Blog Visitors Status

GS WEB LOG NOW ADDED STUFF IN EDUCATIONZONE...LIKE NOTIFICATIONS..RESULTS...HALLTICKETS...JOBS...ADMISSIONS...JNTU WORLD...WALLPAPERS...SCHOLARSHIPS...ETC

Protected by Copyscape DMCA Takedown Notice Search Tool

Thursday, September 16, 2010

Steal This Computer Book 3: What They Won't Tell You About

Now you can see what's hidden

Tim Smith, Producer, MEGAPOLITAN, July, 2003

"This is (another!) very useful and inspiring No Starch title."

Review

""If this book had a soundtrack, it'd be Lou Reed's Walk on the Wild Side."

Slashdot, September 18, 2003

". . . a travelog of many of the most interesting or inflammatory corners of the Internet."

The Inquirer, October 27, 2003

"an informative look into all the annoying and painful ways you can be screwed on the Internet"

Book Description

This offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. The third edition of this bestseller (over 150,000 copies sold) adopts the same informative, irreverent, and entertaining style that made the first two editions a huge success. Thoroughly updated, this edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.

From the Inside Flap

Is your computer safe from viruses and malicious hackers? No matter how secure your computer is, it is still vulnerable to a variety of attacks that can ruin your files or hoodwink you out of thousands of dollars. This newly revised third edition of the best-selling Steal This Computer Book will help you protect yourself. You’ll discover:
* How to tackle spyware, web bugs, and adware--seemingly innocent programs that harvest your private information
* How hackers hide their identities and shred their files
* How hackers write computer viruses and worms
* How Trojan Horse programs work and how to defend against them
* How hackers steal software and defeat copy-protection mechanisms
* How to fight back against spammers
* How to tell when your machine is being attacked what you can do to protect it
* Where the hackers are, how they probe a target and sneak into a computer, and what they do when they get there

About the Author

Best-selling computer book author Wallace Wang is a former contributor to Boardwatch Magazine, where he wrote a monthly column called "Notes From the Underground." He is also a successful stand-up comic who has appeared on A&E’s "Evening at the Improv" and appears regularly at the Riviera Comedy Club in Las Vegas.


 




http://rapidshare.com/files/51505245...e_Internet.rar





Click the image to open in full size.


 

0 comments:

Post a Comment

Related Posts Plugin for WordPress, Blogger...