Flylib.com
Steal This File Sharing Book: What They Wont Tell You About File Sharing
Steal This File Sharing Book: What They Wont Tell You About File Sharing
ISBN: 159327050X
EAN: 2147483647
Year: 2004
Pages: 98
Authors:
Wallace Wang
BUY ON AMAZON
Table of Contents
Steal This File Sharing Book-What They Wont Tell You About File Sharing
Part 1: Learning About File Sharing
Chapter 1: Finding the Files
THE INTERNET: A GRAB BAG OF FILES
TRADING FILES MANUALLY
THE THIEVES MINDSET
Chapter 2: The Peer-to-Peer File Sharing Networks
HOW FILE SHARING WORKS
THE DIFFERENT FILE SHARING NETWORKS
ADDITIONAL FILE SHARING FEATURES
SPECIALIZED FILE SHARING NETWORKS
Chapter 3: Navigating Newsgroups
GETTING STARTED WITH NEWSGROUPS
NAVIGATING NEWSGROUPS
SHARING FILES THROUGH A NEWSGROUP
NEWSGROUP ETIQUETTE
Chapter 4: Instant Messaging and Online Chat Rooms
INTERNET RELAY CHAT (IRC)
INSTANT MESSAGING SERVICES
HOW INSTANT MESSAGING WORKS
PEER-TO-PEER INSTANT MESSAGING PROGRAMS
Chapter 5: Finding Files on Web and FTP Sites
TYPES OF SITES
FINDING A FILE SHARING SITE
COPYING FILES TO YOUR COMPUTER
PROS AND CONS OF WEB AND FTP SITES
Part 2: Stealing Files
Chapter 6: Protecting Your Identify
HIDING YOUR IDENTITY
SECRETS OF ANONYMOUS FILE SHARING
Chapter 7: Protecting Your Computer
CATCHING MALICIOUS FILES
PROTECTING DATA ON YOUR COMPUTER
DESTROYING THE EVIDENCE
Chapter 8: The File Formats
MUSIC FILE FORMATS
FILE COMPRESSION FORMATS
ELECTRONIC BOOK FORMATS
MOVIE FORMATS
PHOTOGRAPH FORMATS
WHERE TO GO FROM HERE
Chapter 9: Sharing Music
COPYING CDS
FINDING MUSIC ON THE INTERNET
FINDING THE BEST AUDIO FILES
THE PROBLEM WITH FILE NAMES
WHOS STEALING FROM WHOM?
Chapter 10: Finding Movies (or TV Shows)
COPYING A MOVIE
TYPES OF VIDEO PIRACY
DOWNLOADING MOVIES
THE FUTURE OF VIDEO PIRACY ON THE INTERNET
Chapter 11: Sharing Books
SCANNING A BOOK
WHAT TYPES OF BOOKS ARE STOLEN?
CRACKING AN E-BOOK S COPY PROTECTION
FINDING ILLEGAL E-BOOKS
THE FUTURE OF E-BOOKS
THE FUTURE OF E-BOOKS AND PIRACY
Chapter 12: Pirating Software (WAREZ)
THE WAREZ UNDERGROUND
HOW COMPANIES FIGHT BACK
WHERE THE WAREZ ARE
Chapter 13: Sharing Video Games
VIDEO GAMES AS WAREZ
VIDEO GAMES AS EMULATION
THE LEGALITIES OF ROM IMAGES
Chapter 14: Sharing Pornography
FINDING PORNOGRAPHY
PORNOGRAPHY: A REFLECTION OF SOCIETY
Chapter 15: Miscellaneous Thievery
STEALING SOUNDS
STEALING GUITAR CHORD CHARTS
STEALING HDTV SHOWS
STEALING BANDWIDTH
STEALING WEBSITES
STEALING PHOTOGRAPHS AND IMAGES
STEALING RECIPES
STEALING EVERYTHING DIGITALLY
Part 3: The Future
Chapter 16: The Legal Alternatives
MUSIC
MOVIES
BOOKS
SOFTWARE
LEGAL FILE SHARING SPINOFFS
Chapter 17: How the Corporations Fight Back
FILING A LAWSUIT
EDUCATIONAL CAMPAIGNS
TAXING BLANK RECORDABLE MEDIA
ANTI-PIRACY COPY PROTECTION
ANTI-P2P SERVICES
SABOTAGING FILES WITH CUCKOO EGGS
KILLING A COMPUTER
WHAT THE FUTURE HOLDS
List of Figures
Steal This File Sharing Book: What They Wont Tell You About File Sharing
ISBN: 159327050X
EAN: 2147483647
Year: 2004
Pages: 98
Authors:
Wallace Wang
BUY ON AMAZON
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
SWT Event Handling, Threading, and Displays
Trees
Scales, Sliders, and Progress Bars
Drag and Drop and the Clipboard
JFace Windows and Dialogs
Managing Enterprise Systems with the Windows Script Host
Logon Scripts and Scheduling
File Operations
Input/Output Streams
Application Automation
System Administration
Web Systems Design and Online Consumer Behavior
Chapter I e-Search: A Conceptual Framework of Online Consumer Behavior
Chapter II Information Search on the Internet: A Causal Model
Chapter XVI Turning Web Surfers into Loyal Customers: Cognitive Lock-In Through Interface Design and Web Site Usability
Chapter XVII Internet Markets and E-Loyalty
Chapter XVIII Web Systems Design, Litigation, and Online Consumer Behavior
.NET-A Complete Development Cycle
Conclusion
Project Requirements
Implementation of Regions, Pens, and Brushes
Dynamic Loading of Components
Breakdown of the Code Modules
MPLS Configuration on Cisco IOS Software
Special Outgoing Label Types
Case Study-Hub and Spoke MPLS VPN Network Using BGP PE-CE Routing for Sites Using Unique AS Numbers
Constraint-Based Routing and Operation in MPLS TE
Configuring L2TPv3 Static Tunnels
Command Reference
Python Standard Library (Nutshell Handbooks) with
Introduction
The asynchat Module
The cmp Module
The regsub Module
The reconvert Module
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies