Steal This Computer Book 4.0, 4th Edition

Book description

This offbeat, non-technical book examines what hackers do, how they do it, and how readers can protect themselves. Informative, irreverent, and entertaining, the completely revised fourth edition of Steal This Computer Book contains new chapters discussing the hacker mentality, lock picking, exploiting P2P file sharing networks, and how people manipulate search engines and pop-up ads. Includes a CD with hundreds of megabytes of hacking and security-related programs that tie-in to each chapter in the book.

Table of contents

  1. Praise for Steal This Computer Book
  2. Dedication
  3. Acknowledgments
  4. Introduction
    1. Your Own Revolution
      1. Communication’s the thing
      2. Truth is nothing but a point of view
    2. What’s in This Book
  5. I. The Early Hackers
    1. 1. The Hacker Mentality
      1. Questioning Authority
      2. Questioning Assumptions
      3. Developing Values
      4. The Three Stages of Hacking
    2. 2. The First Hackers: The Phone Phreakers
      1. A Short History of Phone Phreaking
      2. Phone Phreaking Urban Legends
        1. The toilet paper crisis in Los Angeles
        2. The Santa Barbara nuclear hoax
        3. The president’s secret
      3. True and Verified Phone Phreaking Stories
        1. Making free phone calls, courtesy of the Israeli Army
        2. Phone phreaking for escorts in Las Vegas
      4. Phone Phreaking Tools and Techniques
        1. Shoulder surfing
        2. Phone phreaking with color boxes
          1. Blue box
          2. Red box
          3. Green box
          4. Black box
          5. Silver box
        3. Phone phreaking with color box programs
        4. Phreaking with war dialers and prank programs
        5. Phreaking cellular phones
        6. Hacking voice mailboxes
        7. Hacking VoIP
    3. 3. Hacking People, Places, and Things
      1. Social Engineering: The Art of Hacking People
        1. Studying a target
        2. Gaining familiarity
        3. The keys to social engineering
      2. Picking Locks
        1. The theory of lockpicking
        2. The tools and techniques
      3. Exploring Urban Areas
      4. Hacking the Airwaves
      5. Hacking History (or, Hemp for Victory)
        1. The Japanese textbook controversy
        2. Hiding history to protect the present
        3. Watching movies for fun and propaganda
  6. II. The Pc Pioneers
    1. 4. Ansi Bombs and Viruses
      1. The Making of an ANSI Bomb
        1. How an ANSI bomb works
        2. Planting an ANSI bomb
      2. The Spread of Computer Viruses
        1. Spreading a file-infecting virus
          1. Parasitic program infectors
          2. Overwriting file infectors
        2. Spreading a boot-sector virus
        3. Spreading a multipartite virus
        4. Spreading a macro virus
      3. How Viruses Avoid Detection
        1. Infection methods
        2. Stealth
        3. Polymorphism
        4. Retaliators
      4. How Antivirus Programs Work
        1. Comparing antivirus programs
        2. Choosing an antivirus program
      5. Why People Write Viruses
        1. For fun
        2. For notoriety
      6. Finding virus-writing tutorials
      7. Virus-writing toolkits
      8. Virus Myths and Hoaxes
        1. The mobile phone virus hoax
        2. The nuclear war hoax
        3. The bait-and-switch virus hoax
        4. The publicity-seeking virus hoax
      9. Learning More About Viruses
      10. The Future Virus Threat
    2. 5. Trojan Horses and Worms
      1. The World of Trojan Horses
        1. Taunting the victim
        2. Attacking the victim’s pocketbook
        3. The coming of the RATs (remote-access Trojans)
          1. Sneaking a RAT onto a computer
          2. How RATs work
      2. Worms: Self-Replicating Viruses
        1. Email worms
        2. IRC/Instant messaging worms
        3. Internet worms
        4. Malicious web pages
      3. Stopping Worms and Trojan Horses
      4. Tracking the Threats
    3. 6. Warez (Software Piracy)
