- STAFF PICKS
- GIFTS + GIFT CARDS
- SELL BOOKS
- FIND A STORE
Used Trade Paper
Ships in 1 to 3 days
More copies of this ISBN
Steal This Computer Book 4.0: What They Won't Tell You about the Internetby Wally Wang
Synopses & Reviews
National bestseller with over 175,000 copies sold!
If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths, and never accepting at face value anything authorities say or do.
The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first three editions hugely successful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality, social engineering and lock picking, exploiting P2P file-sharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information. Wang also takes issue with the media for "hacking" the news and presenting the public with self-serving stories of questionable accuracy. Inside, you'll discover:
Book News Annotation:
In addition to writing computer books for No Starch, Wang is a stand-up comic and anarchist. Here he offers a philosophical book about the implications of hacking in the broad sense of exploring, extending boundaries, and searching for knowledge for its own sake. He helps readers think like a hacker, both to engage in it and to protect their computers from hackers trying to steal something. The disk contains free hacking and security-related programs, and will work with Windows, Mac, and Linux.
Annotation ©2006 Book News, Inc., Portland, OR (booknews.com)
Book News Annotation:
In addition to writing computer books for No Starch, Wang is a stand-up comic and anarchist. Here he offers a philosophical book about the implications of hacking in the broad sense of exploring, extending boundaries, and searching for knowledge for its own sake. He helps readers think like a hacker, both to engage in it and to protect their computers from hackers trying to steal something. The disk contains free hacking and security-related programs, and will work with Windows, Mac, and Linux. Annotation Â©2006 Book News, Inc., Portland, OR (booknews.com)
From the earliest phone phreakers to today's most pernicious phishers, Steal This Computer Book Reloaded explores the world of hackers, crackers, virus writers, scammers, and other members of the Internet underground. Essential reading for anyone connected to the Internet, this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first four editions hugely successful, Steal This Computer Book Reloaded will expand minds and raise eyebrows. The entire book has been rewritten, and key sections have been revised to expose the latest dangers lurking online and off as well as the increased political ramifications of hacking by both corporations and national governments. New chapters discuss cyberwarfare, recently discovered security vulnerabilities and hacker tools, remote attacks, and digital spying programs.
This offbeat, non-technical book examines what hackers do, how they do it, and how readers can protect themselves. The completely revised fourth edition of this bestseller (over 150,000 copies sold) adopts the same informative, irreverent, and entertaining style that made the first three editions a huge success. New chapters discuss the hacker mentality, lock picking, exploiting P2P file sharing networks, and how people manipulate search engines and pop-up ads. Includes a CD with hundreds of megabytes of hacking and security-related programs that tie-in to each chapter in the book.
About the Author
Wallace Wang is the author of several best-selling computer books, including My New Mac, My New iPhone, and Steal This Computer Book (all No Starch Press). He is also a successful standup comic who has appeared on A&E's "Evening at the Improv" and appears regularly at the Riviera Comedy Club in Las Vegas.
Table of Contents
Praise for Steal This Computer Book; Dedication; Acknowledgments; Introduction; Your Own Revolution; What's in This Book; The Early Hackers; Chapter 1: The Hacker Mentality; 1.1 Questioning Authority; 1.2 Questioning Assumptions; 1.3 Developing Values; 1.4 The Three Stages of Hacking; Chapter 2: The First Hackers: The Phone Phreakers; 2.1 A Short History of Phone Phreaking; 2.2 Phone Phreaking Urban Legends; 2.3 True and Verified Phone Phreaking Stories; 2.4 Phone Phreaking Tools and Techniques; Chapter 3: Hacking People, Places, and Things; 3.1 Social Engineering: The Art of Hacking People; 3.2 Picking Locks; 3.3 Exploring Urban Areas; 3.4 Hacking the Airwaves; 3.5 Hacking History (or, Hemp for Victory); The Pc Pioneers; Chapter 4: Ansi Bombs and Viruses; 4.1 The Making of an ANSI Bomb; 4.2 The Spread of Computer Viruses; 4.3 How Viruses Avoid Detection; 4.4 How Antivirus Programs Work; 4.5 Why People Write Viruses; 4.6 Finding virus-writing tutorials; 4.7 Virus-writing toolkits; 4.8 Virus Myths and Hoaxes; 4.9 Learning More About Viruses; 4.10 The Future Virus Threat; Chapter 5: Trojan Horses and Worms; 5.1 The World of Trojan Horses; 5.2 Worms: Self-Replicating Viruses; 5.3 Stopping Worms and Trojan Horses; 5.4 Tracking the Threats; Chapter 6: Warez (Software Piracy); 6.1 Copying Copy-Protected Software; 6.2 Defeating Serial Numbers; 6.3 Defeating Product Activation; 6.4 Warez Websites; 6.5 Usenet Newsgroups: The New Piracy Breeding Ground; The Internet Hackers; Chapter 7: Where the Hackers