Toggle navigation
See also
Home
Misc
Steal this computer book 3
Part 2: Dangerous Threats on the Internet
Part 2:
Dangerous Threats on the Internet
Chapter 7: Viruses and Worms
Chapter 8: Trojan Horses—Beware of Geeks Bearing Gifts
Chapter 9: Con Games on the Internet
Chapter 10: Online Stalkers
BackCover
Steal This Computer Book 3-What They Won't Tell You About the Internet
Introduction
YOUR OWN REVOLUTION
Part 1: Information Overload (Lies, Damn Lies, and Statistics)
Chapter 1: Finding What You Need--The Magic of Search Engines
SEARCH ENGINES
TIPS FOR USING SEARCH ENGINES
REMEMBER THE LIMITATIONS OF SEARCH ENGINES
Chapter 2: Alternative Sources of News and Information
NEWSPAPERS ONLINE
MAGAZINES ONLINE
NEWS SERVICES ONLINE
FINDING MORE NEWS SOURCES
CORPORATE INFLUENCE ON THE NEWS
THE NEWS MEDIA ONLY REPORTS THE FACTS-AND ANYTHING ELSE ANYONE WILL TELL THEM
THE NEWS AS HISTORY
READING TO LEARN
Chapter 3: Censoring Information (We Know What's Best for You)
DEFEATING INTERNET FILTERS
BANNED WEB PAGES TO VISIT
PARENTAL CONTROL SOFTWARE
READING BANNED BOOKS ONLINE
IS ANYONE CENSORING THE CENSORS?
Chapter 4: Hacktivism--Online Activism
GETTING THE WORD OUT WITH EMAIL AND WEBSITES
USING THE INTERNET AS A MEDIUM
THE THREAT OF CYBERTERRORISM
Chapter 5: Pledging Allegiance--Hatred as Patriotism
MONITORING HATE GROUPS
LEARNING FROM HATE GROUPS
Chapter 6: Where the Hackers Are
HACKER WEBSITES
COMPUTER SECURITY WEBSITES
HACKER MAGAZINES
FINDING MORE HACKER WEBSITES
HACKER USENET NEWSGROUPS
FINDING HACKERS ON IRC
HACKER CONVENTIONS
DON'T PANIC: HACKERS ARE PEOPLE, TOO
Part 2: Dangerous Threats on the Internet
Chapter 7: Viruses and Worms
HOW DIFFERENT VIRUSES INFECT A COMPUTER
HOW VIRUSES AVOID DETECTION
WORM INFECTION METHODS
VIRUS MYTHS AND HOAXES
LEARNING MORE ABOUT VIRUSES AND WORMS
Chapter 8: Trojan Horses-- Beware of Geeks Bearing Gifts
HOW TROJAN HORSES SPREAD
TYPES OF TROJAN HORSES
HOW HACKERS WRITE A TROJAN HORSE
STOPPING A TROJAN HORSE
LEARNING MORE ABOUT TROJAN HORSES
Chapter 9: CON Games on the Internet
THE AREA CODE SCAM
THE NIGERIAN SCAM
PYRAMID SCHEMES
WORK-AT-HOME BUSINESSES
THE LONELY HEARTS SCAM
PACKET SNIFFERS, WEB SPOOFING, PHISHERS, AND KEYSTROKE LOGGERS
REROUTING YOUR INTERNET CONNECTION
ONLINE AUCTION FRAUDS
THE FALLACY OF INTERNET MALLS
URBAN LEGENDS
CREDIT CARD FRAUD
PROTECTING YOURSELF
Chapter 10: Online Stalkers
FINDING PHONE NUMBERS, STREET ADDRESSES, AND EMAIL ADDRESSES
PROTECTING YOURSELF
Part 3: Breaking and Entering Computers
Chapter 11: Probing a Target
WAR-DIALING
PORT SCANNING
WAR-DRIVING
AFTER THEY FIND A WAY INTO A COMPUTER
Chapter 12: Sneaking into a Computer
ASK AND YE SHALL RECEIVE: THE ART OF SOCIAL ENGINEERING
