Steal This Computer Book 4.0 und über 1,5 Millionen weitere Bücher verfügbar für Amazon Kindle. Erfahren Sie mehr

Jetzt eintauschen
und EUR 0,10 Gutschein erhalten
Eintausch
Möchten Sie verkaufen? Hier verkaufen
Der Artikel ist in folgender Variante leider nicht verfügbar
Keine Abbildung vorhanden für
Farbe:
Keine Abbildung vorhanden

 
Beginnen Sie mit dem Lesen von Steal This Computer Book 4.0 auf Ihrem Kindle in weniger als einer Minute.

Sie haben keinen Kindle? Hier kaufen oder eine gratis Kindle Lese-App herunterladen.

Steal This Computer Book 4.0: What They Won't Tell You About The Internet [Englisch] [Taschenbuch]

Wallace Wang
2.8 von 5 Sternen  Alle Rezensionen anzeigen (37 Kundenrezensionen)

Erhältlich bei diesen Anbietern.


Weitere Ausgaben

Amazon-Preis Neu ab Gebraucht ab
Kindle Edition EUR 13,04  
Taschenbuch --  
Taschenbuch, 1. Mai 2006 --  

Kurzbeschreibung

1. Mai 2006
If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths, and never accepting at face value anything authorities say or do. The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first three editions hugely succesful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality, social engineeering and look picking, exploiting P2P filesharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information. Wang also takes issue with the media for "hacking" the news and presenting the public with self-serving of questionable accuracy. If you´ve ever logged onto a website, conducted an online transaction, sent or received email, used a networked computer or even watched the evening news, you may have already been tricked, tracked, hacked, and manipulated. As the saying goes, just because you´r paranoid doesn´t mean they aren´t after you. Ans, as Wallace Wang reveals, they probably are. The companion CD contains hundreds of megabytes of 100% FREE hacking and security-related programs, like keyloggers, spyware stoppers, port blockers, IP scanners, Trojan horse detectors, and much, much more. CD compatible with Windows, Mac, and Linux.

Produktinformation

  • Taschenbuch: 361 Seiten
  • Verlag: No Starch Press; Auflage: 4., Aufl. (1. Mai 2006)
  • Sprache: Englisch
  • ISBN-10: 1593271050
  • ISBN-13: 978-1593271053
  • Größe und/oder Gewicht: 2,5 x 17,6 x 22,4 cm
  • Durchschnittliche Kundenbewertung: 2.8 von 5 Sternen  Alle Rezensionen anzeigen (37 Kundenrezensionen)
  • Amazon Bestseller-Rang: Nr. 17.271 in Fremdsprachige Bücher (Siehe Top 100 in Fremdsprachige Bücher)
  • Komplettes Inhaltsverzeichnis ansehen

Mehr über den Autor

Entdecken Sie Bücher, lesen Sie über Autoren und mehr

Produktbeschreibungen

Amazon.de

If ever a book on cyberculture wore a fedora and trench coat and leaned against a lamppost on a foggy street, this is the one. It is an unabashed look at the dark side of the Net--the stuff many other books gloss over. It's hard-edged, wisecracking, and often quite cynical as it pours over the reality of online scams, illegal activities, and simple annoyances.

Wang's stated goal is to open the reader's eyes about what's really there. He shows what's being done, how it's being done, and how to avoid problems or even strike back. He begins with a chapter about the news media, and his message is that no source is to be trusted completely. He examines issues important to Internet users: the cost of getting computerized (with tips on how to find the real bargains), who is using the Internet as a source of hate information, and how your privacy can be invaded and protected.

He shows you the secrets of malicious hackers and others and how some of them attack computer systems without the ethical mindset typical of the original, idealistic hackers. Wang shows you how you can set up your defenses against such an onslaught, discussing how to protect yourself and your kids from online stalkers and how online con games work.

Wang never claims that the Internet is the electronic den of darkness that the pop media make it out to be. But he makes it clear that something this big has its lowlights--it's own "net noir." His messages are "know your enemy" and "be careful who you trust," an ideology verified by the examples he provides. --Elizabeth Lewis -- Dieser Text bezieht sich auf eine vergriffene oder nicht verfügbare Ausgabe dieses Titels.

