Chapter 18. Identity Theft and Spam

technology writer

The rise of computer crime and armed robbery has not eliminated the lure of caged cash.

JAMES CHILES

Not everyone who can manipulate a computer is a hacker, and not every hacker is a computer expert. Hacking is an attitude of exploration. However, real hackers can often use their computer skills and knowledge to take advantage of other people. When hackers want to use their computer skills to steal from other people, they usually engage in some form of identity theft. When hackers want to use their computer skills to bombard people with advertisements for legitimate (and not-so-legitimate) products, they use spam.

Whatever the motivation may be, the end result of identity theft and spam is the ...

Get Steal This Computer Book 4.0, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.