; Chapter 11--Censoring Information; Chapter 12--The Filesharing Networks; Chapter 13--The Internet Con Artists; Chapter 14--Finding People on the Internet; Chapter 15--Propaganda as News and Entertainment; Chapter 16--Hacktivism: Online Activism; Chapter 17--Hate Groups and Terrorists on the Internet; Chapter 18--Identity Theft and Spam; Chapter 19--Banner Ads, Pop-up Ads, and Search Engine Spamming; Chapter 20--Adware and Spyware; Chapter 21--Computing on a Shoestring: Getting Stuff for (Almost) Free; Chapter 22--Computer Forensics: The Art of Deleting and Retrieving Data; Chapter 23--Locking Down Your Computer; Updates; Cd License Agreement; No Warranty;

    Product Details

    ISBN:
    9781593271053
    Author:
    Wang, Wally
    Publisher:
    No Starch Press
    Author:
    Wong, Wallace
    Author:
    Wang, Wallace
    Subject:
    Internet - Security
    Subject:
    Internet
    Subject:
    Social Aspects - General
    Subject:
    Security - General
    Subject:
    Internet - General
    Subject:
    ANSI bombs;Activism;DOS;File sharing;Hacking;Hacktivism;IDS;Identity Theft;Spam;adware;banner ads;denial of service;exploitation;firewall;forensics;honeypot;honeypots;internet security;lock picking;mail bombing;phone phreaking;pop-up ads;port scanners;pri
    Subject:
    ANSI bombs;Activism;DOS;File sharing;Hacking;Hacktivism;IDS;Identity Theft;Spam;adware;banner ads;denial of service;exploitation;firewall;forensics;honeypot;honeypots;internet security;lock picking;mail bombing;phone phreaking;pop-up ads;port scanners;pri
    Subject:
    ANSI bombs;Activism;DOS;File sharing;Hacking;Hacktivism;IDS;Identity Theft;Spam;adware;banner ads;denial of service;exploitation;firewall;forensics;honeypot;honeypots;internet security;lock picking;mail bombing;phone phreaking;pop-up ads;port scanners;pri
    Subject:
    ANSI bombs;Activism;DOS;File sharing;Hacking;Hacktivism;IDS;Identity Theft;Spam;adware;banner ads;denial of service;exploitation;firewall;forensics;honeypot;honeypots;internet security;lock picking;mail bombing;phone phreaking;pop-up ads;port scanners;pri
    Subject:
    ANSI bombs;Activism;DOS;File sharing;Hacking;Hacktivism;IDS;Identity Theft;Spam;adware;banner ads;denial of service;exploitation;firewall;forensics;honeypot;honeypots;internet security;lock picking;mail bombing;phone phreaking;pop-up ads;port scanners;pri
    Subject:
    ANSI bombs;Activism;DOS;File sharing;Hacking;Hacktivism;IDS;Identity Theft;Spam;adware;banner ads;denial of service;exploitation;firewall;forensics;honeypot;honeypots;internet security;lock picking;mail bombing;phone phreaking;pop-up ads;port scanners;pri
    Subject:
    ANSI bombs;Activism;DOS;File sharing;Hacking;Hacktivism;IDS;Identity Theft;Spam;adware;banner ads;denial of service;exploitation;firewall;forensics;honeypot;honeypots;internet security;lock picking;mail bombing;phone phreaking;pop-up ads;port scanners;pri
    Subject:
    ANSI bombs;Activism;DOS;File sharing;Hacking;Hacktivism;IDS;Identity Theft;Spam;adware;banner ads;denial of service;exploitation;firewall;forensics;honeypot;honeypots;internet security;lock picking;mail bombing;phone phreaking;pop-up ads;port scanners;pri
    Subject:
    ANSI bombs;Activism;DOS;File sharing;Hacking;Hacktivism;IDS;Identity Theft;Spam;adware;banner ads;denial of service;exploitation;firewall;forensics;honeypot;honeypots;internet security;lock picking;mail bombing;phone phreaking;pop-up ads;port scanners;pri
    Subject:
    ANSI bombs;Activism;DOS;File sharing;Hacking;Hacktivism;IDS;Identity Theft;Spam;adware;banner ads;denial of service;exploitation;firewall;forensics;honeypot;honeypots;internet security;lock picking;mail bombing;phone phreaking;pop-up ads;port scanners;pri
    Subject:
    ANSI bombs;Activism;DOS;File sharing;Hacking;Hacktivism;IDS;Identity Theft;Spam;adware;banner ads;denial of service;exploitation;firewall;forensics;honeypot;honeypots;internet security;lock picking;mail bombing;phone phreaking;pop-up ads;port scanners;pri
    Subject:
    ANSI bombs;Activism;DOS;File sharing;Hacking;Hacktivism;IDS;Identity Theft;Spam;adware;banner ads;denial of service;exploitation;firewall;forensics;honeypot;honeypots;internet security;lock picking;mail bombing;phone phreaking;pop-up ads;port scanners;pri
    Subject:
    ANSI bombs;Activism;DOS;File sharing;Hacking;Hacktivism;IDS;Identity Theft;Spam;adware;banner ads;denial of service;exploitation;firewall;forensics;honeypot;honeypots;internet security;lock picking;mail bombing;phone phreaking;pop-up ads;port scanners;pri
    Subject:
    ANSI bombs;Activism;DOS;File sharing;Hacking;Hacktivism;IDS;Identity Theft;Spam;adware;banner ads;denial of service;exploitation;firewall;forensics;honeypot;honeypots;internet security;lock picking;mail bombing;phone phreaking;pop-up ads;port scanners;pri
    Subject:
    ANSI bombs;Activism;DOS;File sharing;Hacking;Hacktivism;IDS;Identity Theft;Spam;adware;banner ads;denial of service;exploitation;firewall;forensics;honeypot;honeypots;internet security;lock picking;mail bombing;phone phreaking;pop-up ads;port scanners;pri
    Subject:
    ANSI bombs;Activism;DOS;File sharing;Hacking;Hacktivism;IDS;Identity Theft;Spam;adware;banner ads;denial of service;exploitation;firewall;forensics;honeypot;honeypots;internet security;lock picking;mail bombing;phone phreaking;pop-up ads;port scanners;pri
    Subject:
    ANSI bombs;Activism;DOS;File sharing;Hacking;Hacktivism;IDS;Identity Theft;Spam;adware;banner ads;denial of service;exploitation;firewall;forensics;honeypot;honeypots;internet security;lock picking;mail bombing;phone phreaking;pop-up ads;port scanners;pri
    Copyright:
    Edition Number:
    4
    Edition Description:
    Fourth Edition
    Publication Date:
    20060531
    Binding:
    TRADE PAPER
    Language:
    English
    Illustrations:
    Y
    Pages:
    376
    Dimensions:
    9.25 x 7.00 in

    Other books you might like

    1. The History Highway: A 21st-Century... New Trade Paper $56.95
    2. Java Ee and .Net Interoperability:... Used Trade Paper $6.25
    3. Publish and Prosper: Blogging for... New Trade Paper $10.99
    4. ASP.Net 2.0 Website Programming... Used Trade Paper $1.25
    5. Digital Generations: Children, Young... New Trade Paper $58.95
    6. Tricks of the Podcasting Masters (06... Used Trade Paper $15.00

    Related Subjects

    Computers and Internet » Computers Reference » General
    Computers and Internet » Internet » General
    Computers and Internet » Internet » Hackers
    Computers and Internet » Internet » Information
    Computers and Internet » Networking » Computer Security
    Fiction and Poetry » Literature » A to Z

    Steal This Computer Book 4.0: What They Won't Tell You about the Internet Used Trade Paper
    0 stars - 0 reviews
    $4.50 In Stock
    Product details 376 pages No Starch Press - English 9781593271053 Reviews:
    "Synopsis" by ,

    From the earliest phone phreakers to today's most pernicious phishers, Steal This Computer Book Reloaded explores the world of hackers, crackers, virus writers, scammers, and other members of the Internet underground. Essential reading for anyone connected to the Internet, this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first four editions hugely successful, Steal This Computer Book Reloaded will expand minds and raise eyebrows. The entire book has been rewritten, and key sections have been revised to expose the latest dangers lurking online and off as well as the increased political ramifications of hacking by both corporations and national governments. New chapters discuss cyberwarfare, recently discovered security vulnerabilities and hacker tools, remote attacks, and digital spying programs.

    "Synopsis" by , This offbeat, non-technical book examines what hackers do, how they do it, and how readers can protect themselves. The completely revised fourth edition of this bestseller (over 150,000 copies sold) adopts the same informative, irreverent, and entertaining style that made the first three editions a huge success. New chapters discuss the hacker mentality, lock picking, exploiting P2P file sharing networks, and how people manipulate search engines and pop-up ads. Includes a CD with hundreds of megabytes of hacking and security-related programs that tie-in to each chapter in the book.
    spacer
    spacer
    • back to top

    FOLLOW US ON...

         
    Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.