Flylib.com
Invasion of Privacy! Big Brother and the Company Hackers
Invasion of Privacy! Big Brother and the Company Hackers
ISBN: 1592000436
EAN: 2147483647
Year: 2004
Pages: 135
Authors:
Michael Weber
BUY ON AMAZON
Table of Contents
BackCover
Invasion of Privacy - Big Brother and the Company Hackers
Introduction
This Book is for You If
How this Book is Organized
Keeping the Book s Content Current
Part I: The Invasion
Chapter 1: The Death of Moore s Law
The Tech Boom, Moore s Law, and the Next Killer App
The Tech Slowdown
Spy Technology
The Dirty Little Secret
Chapter 2: The Target is You
The Player Table
Privacy Zones
Chapter 3: Opting Out
The Digital Doppelganger: Garbage In, Garbage Out
Chapter 4: Convergence
How a Simple Coupon Can Lead to Your Worst Nightmare
Chapter 5: Tactical and Practical Digital Defense (Part 1)
Turnabout is Fair Play
Resourcefulness
Do Not Call List Update
Chapter 6: Surveillance
Spyware
I Spy
Chapter 7: The Cheap Toothpick Syndrome
Social Insecurity
Corporate Heinie-Think
Chapter 8: The Metaphysics of Hacking
The Three Sides of the Hacker Pyramid
The Sport of Hacking
The Business of Hacking
The Hacker Pyramid
The Other Side of the Hacker Pyramid
The IT Pyramid
Chapter 9: Media Meltdown
The Five-Legged Octopus
The Sixth Leg
Nobody Owns Cyberspace
The Media Meltdown
The New-Media Octopus
The Media Knot
The Z Factor: Warez, Sitez, Crackz, and Piratez
The Politics of Piracy
Microsoft versus Apple: The Rematch
The iTunes DRM Model
Snitch or Switch
On a WildTangent: Not all Fun and Games
Who Profits From Selling Your Behind?
A Crystal Ball
The Right Spin on Spyware
Products Too Smart for Their Own Damn Good
The Cheap Toothpick Syndrome
Chapter 10: Badvertising
Animatics
The Day Elvis Died
Mnemonics
Napster Nips Madison Avenue
The Silver Lining
Advertising s Second Heyday
The Stuart Principle
The Day of Reckoning
Testing
How Advertising Became Badvertising
Digital Marketing
The Mousetrap
Ad Blocking
The Advertising Police
Chapter 11: Practical and Tactical Digital Defence (Part 2)
Epilogue
Don t Get Mad. Get Even
Part II: Zone Defense
Chapter 12: The Computer Zone
The Administrator Account
Windows System Restore
When Was the Last Time You Used Remote Assistance?
Convenience versus Paranoia
The Recycle Bin
Performing Disk Cleanup
Defragmenting Your Hard Drive
Windows XP Professional Encryption
Windows Update
Scanning for Spyware
Using a Good Antivirus Software
Using a Good Firewall
Software Defaults
Out-of-the-Box Defaults
Optimizing Your Startup
Password-Protecting Your Computer
Chapter 13: The Internet Zone
Opt-Out Sites
The Federal Trade Commission National Do Not Call Registry
The Cookie Monster
E-Mail and its Evil Twin
Instant Messaging
Downloads and Spyware
Online Scams
Chapter 14: The Public Zone
The Best Way to Avoid Danger
Don t Fit the Profile
Develop a Public Persona
Security Checkpoints
Identity Theft
Credit Card Skimming
Workplace Surveillance
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q - R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X - Z
List of Figures
List of Tables
List of Sidebars
Invasion of Privacy! Big Brother and the Company Hackers
ISBN: 1592000436
EAN: 2147483647
Year: 2004
Pages: 135
Authors:
Michael Weber
BUY ON AMAZON
Certified Ethical Hacker Exam Prep
Apply Your Knowledge
Certified Ethical Hacker
Practice Exam Questions
License Term and Charges
Updates
Metrics and Models in Software Quality Engineering (2nd Edition)
Summary
In-Process Quality Metrics
The Rayleigh Model
Measuring and Analyzing Customer Satisfaction
How Good Is Good Enough
Software Configuration Management
Configuration Control
Configuration Status Accounting
Appendix D Problem Change Report
Appendix I System Service Request
Appendix J Document Change Request (DCR)
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
Working with Views
Defining Object Reference Variables
Workflow Applications
Format a Users Name
Hiding a LotusScript Library
Programming .Net Windows Applications
Windows Forms and the .NET Framework
Web Applications Versus Windows Applications
SystemInformation Properties
ADO.NET
Creating a DataGrid
VBScript in a Nutshell, 2nd Edition
How ASP Works
Active Server Pages Object Model
Why Program Outlook Forms?
Section C.1. Arithmetic Operators
Section C.4. Logical and Bitwise Operators
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies