Books & Videos

Table of Contents

  1. The Early Hackers

    1. Chapter 1 The Hacker Mentality

      1. Questioning Authority
      2. Questioning Assumptions
      3. Developing Values
      4. The Three Stages of Hacking
    2. Chapter 2 The First Hackers: The Phone Phreakers

      1. A Short History of Phone Phreaking
      2. Phone Phreaking Urban Legends
      3. True and Verified Phone Phreaking Stories
      4. Phone Phreaking Tools and Techniques
    3. Chapter 3 Hacking People, Places, and Things

      1. Social Engineering: The Art of Hacking People
      2. Picking Locks
      3. Exploring Urban Areas
      4. Hacking the Airwaves
      5. Hacking History (or, Hemp for Victory)
  2. The Pc Pioneers

    1. Chapter 4 Ansi Bombs and Viruses

      1. The Making of an ANSI Bomb
      2. The Spread of Computer Viruses
      3. How Viruses Avoid Detection
      4. How Antivirus Programs Work
      5. Why People Write Viruses
      6. Finding virus-writing tutorials
      7. Virus-writing toolkits
      8. Virus Myths and Hoaxes
      9. Learning More About Viruses
      10. The Future Virus Threat
    2. Chapter 5 Trojan Horses and Worms

      1. The World of Trojan Horses
      2. Worms: Self-Replicating Viruses
      3. Stopping Worms and Trojan Horses
      4. Tracking the Threats
    3. Chapter 6 Warez (Software Piracy)

      1. Copying Copy-Protected Software
      2. Defeating Serial Numbers
      3. Defeating Product Activation
      4. Warez Websites
      5. Usenet Newsgroups: The New Piracy Breeding Ground
  3. The Internet Hackers

    1. Chapter 7 Where the Hackers Are

      1. Hacker Websites
      2. Hacker Magazines
      3. Hacker Usenet Newsgroups
      4. Finding Hackers on IRC
      5. Hacker Conventions
      6. Don't Panic: Hackers Are People, Too
    2. Chapter 8 Stalking a Computer

      1. Why Hackers Choose Their Targets
      2. Finding a Target
      3. The Next Step
    3. Chapter 9 Cracking Passwords

      1. Password Stealing
      2. Dictionary Attacks
      3. Brute-Force Password Attacks
      4. Passwords: The First Line of Defense
      5. Blocking Access with Biometrics
      6. Good Enough Security
    4. Chapter 10 Digging into a Computer with Rootkits

      1. How Operating Systems Work
      2. The Evolution of Rootkits
      3. Opening a Backdoor
      4. Sniffing for More Passwords
      5. Killing Rootkits
    5. Chapter 11 Censoring Information

      1. Censoring the Internet
      2. The Internet Censors
      3. Censorship Begins at Home: Parental Control Software
      4. Avoiding Internet Censorship
      5. Reading Banned Books Online
      6. Is Anyone Censoring the Censors?
    6. Chapter 12 The Filesharing Networks

      1. A Short History of Internet FileSharing
      2. How FileSharing Works
      3. Sharing Large Files
      4. The Problem with Filesharing
  4. The Real World Hackers

    1. Chapter 13 The Internet Con Artists

      1. Charity Scams
      2. The Area Code Scam
      3. The Nigerian Scam
      4. Work-at-Home Businesses
      5. Pyramid Schemes
      6. The Lonely Hearts Scam
      7. Internet-Specific Con Games
      8. Online Auction Frauds
      9. Credit Card Fraud
      10. Protecting Yourself
      11. The Recovery Room Scam
    2. Chapter 14 Finding People on the Internet

      1. Who Are the Stalkers?
      2. Stalking on the Internet
      3. Finding Personal Information on the Internet
      4. Stalking Celebrities
      5. Protecting Yourself
    3. Chapter 15 Propaganda as News and Entertainment

      1. The News as Reality TV
      2. Corporate Influence on the News
      3. The News Only Reports the Facts—And Anything Else Anyone Will Tell Them
      4. The News as History
      5. Fear, Future, Fun, and Fakes: The Weekly World News as a Role Model for the News Media
      6. Using Satire to Report on Reality
      7. Blogs as News Sources
    4. Chapter 16 Hacktivism: Online Activism

      1. Virtual Sit-ins and Blockades
      2. Email Bombing
      3. Web Hacking and Computer Break-ins
      4. Computer Viruses and Worms
      5. Activist Video Games
      6. Google Bombing
      7. Becoming a Hacktivist
    5. Chapter 17 Hate Groups and Terrorists on the Internet

      1. Hate Groups on the Internet
      2. Racist Video Games
      3. Terrorism: The Communist Threat of the Twenty-first Century
      4. The Future of Terrorism
  5. The Future—Hacking for Profit

    1. Chapter 18 Identity Theft and Spam

      1. Understanding Identity Theft
      2. Spam: Junk Mail on the Internet
      3. Why Companies Spam and How They Do It
      4. Protecting Yourself from Spammers
      5. How Spam Filters Work
      6. Stopping Spam
      7. Possible future solutions to spam
      8. A PostScript: Spam as Propaganda
    2. Chapter 19 Banner Ads, Pop-Up Ads, and Search Engine Spamming

      1. Banner Ads and Click Fraud
      2. Pop-Up/Pop-Under Ads
      3. Watching Out for Web Bugs
      4. Spamdexing: Search Engine Spamming
    3. Chapter 20 Adware and Spyware

      1. What Spyware Can Do
      2. Why Companies Advertise Through Spyware
      3. How Spyware Infects a Computer
      4. Where Spyware Hides
      5. Eliminating Spyware
  6. Protecting Your Computer and Yourself

    1. Chapter 21 Computing on a Shoestring: Getting Stuff for (Almost) Free

      1. Internet Comparison Shopping
      2. Buying a Refurbished Computer
      3. Save on Printer Supplies
      4. Free (and Almost-Free) Software
      5. Free Internet Access
      6. Free Email Accounts
      7. Free Web and Blog Space
      8. The Best Things in Life Are Free
    2. Chapter 22 Computer Forensics: The Art of Deleting and Retrieving Data

      1. Recovering Deleted Data
      2. File Shredders
      3. Storing Deleted Data
      4. Computer Forensics Tools
      5. Commercial Forensics Tools
      6. Protecting Yourself
    3. Chapter 23 Locking Down Your Computer

      1. Protecting Your Computer (and Its Parts)
      2. Protecting Your Data
      3. What's Next?
    4. Appendix Epilogue

    5. Appendix What's on the Steal This Computer Book 4.0 CD

      1. Uncompressing, Unzipping, Unstuffing, and So On
      2. Chapter 1—The Hacker Mentality
      3. Chapter 2—The First Hackers: The Phone Phreakers
      4. Chapter 3—Hacking People, Places, and Things
      5. Chapter 4—ANSI Bombs and Viruses
      6. Chapter 5—Trojan Horses and Worms
      7. Chapter 6—Warez (Software Piracy)
      8. Chapter 7—Where the Hackers Are
      9. Chapter 8—Stalking a Computer
      10. Chapter 9—Cracking Passwords
      11. Chapter 10—Digging into a Computer with Rootkits
      12. Chapter 11—Censoring Information
      13. Chapter 12—The Filesharing Networks
      14. Chapter 13—The Internet Con Artists
      15. Chapter 14—Finding People on the Internet
      16. Chapter 15—Propaganda as News and Entertainment
      17. Chapter 16—Hacktivism: Online Activism
      18. Chapter 17—Hate Groups and Terrorists on the Internet
      19. Chapter 18—Identity Theft and Spam
      20. Chapter 19—Banner Ads, Pop-up Ads, and Search Engine Spamming
      21. Chapter 20—Adware and Spyware
      22. Chapter 21—Computing on a Shoestring: Getting Stuff for (Almost) Free
      23. Chapter 22—Computer Forensics: The Art of Deleting and Retrieving Data
      24. Chapter 23—Locking Down Your Computer
  1. Updates

  2. Appendix Cd License Agreement

    1. No Warranty