Book description
This offbeat, non-technical book examines what hackers do, how they do it, and how readers can protect themselves. Informative, irreverent, and entertaining, the completely revised fourth edition of Steal This Computer Book contains new chapters discussing the hacker mentality, lock picking, exploiting P2P file sharing networks, and how people manipulate search engines and pop-up ads. Includes a CD with hundreds of megabytes of hacking and security-related programs that tie-in to each chapter in the book.
Table of contents
- Praise for Steal This Computer Book
- Dedication
- Acknowledgments
- Introduction
-
I. The Early Hackers
- 1. The Hacker Mentality
- 2. The First Hackers: The Phone Phreakers
- 3. Hacking People, Places, and Things
-
II. The Pc Pioneers
- 4. Ansi Bombs and Viruses
- 5. Trojan Horses and Worms
- 6. Warez (Software Piracy)
-
III. The Internet Hackers
- 7. Where the Hackers Are
- 8. Stalking a Computer
- 9. Cracking Passwords
- 10. Digging into a Computer with Rootkits
- 11. Censoring Information
- 12. The Filesharing Networks
-
IV. The Real World Hackers
- 13. The Internet Con Artists
-
14. Finding People on the Internet
- Who Are the Stalkers?
- Stalking on the Internet
- Finding Personal Information on the Internet
- Stalking Celebrities
- Protecting Yourself
- 15. Propaganda as News and Entertainment
- 16. Hacktivism: Online Activism
- 17. Hate Groups and Terrorists on the Internet
-
V. The Future—Hacking for Profit
- 18. Identity Theft and Spam
- 19. Banner Ads, Pop-Up Ads, and Search Engine Spamming
- 20. Adware and Spyware
-
VI. Protecting Your Computer and Yourself
- 21. Computing on a Shoestring: Getting Stuff for (Almost) Free
- 22. Computer Forensics: The Art of Deleting and Retrieving Data
- 23. Locking Down Your Computer
- A. Epilogue
-
B. What’s on the Steal This Computer Book 4.0 CD
- Uncompressing, Unzipping, Unstuffing, and So On
- Chapter 1—The Hacker Mentality
- Chapter 2—The First Hackers: The Phone Phreakers
- Chapter 3—Hacking People, Places, and Things
- Chapter 4—ANSI Bombs and Viruses
- Chapter 5—Trojan Horses and Worms
- Chapter 6—Warez (Software Piracy)
- Chapter 7—Where the Hackers Are
- Chapter 8—Stalking a Computer
- Chapter 9—Cracking Passwords
- Chapter 10—Digging into a Computer with Rootkits
- Chapter 11—Censoring Information
- Chapter 12—The Filesharing Networks
- Chapter 13—The Internet Con Artists
- Chapter 14—Finding People on the Internet
- Chapter 15—Propaganda as News and Entertainment
- Chapter 16—Hacktivism: Online Activism
- Chapter 17—Hate Groups and Terrorists on the Internet
- Chapter 18—Identity Theft and Spam
- Chapter 19—Banner Ads, Pop-up Ads, and Search Engine Spamming
- Chapter 20—Adware and Spyware
- Chapter 21—Computing on a Shoestring: Getting Stuff for (Almost) Free
- Chapter 22—Computer Forensics: The Art of Deleting and Retrieving Data
- Chapter 23—Locking Down Your Computer
- About the Author
- Updates
- C. Cd License Agreement
- Copyright
Product information
- Title: Steal This Computer Book 4.0, 4th Edition
- Author(s):
- Release date: May 2006
- Publisher(s): No Starch Press
- ISBN: 9781593271053
You might also like
book
Peace and Justice
Peace and Justice is a part of the series, Imagine a New South Asia', presented by …
article
Reinventing the Organization for GenAI and LLMs
Previous technology breakthroughs did not upend organizational structure, but generative AI and LLMs will. We now …
audiobook
The Year in Tech, 2025
<B>A year of HBR's essential thinking on tech—all in one place.</B><br/><br/><br/><br/>Generative AI, biometrics, spatial computing, electric …
article
Splitting Strings on Any of Multiple Delimiters
Build your knowledge of Python with this Shortcuts collection. Focusing on common problems involving text manipulation, …