PASSWORD CRACKING
SOFTWARE LOOPHOLES AND FLAWS
BREAKING INTO A WIRELESS NETWORK
PASSWORDS: THE FIRST LINE OF DEFENSE
Chapter 13: Digging In
CLEANING OUT THE LOG FILES
KILLING THE MONITORING SOFTWARE
OPENING A BACK DOOR
SNIFFING FOR MORE PASSWORDS
KILLING ROOTKITS
Part 4: Protection Yourself
Chapter 14: Computing on a Shoestring
SAVE ON PRINTER SUPPLIES
ALMOST-FREE SOFTWARE
FREE MUSIC
FREE INTERNET ACCESS
FREE EMAIL
FREE FAX SERVICES
FREE WEBSITE HOSTING
COMPUTING ON A BUDGET
Chapter 15: Protecting Your Data and Your Privacy
SPYING ON YOUR OWN COMPUTER
COVERING YOUR TRACKS
SHIELDING YOUR PRIVACY
PROTECTING YOUR IDENTITY
Chapter 16: Waging War on Spam
WHY COMPANIES SPAM THE INTERNET AND HOW THEY DO IT
PROTECTING YOURSELF FROM SPAMMERS
ANTI-SPAM RESOURCES
Chapter 17: Web Bugs, Adware, Pop-Ups, and Spyware
WATCHING OUT FOR WEB BUGS
ADWARE-SOFTWARE WITH BUILT-IN ADVERTISING
STOPPING POP-UP/POP-UNDER ADVERTISEMENTS
DETECTING SPYWARE
THE ONLY SURE WAY TO PROTECT YOUR PRIVACY
Part 5: Protecting Your Computer
Chapter 18: Firewalls, Intrusion-Detection Systems, and Honeypots
FIREWALLS: THE FIRST LINE OF DEFENSE
INTRUSION-DETECTION SYSTEMS
HONEYPOTS
TRACING A HACKER
Chapter 19: Computer Forensics: Recovering and Deleting Data
FINDING DELETED DATA
COMPUTER FORENSICS TOOLS
EXPERIMENTING WITH FORENSICS TOOLS
PROTECTING YOURSELF
Chapter 20: Protecting Your Computer
LOCKING UP YOUR COMPUTER
PROTECTING YOUR COMPUTER PARTS
PROTECTING YOUR LAPTOP
BLOCKING ACCESS WITH BIOMETRICS
Appendix A: Software
INSTALLATION SUPPORT
ANONYMITY
ANTI-CON GAMES
ANTI-SPYWARE
ANTI-TROJAN HORSE
ANTIVIRUS
BULK EMAILERS
CACHE AND COOKIE CLEANERS
DESKTOP SECURITY
DISASSEMBLERS
DNS LOOKUP
ENCRYPTION CRACKER
FILE ENCRYPTION
FILE INTEGRITY CHECKERS
FILE SHREDDERS
FORENSICS
HEX EDITORS
HONEYPOT TRAPS
INTRUSION DETECTION
IRC CLIENTS
KEYSTROKE LOGGERS
MP3 TOOLS
PACKET SNIFFERS
PARENTAL CONTROL
PASSWORD RECOVERY
PORT SCANNERS
READERS
REMOTE MONITORING
ROLLBACK PROGRAMS
SPAM FIGHTERS
STEGANOGRAPHY
SYSTEM LOCKS
SYSTEM RESTORER
VOICE ENCRYPTION
VULNERABILITY SCANNERS
WEB SITE PROTECTION
Appendix B: A Hacker's Gallery of Rogue Tools
PHONE PHREAKING TOOLS
VIRUSES
Appendix C: A Bit of History--Phone Phreaking and Other Phun
A SHORT HISTORY OF PHONE PHREAKING
POSSIBLY TRUE STORIES ABOUT PHONE PHREAKING
GETTING STARTED
" SHOULDER SURFING " CALLING CARD NUMBERS
TELEPHONE COLOR BOXES
COLOR BOX PROGRAMS
WAR DIALERS AND PRANK PROGRAMS
VOICE MAILBOX HACKING
CELLULAR PHONE FRAUD AND TV SATELLITE DESCRAMBLING
Appendix D: Glossary
D-F
G-M
N-P
R-S
T-W
List of Figures
List of Tables
Remember the name: eTutorials.org
Copyright eTutorials.org 2008-2024. All rights reserved.