Flylib.com
Invasion of Privacy! Big Brother and the Company Hackers
Invasion of Privacy! Big Brother and the Company Hackers
ISBN: 1592000436
EAN: 2147483647
Year: 2004
Pages: 135
Authors:
Michael Weber
BUY ON AMAZON
Table of Contents
BackCover
Invasion of Privacy - Big Brother and the Company Hackers
Introduction
This Book is for You If
How this Book is Organized
Keeping the Book s Content Current
Part I: The Invasion
Chapter 1: The Death of Moore s Law
The Tech Boom, Moore s Law, and the Next Killer App
The Tech Slowdown
Spy Technology
The Dirty Little Secret
Chapter 2: The Target is You
The Player Table
Privacy Zones
Chapter 3: Opting Out
The Digital Doppelganger: Garbage In, Garbage Out
Chapter 4: Convergence
How a Simple Coupon Can Lead to Your Worst Nightmare
Chapter 5: Tactical and Practical Digital Defense (Part 1)
Turnabout is Fair Play
Resourcefulness
Do Not Call List Update
Chapter 6: Surveillance
Spyware
I Spy
Chapter 7: The Cheap Toothpick Syndrome
Social Insecurity
Corporate Heinie-Think
Chapter 8: The Metaphysics of Hacking
The Three Sides of the Hacker Pyramid
The Sport of Hacking
The Business of Hacking
The Hacker Pyramid
The Other Side of the Hacker Pyramid
The IT Pyramid
Chapter 9: Media Meltdown
The Five-Legged Octopus
The Sixth Leg
Nobody Owns Cyberspace
The Media Meltdown
The New-Media Octopus
The Media Knot
The Z Factor: Warez, Sitez, Crackz, and Piratez
The Politics of Piracy
Microsoft versus Apple: The Rematch
The iTunes DRM Model
Snitch or Switch
On a WildTangent: Not all Fun and Games
Who Profits From Selling Your Behind?
A Crystal Ball
The Right Spin on Spyware
Products Too Smart for Their Own Damn Good
The Cheap Toothpick Syndrome
Chapter 10: Badvertising
Animatics
The Day Elvis Died
Mnemonics
Napster Nips Madison Avenue
The Silver Lining
Advertising s Second Heyday
The Stuart Principle
The Day of Reckoning
Testing
How Advertising Became Badvertising
Digital Marketing
The Mousetrap
Ad Blocking
The Advertising Police
Chapter 11: Practical and Tactical Digital Defence (Part 2)
Epilogue
Don t Get Mad. Get Even
Part II: Zone Defense
Chapter 12: The Computer Zone
The Administrator Account
Windows System Restore
When Was the Last Time You Used Remote Assistance?
Convenience versus Paranoia
The Recycle Bin
Performing Disk Cleanup
Defragmenting Your Hard Drive
Windows XP Professional Encryption
Windows Update
Scanning for Spyware
Using a Good Antivirus Software
Using a Good Firewall
Software Defaults
Out-of-the-Box Defaults
Optimizing Your Startup
Password-Protecting Your Computer
Chapter 13: The Internet Zone
Opt-Out Sites
The Federal Trade Commission National Do Not Call Registry
The Cookie Monster
E-Mail and its Evil Twin
Instant Messaging
Downloads and Spyware
Online Scams
Chapter 14: The Public Zone
The Best Way to Avoid Danger
Don t Fit the Profile
Develop a Public Persona
Security Checkpoints
Identity Theft
Credit Card Skimming
Workplace Surveillance
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q - R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X - Z
List of Figures
List of Tables
List of Sidebars
Invasion of Privacy! Big Brother and the Company Hackers
ISBN: 1592000436
EAN: 2147483647
Year: 2004
Pages: 135
Authors:
Michael Weber
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
Library Functions
The fork System Call Revisited
Creating and Accessing Semaphore Sets
D.2. Sample Program for Profiling
D.4. Viewing and Interpreting Profile Data
Software Configuration Management
Project Management in a CM Environment
Configuration Identification
Configuration Management and Software Engineering Standards Reference
Metrics and Configuration Management Reference
Appendix D Problem Change Report
101 Microsoft Visual Basic .NET Applications
Working with Microsoft Visual Studio .NET 2003 and Microsoft .NET Framework 1.1
Working with the Microsoft Visual Basic .NET Language
Building Web Applications
Interacting with the Operating System
Windows Server 2003 for .NET Developers
Special Edition Using Crystal Reports 10
Visualizing Your Data with Charts and Maps
Using the Chart Expert
Understanding Solution Kits for Crystal Enterprise
Crystal Enterprise Architecture
The Server Tier: Introduction to the Crystal Enterprise Framework
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Using the System.Management Namespace
Querying WMI
Instrumenting .NET Applications with WMI
WMI Providers
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Strings and Regular Expressions
XML
Multithreading
Windows Controls
Windows Services
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies