Flylib.com
Invasion of Privacy! Big Brother and the Company Hackers
Invasion of Privacy! Big Brother and the Company Hackers
ISBN: 1592000436
EAN: 2147483647
Year: 2004
Pages: 135
Authors:
Michael Weber
BUY ON AMAZON
Table of Contents
BackCover
Invasion of Privacy - Big Brother and the Company Hackers
Introduction
This Book is for You If
How this Book is Organized
Keeping the Book s Content Current
Part I: The Invasion
Chapter 1: The Death of Moore s Law
The Tech Boom, Moore s Law, and the Next Killer App
The Tech Slowdown
Spy Technology
The Dirty Little Secret
Chapter 2: The Target is You
The Player Table
Privacy Zones
Chapter 3: Opting Out
The Digital Doppelganger: Garbage In, Garbage Out
Chapter 4: Convergence
How a Simple Coupon Can Lead to Your Worst Nightmare
Chapter 5: Tactical and Practical Digital Defense (Part 1)
Turnabout is Fair Play
Resourcefulness
Do Not Call List Update
Chapter 6: Surveillance
Spyware
I Spy
Chapter 7: The Cheap Toothpick Syndrome
Social Insecurity
Corporate Heinie-Think
Chapter 8: The Metaphysics of Hacking
The Three Sides of the Hacker Pyramid
The Sport of Hacking
The Business of Hacking
The Hacker Pyramid
The Other Side of the Hacker Pyramid
The IT Pyramid
Chapter 9: Media Meltdown
The Five-Legged Octopus
The Sixth Leg
Nobody Owns Cyberspace
The Media Meltdown
The New-Media Octopus
The Media Knot
The Z Factor: Warez, Sitez, Crackz, and Piratez
The Politics of Piracy
Microsoft versus Apple: The Rematch
The iTunes DRM Model
Snitch or Switch
On a WildTangent: Not all Fun and Games
Who Profits From Selling Your Behind?
A Crystal Ball
The Right Spin on Spyware
Products Too Smart for Their Own Damn Good
The Cheap Toothpick Syndrome
Chapter 10: Badvertising
Animatics
The Day Elvis Died
Mnemonics
Napster Nips Madison Avenue
The Silver Lining
Advertising s Second Heyday
The Stuart Principle
The Day of Reckoning
Testing
How Advertising Became Badvertising
Digital Marketing
The Mousetrap
Ad Blocking
The Advertising Police
Chapter 11: Practical and Tactical Digital Defence (Part 2)
Epilogue
Don t Get Mad. Get Even
Part II: Zone Defense
Chapter 12: The Computer Zone
The Administrator Account
Windows System Restore
When Was the Last Time You Used Remote Assistance?
Convenience versus Paranoia
The Recycle Bin
Performing Disk Cleanup
Defragmenting Your Hard Drive
Windows XP Professional Encryption
Windows Update
Scanning for Spyware
Using a Good Antivirus Software
Using a Good Firewall
Software Defaults
Out-of-the-Box Defaults
Optimizing Your Startup
Password-Protecting Your Computer
Chapter 13: The Internet Zone
Opt-Out Sites
The Federal Trade Commission National Do Not Call Registry
The Cookie Monster
E-Mail and its Evil Twin
Instant Messaging
Downloads and Spyware
Online Scams
Chapter 14: The Public Zone
The Best Way to Avoid Danger
Don t Fit the Profile
Develop a Public Persona
Security Checkpoints
Identity Theft
Credit Card Skimming
Workplace Surveillance
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q - R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X - Z
List of Figures
List of Tables
List of Sidebars
Invasion of Privacy! Big Brother and the Company Hackers
ISBN: 1592000436
EAN: 2147483647
Year: 2004
Pages: 135
Authors:
Michael Weber
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 3.3 Use WinSCP as a Graphical Replacement for FTP and RCP
Step 4.1 Authentication with Public Keys
Step 4.6 How to use PuTTY Passphrase Agents
Step 5.2 Troubleshooting Common OpenSSH Errors/Problems
Appendix - Sample sshd_config File
Certified Ethical Hacker Exam Prep
Test PlansKeeping It Legal
Windows Hacking
Key Terms
Social Engineering
Denial of Service
Java How to Program (6th Edition) (How to Program (Deitel))
BASIC, Visual Basic, Visual C++, C# and .NET
Terminology
Stack Class of Package java.util
Printing Literals and Escape Sequences
Class Character
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Wire and Cable Basics
Designing and Installing Distributed Video Systems
Security System Basics
User Interfaces
Appendix E CEDIA Installer Level I Classification System
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
LAN Basics
The Internet and IP Infrastructures
IP QoS
Drivers of Broadband Access
5G: Intelligent Technologies
Special Edition Using FileMaker 8
User-Level Internal Security
Data Presentation
Peer-to-Peer Hosting
Citrix/Terminal Services
Documenting Your FileMaker Solutions
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies