Steal This Computer Book 4.0: What They Won't Tell You About the Internet Paperback – 21 May 2006
Customers Who Bought This Item Also Bought
Enter your mobile number below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
Getting the download link through email is temporarily not available. Please check back later.
To get the free app, enter your mobile phone number.
About the Author
Best-selling computer book author Wallace Wang (The Book of Nero 6, Steal This File Sharing Book, both No Starch Press, and Visual Basic 6 for Dummies), is a former contributor to Boardwatch Magazine, where he wrote a monthly column called "Notes From the Underground." He is a successful stand-up comic who has appeared on A&E's "Evening at the Improv" and appears regularly at the Riviera Comedy Club in Las Vegas.
What Other Items Do Customers Buy After Viewing This Item?
Top Customer Reviews
Chapter 4 talks about buying computers and software. It helped me out by giving me some tricks to do next time I buy a computer.
Chapter 5 tells you about keeping your files secure with encryption. It tells you about some different types of encryption algorithms and how to write your own encryption programs. It also shows you how to play some dirty tricks. It talked about using anonymous remailers to send anonymous email and talked about just how anonymous they were. It even told you how to surf the web anonymously so that people couldn't receive information about your computer, browser, and more.
Chapter 6 told about phone phreaking history such as captian crunch. Wallace then goes on by telling you possibly things that could've happened but didn't. When telling these stories he tries to make himself sound like a phreaker but he didn't even do anything. Then, he tells your some really obvious stuff like "To start phone phreaking, you need access to a telephone." and "phreaking from your own phone will let the telephone company trace it to your house." I don't know if he couldn't think of anything else or he thinks you are really stupid. After that, he talks about phreaking color boxes and then goes on to voice mail hacking. Then, he talks about cellular phone fraud and tv satellite descrambling.
Chapter 7 talks about defeating windoz 3.1/95/98 screen saver passwords which if you ever tried you should've done it on the first or second try.Read more ›
The main focus is education: to make you aware of what people can do to your computer and how to protect yourself. It provides a good overview of the possible threats to your computer, most of them from online sources, and it provides some details about what you can do to protect against them as well finding/removing threats that already exist. There is a light touch of humour through out so don't be worried about a possible dry/boring read.
There is some technical detail, and a few practical guides, but no advanced how-to guides. The book provides a broad scope but not a lot of depth. Fortunately it also provides refences to other resources that you can follow up with your own research. For someone with no background in computing then there will be a lot of new information, some of that information is dated due to a publication date of 2006, but some of the information was even dated in 06 (eg war dialling). From a perspective of posterity it is nice that the information is there but is essentially useless from a modern perspective where broadband is the norm.
Unfortunately, after just the first two chapters (at which point I gave up and returned the book), it became obvious that the writer (who appears to have excellent credentials including writing for BOARDWATCH magazine) just threw this together with no thought whatsoever.
*He talks about free E-mail (such as Juno) then totally skips over web based free email (Mailexcite, USA.net, Yahoo, etc) when talking about accessing e-mail from cyber cafes and the like. In fact, he states on pages 64-65 that receiving e-mail at cyber cafes is not possible!
And this book was (allegedly) written in June '98 at the height of the spree to put these free e-mail sites up.
*Mo mention of access to the web via the public library system (though local freenets are mentioned).
*A discussion on obtaining upgrades of software by trading in old versions (obtained from outlets that specialize in outdated versions) plus a modest charge failed to point out that those outdated versions may be more than adequate for the user on a budget (I'm still running some DOS programs for cryin' out loud).
Finally, I tried to contact the author and found that there is no e-mail address in the book.
A usenet search (dejanews) using his name ironically came back with a similar recent complaint from some people who wanted to complain about a recent BOARDWATCH article. I at least have the guts to take any flames/spam for =my= comments...
It was obvious that this was thrown together in hours for a fast buck. Unfortunate, because a well written book of this type is needed.
So save your bucks. This book is a dog.
Most Recent Customer Reviews
An eye-opener into what happens on the internet. Didn't know what half of the stuff meant-but I'll learn by re-reading it a few times.Published on 8 Aug. 2013 by allan murray
I found this book to be pretty easy to get into, with a lot of things I didn't know about (I'm a newbie). Read morePublished on 25 Aug. 1999
The book needed more fact checking, as there were several inaccuracies when discussing aspects of the computer underground. Lacking in details of true underground information. Read morePublished on 23 Aug. 1999
"Steal This Computer Book" is a good introduction to the existence of the dark side of computing, but there's not a whole lot here for the advanced user. Read morePublished on 26 July 1999
If you're a newbies in hacking, this book cover almost everything but it's not in detail.Published on 20 July 1999
this book is great,it is written by a stand up comic so it does have humor unlike those serious bill gates books that everyone hates...... Read morePublished on 20 July 1999
Thier is no real useful information. The whole book is outdated now. Their was no real content, just a huge listing of websites that are not even their anymore.Published on 2 July 1999
BAAAD Book. This book is about how to hack computer. This guy, Wallace Wang, managed to write 340 pages and yet said nothing. Read morePublished on 15 Jun. 1999