Are; 7.1 Hacker Websites; 7.2 Hacker Magazines; 7.3 Hacker Usenet Newsgroups; 7.4 Finding Hackers on IRC; 7.5 Hacker Conventions; 7.6 Don't Panic: Hackers Are People, Too; Chapter 8: Stalking a Computer; 8.1 Why Hackers Choose Their Targets; 8.2 Finding a Target; 8.3 The Next Step; Chapter 9: Cracking Passwords; 9.1 Password Stealing; 9.2 Dictionary Attacks; 9.3 Brute-Force Password Attacks; 9.4 Passwords: The First Line of Defense; 9.5 Blocking Access with Biometrics; 9.6 Good Enough Security; Chapter 10: Digging into a Computer with Rootkits; 10.1 How Operating Systems Work; 10.2 The Evolution of Rootkits; 10.3 Opening a Backdoor; 10.4 Sniffing for More Passwords; 10.5 Killing Rootkits; Chapter 11: Censoring Information; 11.1 Censoring the Internet; 11.2 The Internet Censors; 11.3 Censorship Begins at Home: Parental Control Software; 11.4 Avoiding Internet Censorship; 11.5 Reading Banned Books Online; 11.6 Is Anyone Censoring the Censors?; Chapter 12: The Filesharing Networks; 12.1 A Short History of Internet FileSharing; 12.2 How FileSharing Works; 12.3 Sharing Large Files; 12.4 The Problem with Filesharing; The Real World Hackers; Chapter 13: The Internet Con Artists; 13.1 Charity Scams; 13.2 The Area Code Scam; 13.3 The Nigerian Scam; 13.4 Work-at-Home Businesses; 13.5 Pyramid Schemes; 13.6 The Lonely Hearts Scam; 13.7 Internet-Specific Con Games; 13.8 Online Auction Frauds; 13.9 Credit Card Fraud; 13.10 Protecting Yourself; 13.11 The Recovery Room Scam; Chapter 14: Finding People on the Internet; 14.1 Who Are the Stalkers?; 14.2 Stalking on the Internet; 14.3 Finding Personal Information on the Internet; 14.4 Stalking Celebrities; 14.5 Protecting Yourself; Chapter 15: Propaganda as News and Entertainment; 15.1 The News as Reality TV; 15.2 Corporate Influence on the News; 15.3 The News Only Reports the Facts--And Anything Else Anyone Will Tell Them; 15.4 The News as History; 15.5 Fear, Future, Fun, and Fakes: The Weekly World News as a Role Model for the News Media; 15.6 Using Satire to Report on Reality; 15.7 Blogs as News Sources; Chapter 16: Hacktivism: Online Activism; 16.1 Virtual Sit-ins and Blockades; 16.2 Email Bombing; 16.3 Web Hacking and Computer Break-ins; 16.4 Computer Viruses and Worms; 16.5 Activist Video Games; 16.6 Google Bombing; 16.7 Becoming a Hacktivist; Chapter 17: Hate Groups and Terrorists on the Internet; 17.1 Hate Groups on the Internet; 17.2 Racist Video Games; 17.3 Terrorism: The Communist Threat of the Twenty-first Century; 17.4 The Future of Terrorism; The Future--Hacking for Profit; Chapter 18: Identity Theft and Spam; 18.1 Understanding Identity Theft; 18.2 Spam: Junk Mail on the Internet; 18.3 Why Companies Spam and How They Do It; 18.4 Protecting Yourself from Spammers; 18.5 How Spam Filters Work; 18.6 Stopping Spam; 18.7 Possible future solutions to spam; 18.8 A PostScript: Spam as Propaganda; Chapter 19: Banner Ads, Pop-Up Ads, and Search Engine Spamming; 19.1 Banner Ads and Click Fraud; 19.2 Pop-Up/Pop-Under Ads; 19.3 Watching Out for Web Bugs; 19.4 Spamdexing: Search Engine Spamming; Chapter 20: Adware and Spyware; 20.1 What Spyware Can Do; 20.2 Why Companies Advertise Through Spyware; 20.3 How Spyware Infects a Computer; 20.4 Where Spyware Hides; 20.5 Eliminating Spyware; Protecting Your Computer and Yourself; Chapter 21: Computing on a Shoestring: Getting Stuff for (Almost) Free; 21.1 Internet Comparison Shopping; 21.2 Buying a Refurbished Computer; 21.3 Save on Printer Supplies; 21.4 Free (and Almost-Free) Software; 21.5 Free Internet Access; 21.6 Free Email Accounts; 21.7 Free Web and Blog Space; 21.8 The Best Things in Life Are Free; Chapter 22: Computer Forensics: The Art of Deleting and Retrieving Data; 22.1 Recovering Deleted Data; 22.2 File Shredders; 22.3 Storing Deleted Data; 22.4 Computer Forensics Tools; 22.5 Commercial Forensics Tools; 22.6 Protecting Yourself; Chapter 23: Locking Down Your Computer; 23.1 Protecting Your Computer (and Its Parts); 23.2 Protecting Your Data; 23.3 What's Next?; Epilogue; What's on the Steal This Computer Book 4.0 CD; Uncompressing, Unzipping, Unstuffing, and So On; Chapter 1--The Hacker Mentality; Chapter 2--The First Hackers: The Phone Phreakers; Chapter 3--Hacking People, Places, and Things; Chapter 4--ANSI Bombs and Viruses; Chapter 5--Trojan Horses and Worms; Chapter 6--Warez (Software Piracy); Chapter 7--Where the Hackers Are; Chapter 8--Stalking a Computer; Chapter 9--Cracking Passwords; Chapter 10--Digging into a Computer with Rootkits; Chapter 11--Censoring Information; Chapter 12--The Filesharing Networks; Chapter 13--The Internet Con Artists; Chapter 14--Finding People on the Internet; Chapter 15--Propaganda as News and Entertainment; Chapter 16--Hacktivism: Online Activism; Chapter 17--Hate Groups and Terrorists on the Internet; Chapter 18--Identity Theft and Spam; Chapter 19--Banner Ads, Pop-up Ads, and Search Engine Spamming; Chapter 20--Adware and Spyware; Chapter 21--Computing on a Shoestring: Getting Stuff for (Almost) Free; Chapter 22--Computer Forensics: The Art of Deleting and Retrieving Data; Chapter 23--Locking Down Your Computer; Updates; Cd License Agreement; No Warranty;
What Our Readers Are Saying
Other books you might like
Computers and Internet » Computers Reference » General