Part II: Zone Defense


Chapter List

Chapter 12: The Computer Zone
Chapter 13: The Internet Zone
Chapter 14: The Public Zone

Part Overview

The Hacker's Guide To Privacy

We've come full circle. The first section of this book examined the dark side of technology; the final section reveals the bright side; how to use technology to protect your privacy. Figure II.1 pinpoints the zones in which our privacy is subject to invasion. Regardless of which zone you're in, there are practical steps you can take to secure your privacy and personal information. I sought the advice of several hackers and security experts profiled in this book to prepare a practical guide to help you protect yourself. That's what zone defense is all about.

click to expand
Figure II.1: Privacy zones illustration

You're a target! Wherever you go, there you are. Presence awareness technology is here. Our information is being harvested and there's nothing we can do about it! But you can protect your privacy by practicing stealth and using your digital doppelganger. Common sense and technological countermeasures can help you evade the invaders !

I hope you enjoyed reading this book as much as I enjoyed writing it. I'd like to end it with these three words...

Think for yourself!

click to expand
Figure II.2: Target illustration



Invasion of Privacy. Big Brother and the Company Hackers
Invasion of Privacy! Big Brother and the Company Hackers
ISBN: 1592000436
EAN: 2147483647
Year: 2004
Pages: 135
Authors: Michael Weber

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net