Flylib.com
Invasion of Privacy! Big Brother and the Company Hackers
Invasion of Privacy! Big Brother and the Company Hackers
ISBN: 1592000436
EAN: 2147483647
Year: 2004
Pages: 135
Authors:
Michael Weber
BUY ON AMAZON
Table of Contents
BackCover
Invasion of Privacy - Big Brother and the Company Hackers
Introduction
This Book is for You If
How this Book is Organized
Keeping the Book s Content Current
Part I: The Invasion
Chapter 1: The Death of Moore s Law
The Tech Boom, Moore s Law, and the Next Killer App
The Tech Slowdown
Spy Technology
The Dirty Little Secret
Chapter 2: The Target is You
The Player Table
Privacy Zones
Chapter 3: Opting Out
The Digital Doppelganger: Garbage In, Garbage Out
Chapter 4: Convergence
How a Simple Coupon Can Lead to Your Worst Nightmare
Chapter 5: Tactical and Practical Digital Defense (Part 1)
Turnabout is Fair Play
Resourcefulness
Do Not Call List Update
Chapter 6: Surveillance
Spyware
I Spy
Chapter 7: The Cheap Toothpick Syndrome
Social Insecurity
Corporate Heinie-Think
Chapter 8: The Metaphysics of Hacking
The Three Sides of the Hacker Pyramid
The Sport of Hacking
The Business of Hacking
The Hacker Pyramid
The Other Side of the Hacker Pyramid
The IT Pyramid
Chapter 9: Media Meltdown
The Five-Legged Octopus
The Sixth Leg
Nobody Owns Cyberspace
The Media Meltdown
The New-Media Octopus
The Media Knot
The Z Factor: Warez, Sitez, Crackz, and Piratez
The Politics of Piracy
Microsoft versus Apple: The Rematch
The iTunes DRM Model
Snitch or Switch
On a WildTangent: Not all Fun and Games
Who Profits From Selling Your Behind?
A Crystal Ball
The Right Spin on Spyware
Products Too Smart for Their Own Damn Good
The Cheap Toothpick Syndrome
Chapter 10: Badvertising
Animatics
The Day Elvis Died
Mnemonics
Napster Nips Madison Avenue
The Silver Lining
Advertising s Second Heyday
The Stuart Principle
The Day of Reckoning
Testing
How Advertising Became Badvertising
Digital Marketing
The Mousetrap
Ad Blocking
The Advertising Police
Chapter 11: Practical and Tactical Digital Defence (Part 2)
Epilogue
Don t Get Mad. Get Even
Part II: Zone Defense
Chapter 12: The Computer Zone
The Administrator Account
Windows System Restore
When Was the Last Time You Used Remote Assistance?
Convenience versus Paranoia
The Recycle Bin
Performing Disk Cleanup
Defragmenting Your Hard Drive
Windows XP Professional Encryption
Windows Update
Scanning for Spyware
Using a Good Antivirus Software
Using a Good Firewall
Software Defaults
Out-of-the-Box Defaults
Optimizing Your Startup
Password-Protecting Your Computer
Chapter 13: The Internet Zone
Opt-Out Sites
The Federal Trade Commission National Do Not Call Registry
The Cookie Monster
E-Mail and its Evil Twin
Instant Messaging
Downloads and Spyware
Online Scams
Chapter 14: The Public Zone
The Best Way to Avoid Danger
Don t Fit the Profile
Develop a Public Persona
Security Checkpoints
Identity Theft
Credit Card Skimming
Workplace Surveillance
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q - R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X - Z
List of Figures
List of Tables
List of Sidebars
Invasion of Privacy! Big Brother and the Company Hackers
ISBN: 1592000436
EAN: 2147483647
Year: 2004
Pages: 135
Authors:
Michael Weber
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Introduction to Computer Programming
Basic Graphics Commands
The Art of Using Animated Sprites for 2D Games
Playing Some Tunes CD Audio, MIDI and MP3 Music
Appendix A Answers to the Chapter Quizzes
Qshell for iSeries
Scripting
Parameters and Variables, Defined
Using Parameters and Variables
Archives and Compression
C and C++ Development Tools
Beginning Cryptography with Java
Symmetric Key Cryptography
Message Digests, MACs, and HMACs
Key and Certificate Management Using Keystores
CMS and S/MIME
Appendix A Solutions to Exercises
The .NET Developers Guide to Directory Services Programming
Virtual List View Searches
Summary
Techniques for Extending the Schema
Managing User Account Features
Summary
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The Microsoft Client Library for AJAX
The Pulsing Heart of ASP.NET AJAX
Partial Page Rendering
Built-in Application Services
Building AJAX Applications with ASP.NET
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Gaining Drawing Strategies: Part 2
Using Layers to Organize Your Drawing
Controlling Text in a Drawing
Managing External References
Printing an AutoCAD Drawing
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies