If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths and never accepting at face value anything authorities say or do.
The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first three editions hugely successful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality , social engineering and lock picking , exploiting P2P file-sharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information . Wang also takes issue with the media for "hacking" the news and presenting the public with self-serving stories of questionable accuracy.
Inside, you’ll –How to manage and fight spam and spyware –How Trojan horse programs and rootkits work and how to defend against them –How hackers steal software and defeat copy-protection mechanisms –How to tell if your machine is being attacked and what you can do to protect it –Where the hackers are, how they probe a target and sneak into a computer , and what they do once they get inside –How corporations use hacker techniques to infect your computer and invade your privacy –How you can lock down your computer to protect your data and your personal information using free programs included on the book’s CD
If you’ve ever logged onto a website, conducted an online transaction, sent or received email, used a networked computer or even watched the evening news, you may have already been tricked, tracked, hacked, and manipulated. As the saying goes, just because you’re paranoid doesn’t mean they aren’t after you. And, as Wallace Wang reveals, they probably are.
The companion CD contains hundreds of megabytes of 100% FREE hacking and security related programs, like keyloggers, spyware stoppers, port blockers, IP scanners, Trojan horse detectors, and much, much more. CD compatible with Windows, Mac, and Linux.
1/27/10: Have finally waded past the preface on this one. Don't know how seriously I can take a book that proposes the relative nature of truth and then slaps you with an Ayn Rand quote to make the point. I. Loathe. Objectivism.
***
Um, I have better things to do than finish this. Like huff glue.
Great book for those who wants to understand "What happens on the Internet" "What most people do not know about Internet". Four things about this book :
1. Nice explanation of history on how hacking evolved. 2. Tells you a lot of stuff about computers and internet if you have no idea. 3. It also tells you how to be safe online. 4. Most of the links to websites mentioned closed a decade ago.
È un libro interessante che contiene molti programmi e tecniche che si usavano in passato e che quindi sono ormai obsolete (alcuni funzionano ancora o hanno subito cambiamenti). Purtroppo, chiunque si sia occupato di tradurre il libro ha commesso parecchi errori di vario tipo tra cui: errori di battitura, parole ripetute ecc. Nonostante ciò, è comunque un bel libro se si è curiosi di sapere com'era la cultura hacking durante i suoi inizi.
The book requires the new edition, as the content is completely outdated at this moment. It is filled with links to websites closed a decade ago and advices like how to increase security in Internet Explorer 6.0 or disable the Messaging port in Windows XP. Some content, like descriptions of various scams, aged well though.
Informative for those looking for an overview on a variety of subjects . . . though talk to those far more advanced with computer tech, software, telephone systems, internet, and they'd probably use this book as a coaster for a coffee mug instead of reading material. Don't think this will provide you with any level of mastery, but for a writer like myself, it suffices . . .
Okay I tried stealing this from borders but got caught shoplifting...WTF? nah, excellent book, tells you lots of stuff if you're a total idiot when it comes to computers...even refreshing for hacks and wannabe hacks.
An awesome book about hacking, cracking, and loads of other stuff! This book goes behind the scenes of the internet, down to all the stuff everyone won't tell you about. Wallace Wang delivers brilliant narrative, along with random stories. A great book for computer nerds like me!
Though most of the techniques are outdated, the book introduces you to various network architectures (most defiantly the books actual purpose). The book comes with a disk of various hacking/security software (fun for the whole family).
An overall informative and good read. This version is a combination of the first three editions after extreme censoring and editing but additionally brought up to date to continually expand on exploitations of the internet and the systems that run atop and behind it.
Interesting, but pretty basic. If you actually work in the Computer Security industry this is mostly popcorn with a few "I'd never heard of that website before" nuggets thrown in.
If you *aren't* a Computer Security type person it's pretty eye-opening, if not kind of dated.
There were some good chapters and some completely unhelpful chapters in here. Overall, I liked it but it is dated, especially the chapters dealing with computer software.