Steal This Computer Book 4.0: What They Won't Tell You about the Internet, 4/e
暫譯: 偷這本電腦書 4.0:他們不會告訴你的網路真相,第四版

Wallace Wang

  • 出版商: No Starch Press
  • 出版日期: 2006-05-06
  • 售價: $1,270
  • 貴賓價: 9.5$1,207
  • 語言: 英文
  • 頁數: 384
  • 裝訂: Paperback
  • ISBN: 1593271050
  • ISBN-13: 9781593271053
  • 已過版

買這商品的人也買了...

商品描述

Description 

National bestseller with over 175,000 copies sold!

Now completely revised and updated

If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths and never accepting at face value anything authorities say or do.

The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first three editions hugely successful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality, social engineering and lock picking, exploiting P2P file-sharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information. Wang also takes issue with the media for hacking?the news and presenting the public with self-serving stories of questionable accuracy. Inside, youll discover:

?How to manage and fight spam and spyware
?How Trojan horse programs and rootkits work and how to defend against them
?How hackers steal software and defeat copy-protection mechanisms
?How to tell if your machine is being attacked and what you can do to protect it
?Where the hackers are, how they probe a target and sneak into a computer, and what they do once they get inside
?How corporations use hacker techniques to infect your computer and invade your privacy
?How you can lock down your computer to protect your data and your personal information using free programs included on the books CD

If youve ever logged onto a website, conducted an online transaction, sent or received email, used a networked computer or even watched the evening news, you may have already been tricked, tracked, hacked, and manipulated. As the saying goes, just because youre paranoid doesnt mean they arent after you. And, as Wallace Wang reveals, they probably are.

The companion CD contains hundreds of megabytes of 100 % FREE hacking and security related programs, like keyloggers, spyware stoppers, port blockers, IP scanners, Trojan horse detectors, and much, much more. CD compatible with Windows, Mac, and Linux.

 

Table of contents

Part 1: The Early Hackers
Chapter 1: The Hacker Mentality
Chapter 2: The First Hackers: The Phone Phreakers
Chapter 3: Hacking People, Places, and Things

Part 2: The PC Pioneers
Chapter 4: Ansi Bombs and Viruses
Chapter 5: Trojan Horses and Worms
Chapter 6: Warez (Software Piracy)

Part 3: The Internet Hackers
Chapter 7: Where the Hackers Are
Chapter 8: Stalking a Computer
Chapter 9: Cracking Passwords
Chapter 10: Digging Into a Computer with Rootkits
Chapter 11: Censoring Information
Chapter 12: The Filesharing Networks

Part 4: The Real World Hackers
Chapter 13: The Internet Con Artists
Chapter 14: Finding People on the Internet
Chapter 15: Propaganda as News and Entertainment
Chapter 16: Hacktivism: Online Activism
Chapter 17: Hate Groups and Terrorists on the Internet

Part 5: The FutureHacking for Profit
Chapter 18: Identity Theft and Spam
Chapter 19: Banner Ads, Pop-up Ads, and Search Engine Spamming
Chapter 20: Adware and Spyware

Part 6: Protecting Your Computer and Yourself
Chapter 21: Computing on a Shoestring: Getting Stuff for (Almost) Free
Chapter 22: Computer Forensics: The Art of Deleting and Retrieving Data
Chapter 23: Locking Down Your Computer

 

商品描述(中文翻譯)

**描述**

全國暢銷書,銷售超過175,000本!

現在完全修訂和更新

如果你認為駭客只是那些在地下室裡彎著腰對著電腦的惡作劇者,那就再想想吧。正如資深作者華萊士·王(Wallace Wang)所解釋的,駭客也可以意味著質疑現狀,尋找自己的真相,並且永遠不接受當局所說或所做的任何事情。

這本非傳統的非技術性書籍的完全修訂第四版,探討了駭客的行為、他們如何做到這些,以及你如何保護自己。以同樣的資訊性、無禮和娛樂風格撰寫,使前三版獲得巨大成功,《竊取這本電腦書 4.0》將擴展你的思維並引起你的注意。新章節討論了駭客心態、社會工程學和撬鎖、利用P2P檔案共享網絡,以及人們如何操縱搜索引擎和彈出廣告以獲取和使用個人信息。王還對媒體進行了批評,指責他們駭客化新聞,並向公眾呈現自利且準確性存疑的故事。在書中,你將發現:

- 如何管理和對抗垃圾郵件和間諜軟體
- 特洛伊木馬程序和根套件如何運作以及如何防禦它們
- 駭客如何竊取軟體並擊敗複製保護機制
- 如何判斷你的機器是否受到攻擊以及你可以做什麼來保護它
- 駭客在哪裡,他們如何探測目標並潛入電腦,以及他們進入後會做什麼
- 企業如何利用駭客技術來感染你的電腦並侵犯你的隱私
- 如何使用書中CD中包含的免費程序來鎖定你的電腦,以保護你的數據和個人信息

如果你曾經登錄過網站、進行過在線交易、發送或接收過電子郵件、使用過網絡電腦,甚至觀看過晚間新聞,你可能已經被欺騙、追蹤、駭客入侵和操縱。正如諺語所說,僅僅因為你偏執並不意味著他們不會追著你。而且,正如華萊士·王所揭示的,他們可能確實在追著你。

隨書附贈的CD包含數百MB的100%免費駭客和安全相關程序,如鍵盤記錄器、間諜軟體攔截器、端口阻擋器、IP掃描器、特洛伊木馬檢測器等等。CD與Windows、Mac和Linux兼容。

**目錄**

第一部分:早期駭客
第1章:駭客心態
第2章:第一批駭客:電話駭客
第3章:駭客人、地點和事物

第二部分:PC先驅
第4章:Ansi炸彈和病毒
第5章:特洛伊木馬和蠕蟲
第6章:Warez(軟體盜版)

第三部分:互聯網駭客
第7章:駭客在哪裡
第8章:跟蹤一台電腦
第9章:破解密碼
第10章:使用根套件深入電腦
第11章:審查信息
第12章:檔案共享網絡

第四部分:現實世界的駭客
第13章:互聯網詐騙者
第14章:在互聯網上尋找人
第15章:作為新聞和娛樂的宣傳
第16章:駭客行動:在線行動主義
第17章:互聯網上的仇恨團體和恐怖分子

第五部分:未來——為利而駭客
第18章:身份盜竊和垃圾郵件
第19章:橫幅廣告、彈出廣告和搜索引擎垃圾郵件
第20章:廣告軟體和間諜軟體

第六部分:保護你的電腦和自己
第21章:以低成本計算:獲取(幾乎)免費的東西
第22章:電腦取證:刪除和檢索數據的藝術
第23章:鎖定你的電腦