Cover image for CyberShock : surviving hackers, phreakers, identity thieves, Internet terrorists, and weapons of mass disruption
Title:
CyberShock : surviving hackers, phreakers, identity thieves, Internet terrorists, and weapons of mass disruption
Author:
Schwartau, Winn.
Personal Author:
Publication Information:
New York : Thunder's Mouth Press, 2000.
Physical Description:
xxvi, 470 pages : illustrations ; 24 cm
Language:
English
ISBN:
9781560252467
Format :
Book

Available:*

Library
Call Number
Material Type
Home Location
Status
Grand Island Library QA76.9.A25 S3537 2000 Adult Non-Fiction Open Shelf
Searching...
Julia Boyer Reinstein Library QA76.9.A25 S3537 2000 Adult Non-Fiction Open Shelf
Searching...

On Order

Summary

Summary

In recent years information warfare has trickled from the domain of governments and megacorporations into the lives and workplaces of the average citizen, and privacy concerns are at an all-time high. Cybershock is the first book to guide the average Internet user through online perils and offers answers and solutions in common-sense language. Winn Schwartau leads readers through the basics (What's hacking? Who hacks?), introduces actual hacking tools and techniques, and using corporate, law enforcement, and military examples, teaches how to become a successful anti-hacker. It also provides balanced viewpoints through graphic, pictorial, and written contributions from the principal stakeholders: hackers and phreakers; corporate security experts; lawyers and cyberjudicial professionals; and officers with the security-sensitive military and government agencies. The book includes an extensive listing of both hacking and anti-hacking Internet sites and a compendium of the leading anti-hacking security products and tools.


Author Notes

Winn Schwartau is one of the country's leading experts on information security, infrastructure protection and electronic privacy. His writing has appeared in The New York Times, Information Week, PC Week, Internet World and many other periodicals


Reviews 2

Booklist Review

Schwartau, an expert on electronic security, provides an insider's view of the fascinating culture of hackers. Despite the common image of hackers as antisocial terrorists, Schwartau shows their variety and their motives, of which thumbing their noses at authority is foremost. In general, hackers are engineers able to push the technology and discover weaknesses in systems. Schwartau distinguishes hacking for fun, for profit, and out of malice. Computer hacking is now used for everything from sophisticated crime to political protest in China, Serbia, and Pakistan. In precis of several prominent hacking cases and of hackers themselves, Schwartau illustrates the vulnerability of computer users ranging from consumers to corporations to the government. He cautions that computer users have as much to fear from government trade-offs of freedom for increased security as they have from the occasional hacker. Schwartau provides great technical information on how computer users can protect themselves, but he is most enjoyable when relating the maverick culture of hackers and the Internet. --Vanessa Bush


Library Journal Review

One of the leading information security and electronic privacy experts in the United States, Schwartau (Information Warfare) here brings the perils of the Internet to life in an engaging style accessible to the average reader. Schwartau describes an Internet full of criminal hackers and cyberpunks who are clearly ethically challenged but clever enough and willing to use deception to establish and expand their power. He explains who these people are, why they hack, and how they crack passwords, break into systems, and maintain their anonymity. More importantly, Schwartau suggests what a user can do to deter such attacks and explains the fundamentals of how to protect oneself without having to become a security expert. With burgeoning concerns over privacy and security on the Internet, this is one book that everyone from systems administrators to casual net surfers should read. References to further readings are scattered throughout the work. Highly recommended for most collections.--Joe Accardi, Northeastern Illinois Univ. Lib., Chicago (c) Copyright 2010. Library Journals LLC, a wholly owned subsidiary of Media Source, Inc. No redistribution permitted.


Table of Contents

John "Cap'n Crunch" DraperWinn Schwartau
Acknowledgmentsp. x
Forewordp. xiii
Introductionp. xxi
Part I The Hackersp. 1
The Great New Global Societyp. 3
Whole Lotta Hacking Goin' Onp. 19
CyberGraffitip. 25
Who Are the Hackers?p. 33
CyberChrist at the Hacker Con: Las Vegas, Nevada, USAp. 53
Hactivism: Political Hackingp. 69
An American Alien Hacks Through Customsp. 79
Part II Protecting Kids, Family, and Your Privacyp. 83
In Cyberspace You're Guilty Until Proven Innocentp. 85
Protecting Your Kids and Family from Hackersp. 111
Spamp. 130
Scam Spam: Fraudp. 141
Part III How They Hackp. 153
Getting Anonymousp. 155
Password Hackingp. 165
Hack and Sniffp. 176
Scanning, Breaking, and Entering: Anatomy of a Friendly Hackp. 180
War Dialing: Hacking the Phonesp. 195
Trojan Hackingp. 201
Hacking for $p. 206
Viruses, Hoaxes, and Other Animalsp. 212
Crypto Hackingp. 229
Steganography: Hiding in Plain Site (Sight?)p. 253
Hacking for Evidencep. 258
Part IV "We're Sorry, but the Computers Are Down"p. 273
Denial of Service: Taking Down the Netp. 275
Schwartau to Congress: HERF Thisp. 284
Weapons of Mass Disruptionp. 286
Part V Anti-Hacking Tips and Tricksp. 313
Hiring Hackersp. 315
Catching Hackersp. 325
Defensive Hacking: Firewallsp. 336
Corporate Anti-Hacking: It Ain't the Technologyp. 346
Lying to Hackers Is OK by Mep. 357
Part VI Law Enforcement, Vigilantism, and National Securityp. 365
Hacking and Law Enforcementp. 367
Corporate Vigilantism: Strike Back or Lay Back?p. 374
Infrastructure Is Us: The National Response to Hackingp. 390
Something Other Than Warp. 408
Part VII The Futurep. 419
Luddite's Lamentp. 421
The Future of Microsoftp. 425
Messing with the Collective Mind: PsyOpsp. 428
Extreme Hackingp. 432
The Toaster Rebellion of '08p. 438
Postscriptp. 448
Appendixp. 450
Top Hacker Sitesp. 450
Top 50 Security Sitesp. 451
Other Worksp. 453
Indexp. 455

Google Preview