Jump to ratings and reviews
Rate this book

Steal This Computer Book 4.0: What They Won't Tell You About the Internet

Rate this book
If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths and never accepting at face value anything authorities say or do.

The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first three editions hugely successful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality , social engineering and lock picking , exploiting P2P file-sharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information . Wang also takes issue with the media for "hacking" the news and presenting the public with self-serving stories of questionable accuracy.

Inside, you’ll
–How to manage and fight spam and spyware
–How Trojan horse programs and rootkits work and how to defend against them
–How hackers steal software and defeat copy-protection mechanisms
–How to tell if your machine is being attacked and what you can do to protect it
–Where the hackers are, how they probe a target and sneak into a computer , and what they do once they get inside
–How corporations use hacker techniques to infect your computer and invade your privacy
–How you can lock down your computer to protect your data and your personal information using free programs included on the book’s CD


If you’ve ever logged onto a website, conducted an online transaction, sent or received email, used a networked computer or even watched the evening news, you may have already been tricked, tracked, hacked, and manipulated. As the saying goes, just because you’re paranoid doesn’t mean they aren’t after you. And, as Wallace Wang reveals, they probably are.

The companion CD contains hundreds of megabytes of 100% FREE hacking and security related programs, like keyloggers, spyware stoppers, port blockers, IP scanners, Trojan horse detectors, and much, much more. CD compatible with Windows, Mac, and Linux.

384 pages, Paperback

First published January 1, 2006

40 people are currently reading
319 people want to read

About the author

Wallace Wang

188 books7 followers
See also Wally Wang

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
61 (26%)
4 stars
68 (29%)
3 stars
69 (30%)
2 stars
25 (10%)
1 star
6 (2%)
Displaying 1 - 18 of 18 reviews
Profile Image for Esteban del Mal.
192 reviews61 followers
February 2, 2010
1/27/10: Have finally waded past the preface on this one. Don't know how seriously I can take a book that proposes the relative nature of truth and then slaps you with an Ayn Rand quote to make the point. I. Loathe. Objectivism.

***

Um, I have better things to do than finish this. Like huff glue.
Profile Image for Rajesh Prajapati.
1 review
January 24, 2020
Great book for those who wants to understand "What happens on the Internet" "What most people do not know about Internet". Four things about this book :

1. Nice explanation of history on how hacking evolved.
2. Tells you a lot of stuff about computers and internet if you have no idea.
3. It also tells you how to be safe online.
4. Most of the links to websites mentioned closed a decade ago.

Thanks to Wallace Wang.
4 reviews
August 1, 2023
È un libro interessante che contiene molti programmi e tecniche che si usavano in passato e che quindi sono ormai obsolete (alcuni funzionano ancora o hanno subito cambiamenti). Purtroppo, chiunque si sia occupato di tradurre il libro ha commesso parecchi errori di vario tipo tra cui: errori di battitura, parole ripetute ecc.
Nonostante ciò, è comunque un bel libro se si è curiosi di sapere com'era la cultura hacking durante i suoi inizi.
13 reviews
July 31, 2019
The book requires the new edition, as the content is completely outdated at this moment. It is filled with links to websites closed a decade ago and advices like how to increase security in Internet Explorer 6.0 or disable the Messaging port in Windows XP. Some content, like descriptions of various scams, aged well though.
Profile Image for Martin Rose.
Author 8 books24 followers
July 21, 2013
Informative for those looking for an overview on a variety of subjects . . . though talk to those far more advanced with computer tech, software, telephone systems, internet, and they'd probably use this book as a coaster for a coffee mug instead of reading material. Don't think this will provide you with any level of mastery, but for a writer like myself, it suffices . . .
Profile Image for Jason Chaos.
24 reviews
Read
October 31, 2007
Okay I tried stealing this from borders but got caught shoplifting...WTF? nah, excellent book, tells you lots of stuff if you're a total idiot when it comes to computers...even refreshing for hacks and wannabe hacks.
Profile Image for stephanie cat.
35 reviews30 followers
January 30, 2008
An awesome book about hacking, cracking, and loads of other stuff! This book goes behind the scenes of the internet, down to all the stuff everyone won't tell you about. Wallace Wang delivers brilliant narrative, along with random stories. A great book for computer nerds like me!
35 reviews4 followers
October 14, 2008
5,000 foot view of computer hacking.

Though most of the techniques are outdated, the book introduces you to various network architectures (most defiantly the books actual purpose). The book comes with a disk of various hacking/security software (fun for the whole family).
Profile Image for Keith.
37 reviews11 followers
April 8, 2010
An overall informative and good read. This version is a combination of the first three editions after extreme censoring and editing but additionally brought up to date to continually expand on exploitations of the internet and the systems that run atop and behind it.
Profile Image for Warren.
Author 3 books6 followers
July 6, 2012
Interesting, but pretty basic. If you actually work in the Computer Security industry this is mostly popcorn with a few "I'd never heard of that website before" nuggets thrown in.

If you *aren't* a Computer Security type person it's pretty eye-opening, if not kind of dated.
Profile Image for cbbrnk.
9 reviews4 followers
September 8, 2007
A good book if you want to know a lot about the internet and how hackers can get you.
Profile Image for Thumper.
9 reviews
February 27, 2009
Unfortunately, I am unable to complete this book because it has run away from home. Pretty funny considering the title!!
Profile Image for Christian Barraza.
41 reviews
August 10, 2011
Nice history lesson on how hacking evolve. Learned new things about the latest trends. Very useful software found on the attached disk. Reccomend it.
Profile Image for Corey Brown.
2 reviews
May 21, 2014
amazing read. great way to see the mindset of real hacker s
Profile Image for Eric.
722 reviews6 followers
December 1, 2016
There were some good chapters and some completely unhelpful chapters in here. Overall, I liked it but it is dated, especially the chapters dealing with computer software.
Profile Image for Rob.
36 reviews1 follower
June 9, 2015
Either I've changed or the book hasn't changed enough since the first edition. Not recommended.
Displaying 1 - 18 of 18 reviews

Can't find what you're looking for?

Get help and learn more about the design.