Hack Attacks Encyclopedia: A Complete History of Hacks, Cracks, Phreaks and Spies Over Time Book + PRICE WATCH * Amazon pricing is not included in price watch

Hack Attacks Encyclopedia: A Complete History of Hacks, Cracks, Phreaks and Spies Over Time Book

Hack Attacks Encyclopedia is a collection of hacker goodies in print and on CD-ROM. Gleaned from file repositories old and new, the collection includes handy, potentially naughty utilities--process listers, password crackers, and port scanners, among others--and scores of text articles. The text articles explain how to extract value from systems of various kinds (mostly the North American telecommunications network and various kinds of computers). Reading articles about how to get free calls from (1980s-vintage) payphones is interesting, and articles (some quite old) written by hackers about themselves and their community reveal a lot of truth. In order to appreciate this book, you have to take note of the word History in its subtitle. That word appears because the articles in this book, though many of them make excellent reading, deal largely with old technologies and well-known attacks for which defenses now exist. Interesting problems that contemporary hackers may have solved--such as how to get free satellite Internet access, how to defeat ATMs' "service fees," how to defeat password protection on Windows XP, and how to get an overwhelming number of positive reviews to appear for your book--aren't covered. This book is all about the exploits of the past. Articles about how to get free phone calls on old pulse-signaling public phones aren't of much practical value anymore, and viruses for the Amiga computer are of purely academic interest these days (though virus source code, several examples of which appear here, shows up in few other books). Therefore, don't buy this book so much for how-to information as for its history lessons and entertainment value. Read it for its first-hand look at hacker culture. That said, Hack Attacks Encyclopedia would be a lot better if John Chirillo had looked at his considerable collection of text files and software and unified it with a running narrative. Good historians and documenters of cultures don't just present primary sources without annotating them. They use their knowledge and skill to derive meaning from the primary sources, and perhaps make some predictions about the future. --David Wall Topics covered: Hack attacks--which is to say, tools and techniques for getting services and information you're not really supposed to have--through the ages (mostly in the 1970s, 1980s, and early 1990s). Emphasis falls on "harmless" hacker exploits, such as getting free phone calls, rather than on "black-hat" stuff like shutting down Web servers for no real reason. A large glossary explains technical terms and hacker lingo. Read More

from£N/A | RRP: £45.00
* Excludes Voucher Code Discount Also available Used from £N/A
  • Product Description

    A complete library of the hottest, never-before-published underground hack variations
    In his highly provocative books, Hack Attacks Revealed (0-471-41624-X) and Hack Attacks Denied (0-471-41625-8), corporate hack master John Chirillo described the tools, techniques, and primary code that hackers use to exploit network security loopholes and then shows specific methods for blocking these attacks. However, now that so many of their standard techniques have been revealed, underground hackers and cyberpunks are again skirting the system, going beyond primary code, and resorting to using complex code variations of old techniques. That's where this book breaks new ground--by providing, for the first time, the most comprehensive compendium of all the complex variations of these techniques, both historical and current, that the hacking underground doesn't want you to see. It offers astounding details on just about every tool used by those who break into corporate networks--information that will go a long way toward helping you close any remaining security gaps. An ideal companion volume to the other "Hack Attacks" books, Hack Attacks Complete:
    o Covers hacks from the 1970s all the way to new millennium hacks
    o Details every permutation, variation, and category of hacking tools
    o Categorizes hacks for easy reference, with such categories as hacking, cracking, phreaking, spying, anarchy and underground spite, and hack/phreak technical library

  • 0471055891
  • 9780471055891
  • John Chirillo
  • 4 September 2001
  • John Wiley & Sons
  • Paperback (Book)
  • 960
  • Pap/Cdr
As an Amazon Associate we earn from qualifying purchases. If you click through any of the links below and make a purchase we may earn a small commission (at no extra cost to you). Click here to learn more.

Would you like your name to appear with the review?

We will post your book review within a day or so as long as it meets our guidelines and terms and conditions. All reviews submitted become the licensed property of www.find-book.co.uk as written in our terms and conditions. None of your personal details will be passed on to any other third party.

All form fields are required.