Hack Attacks Encyclopedia: A Complete History of Hacks, Cracks, Phreaks and Spies Over Time Paperback – 4 Sep 2001
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
" The author has amassed an enormous amount of material and it is supplemented by a bound–in CD–ROM in each book". (Software World, May 2002)
From the Author
Step Inside the Real World-A Glimpse into the Hacker's Underground
I know of a reality where computer crime is a lifestyle. Places where your social security and credit card numbers are traded with pokerfaced anonymity. Places where even the most guarded computers are vulnerable to sophisticated hack attacks. These places share a common name-a name composed of alternative vocations such as computer hacking and cracking, software pirating, phone system phreaking, information sniffing, identity spoofing, communication spying, and corporate espionage. The name is the Underground-a virtual locality that hackers call home.
Did you know you could unintentionally download malicious programs that can make the most threatening virus seem harmless? These programs are designed to allow a remote attacker the ability to secretly control your network server or personal computer. Hackers can collect passwords, access accounts (including e-mail), modify documents, share hard drive volumes, record keystrokes, capture screen shots, and even listen to conversations from your computer's microphone.
Did you know by simply browsing the Internet, wherever you go and whatever you do, almost anyone can track your movements while collecting personal information about you? Hackers can easily exploit this critical information leak, and collect data right from your web browser.
As the world becomes increasingly networked through the Internet, competitors, spies, disgruntled employees, bored teens, and hackers more frequently invade others' computers to steal information, sabotage careers, and just to make trouble. Together, the Internet and the World Wide Web have opened a new backdoor, through which a remote attacker can invade home computers or company networks and electronically snoop through the data therein. The continued growth of the Internet, along with advances in technology, mean these intrusions will become increasingly prevalent. Today, external threats are a real-world problem for any company or home with connectivity. To ensure that remote access is safe, that systems are secure, and that security policies are sound, users in all walks of life need to understand the hacker, know how the hacker thinks-in short, become the hacker.
Most people hardly realize the threats they face from within their company networks to their home computers. More than likely, there have been hack attacks unbeknownst to you-in your neighborhood, down your block, next door, even in your home. If you think you're safe, you're probably not. Join me through the maelstrom of chaos, from where malicious hackers attack. Follow me through the Hack Attacks series, to the very core of the Underground, as we expose these attacks, and lockdown our networks, our personal computers, and our privacy. You are faced with a challenging technogothic journey, and I'll be your guide. Malicious individuals are infesting the world of technology. My goal is to help mold you into something better I'm going to make a virtuous hacker guru out of you.See all Product Description
Top Customer Reviews
The book begins with the almost obligatory explanation of the original meaning of the word 'hacker' as someone who is able to produce elegant or faster-running (or both) solutions to programming problems along with the accompanying explanations of the differences between hackers, crackers and phreakers. It goes on to give an interesting historical synopsis from the 1950's to the present listing significant events which are relevant to the subject, or, in the author's opinion, likely to be of interest to someone reading a history of hacking.
Following on from this it's split into chronologically ordered sections covering hacking and cracking. Each section really just lists the files for the equivalent directory on the CD and gives a short summary of the file's origins and contents and details of where to look on CD-ROM. It's interesting (in places) but there isn't a great deal in the early sections that is of any practical use. The later sections do include some interesting stuff relating to more modern Windows and UNIX systems.
Among the appendices is a glossary of over 200 pages which provides a guide to terminology used in this field. It provides a dictionary of hacking with plenty of information provided and is useful both as a general reference and for explanations of some of the less well known terms which crop up in the main text.
The main problem is that the book is hundreds of pages long, but other than the introduction and history of hacker culture at the beginning and the glossary at the end, the entire thing is filled with snippets and excerpts from the CD. It's interesting as an illustration of some aspects of hacker culture and the evolution of hacking and cracking, but probably a bit overpriced.
Most Helpful Customer Reviews on Amazon.com (beta)
Hack Attacks Encyclopedia starts back in the mists of time, chronicling John Draper's long-distance telephony adventures as Captain Crunch (that is, before he wrote Easy Writer, the original IBM PC word processor). If you were too young for the '60s or early '70s, Chirillo quotes some anarchist texts that put you right in the spirit. His timelines and narratives then take you through "the golden age" (1980-1989); "the great hacker war" (1990-1994); the age of "zero tolerance" (1994-1999), and beyond the millennium.
Of course, the heart of the book isn't the narrative. Together, the book and CD-ROM assemble nearly 2,000 historic texts, program files, code snippets, and hacking/security tools -- files as old as the '70s and as new as tomorrow's headlines. You name it: password programs, Unix/Linux scripts, remote hacks for Windows systems, scanners, sniffers, spoofers, flooders, keystroke capture programs, virus hacks -- not just one variation but many. A veritable cornucopia of digital anarchy. (Bill Camarda)"
Denied is the second part to Hack Attacks Revealed, over 500 pages, whose value is in the patches for all the security holes illustrated in the first book. The CD is loaded with compiled programs for securing systems, building firewalling devices, and secure browsing, telnet, ftp, chat, and mail. Again, there are extensive walkthroughs which makes it unique in this category.
Encyclopedia is something completely different. The book is a look at hacking and cracking and phreaking and some I haven't the title for, all from different user submissions from all over the globe. I rated high Revealed and Denied, but this book is much better organzied and a pleasure to read.