Synopsis

National bestseller with over 175,000 copies sold! If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths, and never accepting at face value anything authorities say or do. The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first three editions hugely successful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality, social engineering and lock picking, exploiting P2P file-sharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information. Wang also takes issue with the media for "hacking" the news and presenting the public with self-serving stories of questionable accuracy.Inside, you'll discover: How to manage and fight spam and spyware How Trojan horse programs and rootkits work, and how to defend against them How hackers steal software and defeat copy-protection mechanisms How to tell if your machine is being attacked and what you can do to protect it Where the hackers are, how they probe a target and sneak into a computer, and what they do once they get inside How corporations use hacker techniques to infect your computer and invade your privacy How you can lock down your computer to protect your data and your personal information using free programs included on the book's CD If you ve ever logged onto a website, conducted an online transaction, sent or received email, used a networked computer, or even watched the evening news, you may have already been tricked, tracked, hacked, and manipulated.

As the saying goes, just because you're paranoid doesn't mean they aren't after you. And, as Wallace Wang reveals, they probably are. The companion CD contains hundreds of megabytes of 100% FREE hacking and security-related programs, like keyloggers, spyware stoppers, port blockers, IP scanners, Trojan horse detectors, and much, much more.CD compatible with Windows, Mac, and Linux.


In diesem Buch (Mehr dazu)
Einleitungssatz
Hackers are no more criminals than lawyers, politicians, or TV evangelists are. Lesen Sie die erste Seite
Mehr entdecken
Wortanzeiger
Ausgewählte Seiten ansehen
Buchdeckel | Copyright | Inhaltsverzeichnis | Auszug | Stichwortverzeichnis | Rückseite
Hier reinlesen und suchen:

Kundenrezensionen

Die hilfreichsten Kundenrezensionen
3 von 3 Kunden fanden die folgende Rezension hilfreich
Format:Taschenbuch
Wally-boy really did it with this book. I bought it (and blew like, a huge load of money for such a poorly, overstated book that is hardly worth the paper it's written on)...I expected at least some type of introduction to something truly elite...However, if you're one of those warez d00dz (and you know who you are...crackers (who loudly call themselves supa leet hax0rs) who are named DrDeath, FinalFury, NukeTheWhales and other ridiculously unintimidating names, this book is for you.
However, for you other, half-normal (and those possessing at least half of a slightly functional brain)...Don't waste your time. This book is downtrodden with cynical humor (not that I mind, this was one of the only enjoyable aspects of the book)...Wang makes an attempt (and misses by about twelve feet) to introduce the reader/bored hacker to the (ooooo...this is the cue for spooky music) the...(GASP!) HACKER UNDERGROUND! What a creeping horror...
The main interests in this book surround political problems and simple explanations of what are actually interesting concepts. Wang, with a strained effort, I'm sure, managed to dumb-down, hash up, and generally take the reader for having the IQ of a brick (or a football jock, whichever you prefer). Concepts covered are encryption (this is somewhat worthwhile, as it explains PGP and Blowfish fairly well as well as stynography (only spelled right) which is hiding text and messages in graphics)
This is more of the book for people who WANT to be hackers, rather than being a hacker.
Lesen Sie weiter... ›
War diese Rezension für Sie hilfreich?
2 von 2 Kunden fanden die folgende Rezension hilfreich
1.0 von 5 Sternen DONT BUY THIS 23. Juni 2000
Von "gootch"
Format:Taschenbuch
I do NOT reccomend this book. I ordered it, and I thought that maybe something useful would be in it... all this book does is explain "WHAT" hackers do, not "HOW" they do it... if you are looking for a HOW book, i reccomend Maximum Linux Security... dont hesitate to buy that one, you wont put it down! (until the last few chapters where it kinda starts getting repetitious) but it is a GREAT how book if you ask me.
War diese Rezension für Sie hilfreich?
1 von 1 Kunden fanden die folgende Rezension hilfreich
2.0 von 5 Sternen Doormatt 4. Mai 2000
Format:Taschenbuch
From the outside the book might appear to contain an abundance of useful information, while in fact this is merely a disguise. In actuality it focuses too much effort on redundancy of useless information with the wrong intension. The book is great if you want to know locations of popular search engines or the local news in Third World Countries that no one really thinks exist. Some ideas were actually present, but were not presented very well and are extreamely incomplete. "Steal This Computer Book" does have a lot of potential and I hope that Wallace Wang does release newer editions of this book as promised. I am curious to see where he takes the book in the future, but for the time being, in my opinion, it needs a new cover. -dM
War diese Rezension für Sie hilfreich?
1 von 1 Kunden fanden die folgende Rezension hilfreich
Format:Taschenbuch
This looks like a overview done by some mainstream news show reporter who is mostly clueless. Ex. under how to hack Linux is to download/install a copy and practice using it--end of lesson. Well duh! Chapter on viruses talks only about having a virus checker. Oooh, big secret. They killed a tree for this?
The chapter titles promise, but the material just doesn't deliver except for some links that are probably out of date. Whether you think this will tell you how to hack or whether you want to learn about hacking and secuity matters to protect your system, you will be sorely disappointed. Computer neophytes should save money and buy a used copy to put on their bookshelves to impress their equally neophyte friends.
War diese Rezension für Sie hilfreich?
Von Ein Kunde
Format:Taschenbuch
Overall this is a good book. The first part is sorta stupid, though. It talks mainly about how not to only listen to one person but to get information from multiple sources. It could be summed up in about a page.
Chapter 4 talks about buying computers and software. It helped me out by giving me some tricks to do next time I buy a computer.
Chapter 5 tells you about keeping your files secure with encryption. It tells you about some different types of encryption algorithms and how to write your own encryption programs. It also shows you how to play some dirty tricks. It talked about using anonymous remailers to send anonymous email and talked about just how anonymous they were. It even told you how to surf the web anonymously so that people couldn't receive information about your computer, browser, and more.
Chapter 6 told about phone phreaking history such as captian crunch. Wallace then goes on by telling you possibly things that could've happened but didn't. When telling these stories he tries to make himself sound like a phreaker but he didn't even do anything. Then, he tells your some really obvious stuff like "To start phone phreaking, you need access to a telephone." and "phreaking from your own phone will let the telephone company trace it to your house." I don't know if he couldn't think of anything else or he thinks you are really stupid. After that, he talks about phreaking color boxes and then goes on to voice mail hacking. Then, he talks about cellular phone fraud and tv satellite descrambling.
Chapter 7 talks about defeating windoz 3.1/95/98 screen saver passwords which if you ever tried you should've done it on the first or second try.
Lesen Sie weiter... ›
War diese Rezension für Sie hilfreich?
Möchten Sie weitere Rezensionen zu diesem Artikel anzeigen?
Waren diese Rezensionen hilfreich?   Wir wollen von Ihnen hören.
Die neuesten Kundenrezensionen
1.0 von 5 Sternen Lame
Don't bother stealing this book, it won't be worth the trouble of sneaking it out the door.
Most entry level computer books at least have a bit of humor or some interesting... Lesen Sie weiter...
Am 14. April 2000 veröffentlicht
5.0 von 5 Sternen A real mind buster !
I had seven days of my live. This book showed me stuff I didn't know excisted. This book opened a whole new world on the internet. INCREDIBLE ! Lesen Sie weiter...
Veröffentlicht am 25. Januar 2000 von Peter Hanoussen
1.0 von 5 Sternen Do not waste your money
This book is (1) dated, (2) very shallow, (3) attempts to be funny by using anti-government witticisms. Lesen Sie weiter...
Am 19. Januar 2000 veröffentlicht
3.0 von 5 Sternen Good general understanding but not lots of depth
This book wasn't to bad as some make it out to be but not as good as others act like it is. I gives a pretty decent general understanding on a wide variety of things: encryption,... Lesen Sie weiter...
Veröffentlicht am 28. November 1999 von sIN
4.0 von 5 Sternen Non-biased approach for beginners...
I found this book to be pretty easy to get into, with a lot of things I didn't know about (I'm a newbie). Lesen Sie weiter...
Am 25. August 1999 veröffentlicht
1.0 von 5 Sternen Fact checking needed
The book needed more fact checking, as there were several inaccuracies when discussing aspects of the computer underground. Lacking in details of true underground information. Lesen Sie weiter...
Am 23. August 1999 veröffentlicht
3.0 von 5 Sternen Good for newbies, but not for the well-seasoned.
"Steal This Computer Book" is a good introduction to the existence of the dark side of computing, but there's not a whole lot here for the advanced user. Lesen Sie weiter...
Am 26. Juli 1999 veröffentlicht
3.0 von 5 Sternen Good, but needs more 'geek' detail
I found this book to be worth my money, and a little more. It explained basic security on the net and takes a nice cynical look at the gov. on the net. Lesen Sie weiter...
Am 21. Juli 1999 veröffentlicht
2.0 von 5 Sternen Not Bad for newbies
If you're a newbies in hacking, this book cover almost everything but it's not in detail.
Am 20. Juli 1999 veröffentlicht
Kundenrezensionen suchen
Nur in den Rezensionen zu diesem Produkt suchen

Kunden diskutieren

Das Forum zu diesem Produkt
Diskussion Antworten Jüngster Beitrag
Noch keine Diskussionen

Fragen stellen, Meinungen austauschen, Einblicke gewinnen
Neue Diskussion starten
Thema:
Erster Beitrag:
Eingabe des Log-ins
 

Kundendiskussionen durchsuchen
Alle Amazon-Diskussionen durchsuchen
   


Ähnliche Artikel finden


Ihr Kommentar