Flylib.com
Invasion of Privacy! Big Brother and the Company Hackers
Invasion of Privacy! Big Brother and the Company Hackers
ISBN: 1592000436
EAN: 2147483647
Year: 2004
Pages: 135
Authors:
Michael Weber
BUY ON AMAZON
Table of Contents
BackCover
Invasion of Privacy - Big Brother and the Company Hackers
Introduction
This Book is for You If
How this Book is Organized
Keeping the Book s Content Current
Part I: The Invasion
Chapter 1: The Death of Moore s Law
The Tech Boom, Moore s Law, and the Next Killer App
The Tech Slowdown
Spy Technology
The Dirty Little Secret
Chapter 2: The Target is You
The Player Table
Privacy Zones
Chapter 3: Opting Out
The Digital Doppelganger: Garbage In, Garbage Out
Chapter 4: Convergence
How a Simple Coupon Can Lead to Your Worst Nightmare
Chapter 5: Tactical and Practical Digital Defense (Part 1)
Turnabout is Fair Play
Resourcefulness
Do Not Call List Update
Chapter 6: Surveillance
Spyware
I Spy
Chapter 7: The Cheap Toothpick Syndrome
Social Insecurity
Corporate Heinie-Think
Chapter 8: The Metaphysics of Hacking
The Three Sides of the Hacker Pyramid
The Sport of Hacking
The Business of Hacking
The Hacker Pyramid
The Other Side of the Hacker Pyramid
The IT Pyramid
Chapter 9: Media Meltdown
The Five-Legged Octopus
The Sixth Leg
Nobody Owns Cyberspace
The Media Meltdown
The New-Media Octopus
The Media Knot
The Z Factor: Warez, Sitez, Crackz, and Piratez
The Politics of Piracy
Microsoft versus Apple: The Rematch
The iTunes DRM Model
Snitch or Switch
On a WildTangent: Not all Fun and Games
Who Profits From Selling Your Behind?
A Crystal Ball
The Right Spin on Spyware
Products Too Smart for Their Own Damn Good
The Cheap Toothpick Syndrome
Chapter 10: Badvertising
Animatics
The Day Elvis Died
Mnemonics
Napster Nips Madison Avenue
The Silver Lining
Advertising s Second Heyday
The Stuart Principle
The Day of Reckoning
Testing
How Advertising Became Badvertising
Digital Marketing
The Mousetrap
Ad Blocking
The Advertising Police
Chapter 11: Practical and Tactical Digital Defence (Part 2)
Epilogue
Don t Get Mad. Get Even
Part II: Zone Defense
Chapter 12: The Computer Zone
The Administrator Account
Windows System Restore
When Was the Last Time You Used Remote Assistance?
Convenience versus Paranoia
The Recycle Bin
Performing Disk Cleanup
Defragmenting Your Hard Drive
Windows XP Professional Encryption
Windows Update
Scanning for Spyware
Using a Good Antivirus Software
Using a Good Firewall
Software Defaults
Out-of-the-Box Defaults
Optimizing Your Startup
Password-Protecting Your Computer
Chapter 13: The Internet Zone
Opt-Out Sites
The Federal Trade Commission National Do Not Call Registry
The Cookie Monster
E-Mail and its Evil Twin
Instant Messaging
Downloads and Spyware
Online Scams
Chapter 14: The Public Zone
The Best Way to Avoid Danger
Don t Fit the Profile
Develop a Public Persona
Security Checkpoints
Identity Theft
Credit Card Skimming
Workplace Surveillance
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q - R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X - Z
List of Figures
List of Tables
List of Sidebars
Invasion of Privacy! Big Brother and the Company Hackers
ISBN: 1592000436
EAN: 2147483647
Year: 2004
Pages: 135
Authors:
Michael Weber
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Transmitting a DataSet Securely
Synchronizing a DataSet with an XML Document
Refreshing a DataSet Automatically Using Extended Properties
Counting Records
A.4. Interfaces
Beginning Cryptography with Java
The JCA and the JCE
Symmetric Key Cryptography
Object Description in Cryptography Using ASN.1
Certificate Revocation and Path Validation
SSL and TLS
Lotus Notes and Domino 6 Development (2nd Edition)
Forms Design
Formula Syntax
Real-World JavaScript Examples
Incorporating Flash into Your Web Pages
Database Access Control Lists
Systematic Software Testing (Artech House Computer Library)
Analysis and Design
Improving the Testing Process
Some Final Thoughts…
Appendix E Simplified Unit Test Plan
Appendix F Process Diagrams
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
The Microsoft Client Library for AJAX
Partial Page Rendering
Built-in Application Services
Building AJAX Applications with ASP.NET
Microsoft Office Visio 2007 Step by Step (Step By Step (Microsoft))
Changing the Layout of Connected Shapes
Key Points
Creating Network Diagrams
Storing Information with Network Shapes
Key Points
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies