List of Figures


Chapter 1: The Death of Moore's Law

Figure 1.1: Dot-com Doom
Figure 1.2: In memoriam
Figure 1.3: USSEARCH.com site

Chapter 2: The Target is You!

Figure 2.1: The Target illustration
Figure 2.2: Privacy zones
Figure 2.3: VeriSign trust logos x 3
Figure 2.4: VeriSign Web site
Figure 2.5: VeriSign trust-for-sale page.

Chapter 3: Opting Out

Figure 3.1: Yahoo! People search page
Figure 3.2: USSEARCH.com public records search
Figure 3.3: Sprint opt-out agreement cover
Figure 3.4: Sprint opt-out agreement inside
Figure 3.5: Amazon.com Updated Privacy Notice link
Figure 3.6: Amazon.com privacy agreement
Figure 3.7: Amazon.com Customer Communication Preferences link
Figure 3.8: Amazon.com customer logon page
Figure 3.9: Amazon.com Customer Communication Preferences page
Figure 3.10: OpenSecrets.org

Chapter 4: Convergence

Figure 4.1: Pizza coupons
Figure 4.2: Adelphia homepage
Figure 4.3: Telephone Consumer Protection Act Section 227
Figure 4.4: Xbox Live Web site

Chapter 5: Tactical and Practical Digital Defense (Part 1)

Figure 5.1: Steve Kirsch Web site
Figure 5.2: http//www.junkfax.org/fax/stories/kirsch.html
Figure 5.3: Google Fax. com post
Figure 5.4: Junkfax.orgfax company profiles
Figure 5.5: Fax.com's missing-child home page
Figure 5.6: Fax.com's second missing-children page
Figure 5.7: Fax. com's Targeted Marketing Solutions page
Figure 5.8: Fax.com's response to the lawsuit
Figure 5.9: Steve Kirsch's investigative tools
Figure 5.10: National "do not call" list site

Chapter 6: Surveillance

Figure 6.1: Ghostfiles window
Figure 6.2: Spychecker.com Web site
Figure 6.3: Gateway Processing On Demand site
Figure 6.4: Aureate/Radiate Google search results
Figure 6.5: Go!Zilla disclaimer
Figure 6.6: Ad-aware screen
Figure 6.7: iSpyNOW Web site
Figure 6.9A: MSN Instant Messenger
Figure 6.9B: Trillian Instant Messenger
Figure 6.10: Photo enforcement
Figure 6.11: Wescam aerial pod

Chapter 7: The Cheap Toothpick Syndrome

Figure 7.1: Toothpick comparison photo
Figure 7.2: Danville Supply online toothpick catalog
Figure 7.3: Blue Cross card (with cheap toothpick)

Chapter 8: The Metaphysics of Hacking

Figure 8.1: The pyramids
Figure 8.2: DEFCON Web site
Figure 8.3: Jeff Moss
Figure 8.4: BlackHat Web site
Figure 8.5: The hacker pyramid
Figure 8.6: Hacking Tools Web site
Figure 8.7: Kevin Mitnick arrest photo
Figure 8.8: Free Kevin Mitnick Web site
Figure 8.8: The reformed Kevin Mitnick (left) and Sean "Jinx" Gailey (right) at DEFCON XI ( courtesy Jinx Hackwear)
DEFCON XI Photo Gallery
Hacker Rap
Hacker Art
Figure 8.10: Front of a Camel cigarette pack
Figure 8.11: Rear of a Camel cigarette pack
Figure 8.12: The security pyramid
Figure 8.13: Mirko Zorz and Berislav Kucan of Help Net Security
Figure 8.14: CERT Web site
Figure 8.15: Foundstone Professional Services page illustration
Figure 8.16: Uncle Sam wants you! poster
Figure 8.17: The IT pyramid

Chapter 9: Media Meltdown

Figure 9.1: The Napster logo
Figure 9.2: A warez site
Figure 9.3: The iTunes Web site
Figure 9.4: The New Media king? Photo by Moshe Brakha
Figure 9.5: The Apple iPod
Figure 9.6: Logitech Cordless Elite Duo MX
Figure 9.7: The WildTangent Web site
Figure 9.8: The WildTangent Web Driver system requirements screen
Figure 9.9: What The Hell Dammit! Web site
Figure 9.10: The WildTangent EULA
Figure 9.11: Gibson Research Corporation Web site
Figure 9.12: http://www.3GUpload.com
Figure 9.13: TiVo

Chapter 10: Badvertising

Figure 10.1: American Memory Coca-Cola advertisement Web site
Figure 10.2: The Hill \ Holliday Web site
Figure 10.3: Stuart from the Ameritrade commercial
Figure 10.4: The DoubleClick Web site
Figure 10.5: Pop-Up Stopper Web site

Chapter 11: Practical and Tactical Digital Defence (Part 2)

Figure 11.1: Remodern BBS
Figure 11.2: Photo of baseball bat
Figure 11.3: Smith news article with picture

Part II: Zone Defense

Figure II.1: Privacy zones illustration
Figure II.2: Target illustration

Chapter 12: The Computer Zone

Figure 12.1: Microsoft Knowledge Base Article 293834User Accounts That You Create During Setup Are Administrator Account Types
Figure 12.2: UserAccount Controls
Figure 12.3: Folder Properties privacy feature
Figure 12.4: System Restore utility size settings
Figure 12.5: Create a Restore Point screen
Figure 12.6: Microsoft Error Reporting dialog box
Figure 12.7: Error Reporting button in System Properties
Figure 12.8: Check Disable Error Reporting in the Error Reporting dialog box
Figure 12.9: File Sharing tab under Disk Properties
Figure 12.10: Uncheck Disable Internet File and Printer Sharing for Microsoft Networks in the Connection Properties box
Figure 12.11: Help and support about Remote Assistance
Figure 12.12: System Properties Remote tab
Figure 12.13: The Taskbar and Start Menu Properties dialog box
Figure 12.14: The Customize Start Menu tabs
Figure 12.15: Tweak UI Explorer settings
Figure 12.16: The Recycle Bin pop-up menu
Figure 12.17: The Recycle Bin Properties drive tab
Figure 12.18: The Disk Cleanup button
Figure 12.19: The Defragment Now button on the Disk Properties Tools tab
Figure 12.20: Select Encrypt Contents to Secure Data in the Advanced Attributes dialog box
Figure 12.21: The Office XP Tools Security tab
Figure 12.22: The System Properties Automatic Updates tab
Figure 12.23: Windows Update on the Start menu
Figure 12.24: The Windows Update site
Figure 12.25: Ad-aware 6 spyware scan
Figure 12.26: ZoneAlarm ProAlerts & Logs page
Figure 12.27: Norton AntiVirus LiveUpdate
Figure 12.28: Windows Explorer Scan with Norton AntiVirus option
Figure 12.29: The Internet Connection Firewall dialog box
Figure 12.30: The Windows Media Player 9 Privacy tab
Figure 12.31: The MusicMatch Settings with the Permission to Communicate with MusicMatch Server check boxes
Figure 12.32: The Google toolbar Privacy Information option
Figure 12.33: The System Configuration Utility Startup tab

Chapter 13: The Internet Zone

Figure 13.1: The DigiCrime.com Web site
Figure 13.2: The CDT Opt-Out site
Figure 13.3: The FTC "do not call" registry
Figure 13.4: eBay opt-out options
Figure 13.5: Internet OptionsAdvanced Privacy Settings
Figure 13.6: An https // URL
Figure 13.7: Outlook's Junk Senders list
Figure 13.8: The Outlook Rules Wizard
Figure 13.9: The Spywareinfo Web site
Figure 13.10: The PayPal Security Center
Figure 13.11: eBay non-secure seller sign-in

Chapter 14: The Public Zone

Figure 14.1: Homeland Security Advisory System Web site
Figure 14.2: Gene Turner's photo on pickpocket.com
Figure 14.3: A credit card skimmer
Figure 14.4: West Hollywood Sheriff's Station photo enforcement site photos



Invasion of Privacy. Big Brother and the Company Hackers
Invasion of Privacy! Big Brother and the Company Hackers
ISBN: 1592000436
EAN: 2147483647
Year: 2004
Pages: 135
Authors: Michael Weber

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net