      1. Copying Copy-Protected Software
      2. Defeating Serial Numbers
      3. Defeating Product Activation
      4. Warez Websites
      5. Usenet Newsgroups: The New Piracy Breeding Ground
  7. III. The Internet Hackers
    1. 7. Where the Hackers Are
      1. Hacker Websites
        1. Hacker websites for fun and profit
          1. Attrition.org
          2. AusPhreak
          3. Chaos Computer Club
          4. Cult of the Dead Cow
          5. New Order
          6. Nomad Mobile Research Centre
          7. The Shmoo Group
          8. Underground News
        2. Computer security “hacking” websites
          1. AntiOnline
          2. DShield
          3. Hideaway.net
          4. Insecure.org
          5. PacketStorm
          6. Security News Portal
          7. SecureRoot
          8. SecurityFocus
          9. Startplaza.nu
          10. Sys-Security Research
          11. Talisker’s Security Portal
          12. WindowsSearch
          13. Wiretapped
        3. Hacker search engines
      2. Hacker Magazines
        1. 2600
        2. Blacklisted! 411
          1. Hacker News Magazine
          2. The Hackademy Premium
          3. Phrack
          4. Private Line
      3. Hacker Usenet Newsgroups
        1. General hacking newsgroups
        2. Computer virus newsgroups
        3. Encryption newsgroups
        4. Cracking newsgroups
      4. Finding Hackers on IRC
      5. Hacker Conventions
        1. DefCon
        2. HOPE (Hackers on Planet Earth)
        3. Chaos Communication Congress
        4. PH-Neutral
        5. RuxCon
        6. ShmooCon
        7. SummerCon
        8. ToorCon
      6. Don’t Panic: Hackers Are People, Too
    2. 8. Stalking a Computer
      1. Why Hackers Choose Their Targets
      2. Finding a Target
        1. War dialing
        2. Port scanning
        3. War driving
          1. The steps to accessing a WiFi network
          2. Finding a WiFi network
          3. Protecting a WiFi network
        4. Probing sites by Google hacking
          1. Finding specific webserver software using Google
          2. Searching specific websites
          3. Probing a website’s defenses
          4. Finding and copying files using Google
          5. Guarding against Google hackers
      3. The Next Step
    3. 9. Cracking Passwords
      1. Password Stealing
        1. Using a keystroke logger
        2. Spying with a desktop monitoring program
        3. Using a password recovery program
      2. Dictionary Attacks
      3. Brute-Force Password Attacks
      4. Passwords: The First Line of Defense
      5. Blocking Access with Biometrics
        1. Biometric devices
        2. Defeating biometrics
      6. Good Enough Security
    4. 10. Digging into a Computer with Rootkits
      1. How Operating Systems Work
      2. The Evolution of Rootkits
        1. Modifying log files
        2. Trojaned binaries
        3. Hooking program calls
        4. Loadable kernel module (LKM) rootkits
      3. Opening a Backdoor
      4. Sniffing for More Passwords
      5. Killing Rootkits
    5. 11. Censoring Information
      1. Censoring the Internet
        1. URL filtering
        2. Content filtering
        3. DNS poisoning
        4. Port blocking
      2. The Internet Censors
        1. Countries that censor the Internet
          1. The Great Firewall of China
          2. The Internet censors of Saudi Arabia
          3. Castro’s censors in Cuba
          4. Internet censorship around the world
        2. Companies that censor the Internet
      3. Censorship Begins at Home: Parental Control Software
        1. Parental control software gone bad: blocking political and educational sites
        2. Parental control software gone really bad: CYBERsitter
          1. CYBERsitter on the offensive
          2. Cyber Patrol vs. cphack
        3. Project bait and switch: the double standard of censorship
        4. Researching parental control programs
      4. Avoiding Internet Censorship
        1. Accessing banned web pages by email
        2. Accessing banned web pages through proxy servers
      5. Reading Banned Books Online
        1. Secretly reading a banned book in broad daylight
        2. Secretly browsing the Web in broad daylight
      6. Is Anyone Censoring the Censors?
    6. 12. The Filesharing Networks
      1. A Short History of Internet FileSharing
      2. How FileSharing Works
        1. The birth of Gnutella
        2. The Ares network
        3. The FastTrack network
      3. Sharing Large Files
      4. The Problem with Filesharing
  8. IV. The Real World Hackers
    1. 13. The Internet Con Artists
      1. Charity Scams
