General Internet and PCs
The Art of Invisibility
The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Paperback ISBN: 0316380520
Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions. Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity. Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. The world's most famous--and formerly the US government's most wanted--computer hacker, he has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point was on a three-year run from the FBI. Now Mitnick is reformed and widely regarded as the expert on the subject of computer security. Invisibility isn't just for superheroes--privacy is a power you deserve and need in the age of Big Brother and Big Data.
Windows Xp Hacks and Mods for Dummies
Paperback ISBN: 0471748978
Offers tips, techniques, and tools to modify Windows XP, covering such topics as customizing the taskbar, searching on the desktop, using Firefox, using Windows Event Viewer, and changing security settings.
Mapping the Personal Information Economy
Hardcover ISBN: 0262050730
In this book Greg Elmer brings the perspectives of cultural and media studies to the subject of consumer profiling and feedback technology in the digital economy. He examines the multiplicity of processes that monitor consumers and automatically collect, store, and cross-reference personal information. When we buy a book at Amazon.com or a kayak from L.L. Bean, our transactions are recorded, stored, and deployed to forecast our future behavior -- thus we may receive solicitations to buy another book by the same author or the latest in kayaking gear. Elmer charts this process, explaining the technologies that make it possible and examining the social and political implications. Elmer begins by establishing a theoretical framework for his discussion, proposing a "diagrammatic approach" that draws on but questions Foucault's theory of surveillance. In the second part of the book, he presents the historical background of the technology of consumer profiling, including such pre-electronic tools as the census and the warranty card, and describes the software and technology in use today for demographic mapping. In the third part, he looks at two case studies -- a marketing event sponsored by Molson that was held in the Canadian Arctic (contrasting the attendees and the indigenous inhabitants) and the use of "cookies" to collect personal information on the World Wide Web, which (along with other similar technologies) automate the process of information collection and cross-referencing. Elmer concludes by considering the politics of profiling, arguing that we must begin to question our everyday electronic routines.
This Machine Kills Secrets
Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers
Paperback ISBN: 0142180491
Who Are The Cypherpunks? This is the unauthorized telling of the revolutionary cryptography story behind the motion picture The Fifth Estate in theatres this October, and a penetrating look at the facts presented in We Steal Secrets: The Story of Wikileaks, a documentary out now. WikiLeaks brought to light a new form of whistleblowing, using powerful cryptographic code to hide leakers’ identities while they spill the private data of government agencies and corporations. But that technology has been evolving for decades in the hands of hackers and radical activists, from the libertarian enclaves of Northern California to Berlin to the Balkans. And the secret-killing machine continues to evolve beyond WikiLeaks, as a movement of hacktivists aims to obliterate the world’s institutional secrecy. Forbes journalist Andy Greenberg has traced its shadowy history from the cryptography revolution of the 1970s to Wikileaks founding hacker Julian Assange, Anonymous, and beyond. This is the story of the code and the characters?idealists, anarchists, extremists?who are transforming the next generation’s notion of what activism can be. With unrivaled access to such major players as Julian Assange, Daniel Domscheit-Berg, and WikiLeaks’ shadowy engineer known as the Architect, never before interviewed, Greenberg unveils the world of politically-motivated hackers?who they are and how they operate.
The Hacked World Order
How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age
Hardcover ISBN: 1610394151
"The internet today connects roughly 2.7 billion people around the world, and booming interest in the "internet of things" could result in 75 billion devices connected to the web by 2020. The myth of cyberspace as a digital utopia has long been put to rest. Governments are increasingly developing smarter ways of asserting their national authority in cyberspace in an effort to control the flow, organization and ownership of information. In A Hacked World Order, Adam Segal shows how governments use the webto wage war and spy on, coerce, and damage each other. Israel is intent on derailing the Iranian nuclear weapons program. India wants to prevent Pakistani terrorists from using their Blackberries to coordinate attacks. Brazil has plans to lay new fiber cables and develop satellite links so its Internet traffic no longer has to pass through Miami. China does not want to be dependent on the West for its technology needs. These new digital conflicts pose no physical threat--no one has ever died from a cyberattack--but they serve to both threaten and defend the integrity of complex systems like power grids, financial institutions, and security networks"--
Droid 4 For Dummies
Paperback ISBN: 1118336747
As compared to the existing smartphone For Dummies titles, this one is very concise. The chapter size is between 8 and 12 pages, covering very basic information in a friendly, informative, and entertaining style. The basic items covered include setup, operation as a phone, communications using texting, e-mail, the web, social networking, and (if the hardware supports it) video chat. Information is provided on any apps specific to the phone, as well as details on how to use the Android Market. Connection and configuration information is discussed on a detailed level. The book's goal is for the reader to get more out of their smartphone than offered by the tiresome and limited manual (pamphlet,actually). Along the way they'll be entertained and enjoy the process of discovering what their phone can do. As usual, humor is generously peppered through the text. It provides relief, but never gets in the way of important stuff. The reader will end up keeping this book close, referring to it often as they explore the features of the latest, most technologically wizbang phone in the universe. The book covers: 1. Droid 4 Setup 2. Basic Operations 3. Text and Typing 4. Phone Duties 5. The Address Book 6. Messages In and Out 7. Portable Web Browsing 8. Social Networking 9. Video Chat 10. Phone Apps 11. The Android Market 12. Wireless Networking Wizardry 13. Share and Synchronize 14. Customization
The Internet Is a Playground
Irreverent Correspondences of an Evil Online Genius
Paperback ISBN: 1585428817
The Internet personality and creator of 27bslash6.com presents an uproarious collection of online mischief and comedy that includes such viral successes as "Next Time I'll Spend the Money on Drugs Instead" and "Missing Missy." Reprint. 40,000 first printing.
How Two Lost Boys Rode the Internet Out of Idaho
Paperback ISBN: 0767906993
Describes how two nineteen-year-old working-class kids from a small town in Idaho overcame their lives as outsiders and reveals how they are using the Internet to redefine themselves and change their lives. Reprint.