Steal This Computer Book 4.0: What They Won't Tell You About the Internet

Front Cover
No Starch Press, May 6, 2006 - Computers - 384 pages
13 Reviews
Reviews aren't verified, but Google checks for and removes fake content when it's identified
If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths and never accepting at face value anything authorities say or do.

The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first three editions hugely successful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality, social engineering and lock picking, exploiting P2P file-sharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information. Wang also takes issue with the media for "hacking" the news and presenting the public with self-serving stories of questionable accuracy.

Inside, you’ll discover:
–How to manage and fight spam and spyware
–How Trojan horse programs and rootkits work and how to defend against them
–How hackers steal software and defeat copy-protection mechanisms
–How to tell if your machine is being attacked and what you can do to protect it
–Where the hackers are, how they probe a target and sneak into a computer, and what they do once they get inside
–How corporations use hacker techniques to infect your computer and invade your privacy
–How you can lock down your computer to protect your data and your personal information using free programs included on the book’s CD

If you’ve ever logged onto a website, conducted an online transaction, sent or received email, used a networked computer or even watched the evening news, you may have already been tricked, tracked, hacked, and manipulated. As the saying goes, just because you’re paranoid doesn’t mean they aren’t after you. And, as Wallace Wang reveals, they probably are.

The companion CD contains hundreds of megabytes of 100% FREE hacking and security related programs, like keyloggers, spyware stoppers, port blockers, IP scanners, Trojan horse detectors, and much, much more. CD compatible with Windows, Mac, and Linux.

What people are saying - Write a review

User ratings

5 stars
4 stars
3 stars
2 stars
1 star

Reviews aren't verified, but Google checks for and removes fake content when it's identified

LibraryThing Review

User Review  - KidSisyphus - LibraryThing

1/27/10: Have finally waded past the preface on this one. Don't know how seriously I can take a book that proposes the relative nature of truth and then slaps you with an Ayn Rand quote to make the ... Read full review

LibraryThing Review

User Review  - phlll - LibraryThing

Interesting, but pretty basic. If you actually work in the Computer Security industry this is mostly popcorn with a few "I'd never heard of that website before" nuggets thrown in. If you *aren't* a Computer Security type person it's pretty eye-opening, if not kind of dated. Read full review


Phone Phreaking Urban Legends 14
The Art of Hacking People 31
The Making of an ANSI Bomb 45
Who Are the Stalkers? 189
Stalking Celebrities 197
The News Only Reports the FactsAnd Anything Else
Using Satire to Report on Reality 216
Virtual Sitins and Blockades 222
Web Hacking and Computer Breakins 228

Why People Write Viruses 54
The Future Virus Threat 62
The World of Trojan Horses 63
SelfReplicating Viruses 69
Defeating Serial Numbers 76
Hacker Websites 85
Hacker Usenet Newsgroups 91 92
Why Hackers Choose Their Targets 97
Chapter 1
The Next Step 113
Chapter 2
Dictionary Attacks 120
The Evolution of Rootkits 126
Opening a Backdoor 132
Censoring the Internet 137
The Internet Censors 144
Reading Banned Books Online 155
Sharing Large Files 164
Google Bombing 235
Racist Video Games 241
Watching Out for Web Bugs 278
How Spyware Infects a Computer 291
Eliminating Spyware 297
Free Internet Access 309
File Shredders 315
Protecting Yourself 321
Protecting Your Computer and Its Parts 323
Uncompressing Unzipping Unstuffing and So On 335
Chapter 21

Other editions - View all

Common terms and phrases

About the author (2006)

Wallace Wang is the author of several best-selling computer books including of the Steal This Computer Book series, Steal This File Sharing Book, The Book of Nero 7, and Visual Basic 2005 Express: Now Playing (all No Starch Press). He is also a successful standup comic who has appeared on A&E’s "Evening at the Improv" and appears regularly at the Riviera Comedy Club in Las Vegas.

Bibliographic information