      2. The Area Code Scam
      3. The Nigerian Scam
      4. Work-at-Home Businesses
        1. Stuffing envelopes
        2. Make-it-yourself kits
        3. Work as an independent contractor
        4. Fraudulent sales
      5. Pyramid Schemes
        1. The Ponzi scheme
        2. The infallible forecaster
      6. The Lonely Hearts Scam
      7. Internet-Specific Con Games
        1. Packet sniffers
        2. Web spoofing
        3. Phishing
        4. Keystroke loggers
        5. Porn dialers
      8. Online Auction Frauds
      9. Credit Card Fraud
      10. Protecting Yourself
        1. Cagey Consumer
        2. Council of Better Business Bureaus
        3. Federal Bureau of Investigation (FBI)
        4. Federal Trade Commission (FTC)
        5. Fraud Bureau
        6. ScamBusters
        7. Scams on the Net
        8. ScamWatch
        9. Securities and Exchange Commission (SEC)
      11. The Recovery Room Scam
    2. 14. Finding People on the Internet
      1. Who Are the Stalkers?
      2. Stalking on the Internet
      3. Finding Personal Information on the Internet
        1. Searching personal websites
        2. Finding names, addresses, and phone numbers
          1. 555-1212.com
          2. Freeality
          3. ICQ White Pages
          4. Infobel.com
          5. InfoSpace
          6. Lycos People Search
          7. Switchboard
          8. USSearch.com
          9. WhitePages.com
          10. Yahoo! People Search
          11. ZabaSearch
        3. Finding someone using a Social Security number
        4. Finding people in the military
        5. Searching public records
        6. Finding email addresses
          1. EmailChange
          2. Meta Email Search Agent (MESA)
          3. NedSite
          4. Other options
      4. Stalking Celebrities
      5. Protecting Yourself
    3. 15. Propaganda as News and Entertainment
      1. The News as Reality TV
      2. Corporate Influence on the News
        1. Project Censored: the news you never read about
        2. Drink milk—the chemicals are good for you
        3. The objective news from ABC and Wal-Mart
        4. The mystery bulge on George Bush’s back
      3. The News Only Reports the Facts—And Anything Else Anyone Will Tell Them
      4. The News as History
      5. Fear, Future, Fun, and Fakes: The Weekly World News as a Role Model for the News Media
        1. Fear: attracting an audience
        2. Future: distracting from the present
        3. Fun: keeping people happy
        4. Fakes: lies are more interesting than the truth
          1. TV Guide and Oprah Winfrey
          2. Newsweek and Martha Stewart
          3. O.J. Simpson and Time
          4. Diversity at the University of Wisconsin
          5. Bobbi McCaughey, Newsweek, and Time
      6. Using Satire to Report on Reality
      7. Blogs as News Sources
    4. 16. Hacktivism: Online Activism
      1. Virtual Sit-ins and Blockades
        1. The world’s first Internet strike
        2. Zapatistas on the Internet
        3. Disturbance on demand
      2. Email Bombing
      3. Web Hacking and Computer Break-ins
      4. Computer Viruses and Worms
      5. Activist Video Games
      6. Google Bombing
      7. Becoming a Hacktivist
    5. 17. Hate Groups and Terrorists on the Internet
      1. Hate Groups on the Internet
      2. Racist Video Games
      3. Terrorism: The Communist Threat of the Twenty-first Century
        1. The myth of cyberterrorism
        2. Terrorists on the Internet
      4. The Future of Terrorism
  9. V. The Future—Hacking for Profit
    1. 18. Identity Theft and Spam
      1. Understanding Identity Theft
        1. How identity theft works
        2. Minimizing the threat of identity theft
        3. Protecting your credit rating
      2. Spam: Junk Mail on the Internet
      3. Why Companies Spam and How They Do It
        1. Collecting email addresses
          1. Newsgroup extractors
          2. Website extractors
          3. SMTP server extractors
          4. P2P network harvesters
          5. Phishing for email addresses
        2. Masking the spammer’s identity
      4. Protecting Yourself from Spammers
        1. Complain to the spammer
        2. Complain to the spammer’s ISP
        3. Complain to the Internal Revenue Service
        4. Locating the spammer’s postal address
      5. How Spam Filters Work
        1. Content (Bayesian) filtering
        2. Blacklists and whitelists
        3. DNS lookup lists
        4. Attachment filtering
      6. Stopping Spam
      7. Possible future solutions to spam
        1. Going on the offensive
        2. Antispam organizations
      8. A PostScript: Spam as Propaganda
    2. 19. Banner Ads, Pop-Up Ads, and Search Engine Spamming
      1. Banner Ads and Click Fraud
      2. Pop-Up/Pop-Under Ads
        1. How to create a pop-up/pop-under ad
        2. How to stop banner and pop-up/pop-under ads
      3. Watching Out for Web Bugs
        1. Tracking the websites you visit
        2. Using web bugs in spam
        3. Bugging newsgroups
        4. Protecting yourself against web bugs
      4. Spamdexing: Search Engine Spamming
        1. Keyword stuffing
        2. Keyword content creators
        3. Link farming
        4. Cloaking and code swapping
        5. Doorway pages
        6. Spamdexing for hire
    3. 20. Adware and Spyware
      1. What Spyware Can Do
        1. Displaying pop-up ads
        2. Home page hijacking
        3. Stealing information
      2. Why Companies Advertise Through Spyware
      3. How Spyware Infects a Computer
        1. Installing infected files
        2. Installing infected anti-spyware programs
        3. Drive-by downloads
        4. Spyware-infected spyware
      4. Where Spyware Hides
      5. Eliminating Spyware
        1. Securing Internet Explorer
        2. Switching to a safer browser
        3. Installing a firewall
        4. Monitoring your startup programs
        5. Running anti-spyware programs
  10. VI. Protecting Your Computer and Yourself
    1. 21. Computing on a Shoestring: Getting Stuff for (Almost) Free
      1. Internet Comparison Shopping
      2. Buying a Refurbished Computer
      3. Save on Printer Supplies
      4. Free (and Almost-Free) Software
        1. Getting commercial software cheaply (and legally)
          1. Bundled software
          2. Buying obsolete software, upgrades, and OEM versions
          3. Buying software at academic discounts
          4. Shareware and freeware
          5. Name-brand alternatives
        2. Finding an open-source program
      5. Free Internet Access
      6. Free Email Accounts
      7. Free Web and Blog Space
      8. The Best Things in Life Are Free
    2. 22. Computer Forensics: The Art of Deleting and Retrieving Data
      1. Recovering Deleted Data
      2. File Shredders
      3. Storing Deleted Data
        1. Finding data stored in slack space
        2. Finding data stored in swap files
        3. Your history stored in a web browser cache
      4. Computer Forensics Tools
        1. File-undeleting programs
        2. Hex editors
        3. Magnetic sensors and electron microscopes
      5. Commercial Forensics Tools
      6. Protecting Yourself
    3. 23. Locking Down Your Computer
      1. Protecting Your Computer (and Its Parts)
        1. USB blockers
        2. Alarms
        3. Remote tracking services
      2. Protecting Your Data
        1. Backing up your data
        2. Update and patch your operating system
        3. Identifying and closing default weaknesses
        4. Choosing a firewall
        5. Switch to a safer browser
        6. Protecting your email account from spam
        7. Protecting against phishing
      3. What’s Next?
    4. A. Epilogue
    5. B. What’s on the Steal This Computer Book 4.0 CD
      1. Uncompressing, Unzipping, Unstuffing, and So On
      2. Chapter 1—The Hacker Mentality
      3. Chapter 2—The First Hackers: The Phone Phreakers
      4. Chapter 3—Hacking People, Places, and Things
      5. Chapter 4—ANSI Bombs and Viruses
      6. Chapter 5—Trojan Horses and Worms
      7. Chapter 6—Warez (Software Piracy)
      8. Chapter 7—Where the Hackers Are
      9. Chapter 8—Stalking a Computer
      10. Chapter 9—Cracking Passwords
      11. Chapter 10—Digging into a Computer with Rootkits
      12. Chapter 11—Censoring Information
      13. Chapter 12—The Filesharing Networks
      14. Chapter 13—The Internet Con Artists
      15. Chapter 14—Finding People on the Internet
      16. Chapter 15—Propaganda as News and Entertainment
      17. Chapter 16—Hacktivism: Online Activism
      18. Chapter 17—Hate Groups and Terrorists on the Internet
      19. Chapter 18—Identity Theft and Spam
      20. Chapter 19—Banner Ads, Pop-up Ads, and Search Engine Spamming
      21. Chapter 20—Adware and Spyware
      22. Chapter 21—Computing on a Shoestring: Getting Stuff for (Almost) Free
      23. Chapter 22—Computer Forensics: The Art of Deleting and Retrieving Data
      24. Chapter 23—Locking Down Your Computer
  11. About the Author
  12. Updates
  13. C. Cd License Agreement
    1. No Warranty
  14. Copyright

Product information

  • Title: Steal This Computer Book 4.0, 4th Edition
  • Author(s): Wallace Wang
  • Release date: May 2006
  • Publisher(s): No Starch Press
  • ISBN: 9781593271053