Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
The Happy Hacker: A Guide to (Mostly) Harmless Computer Hacking

The Happy Hacker: A Guide to (Mostly) Harmless Computer Hacking

List Price: $34.95
Your Price: $34.95
Product Info Reviews

<< 1 .. 4 5 6 7 8 9 10 >>

Rating: 1 stars
Summary: DO NOT BUY
Review: I'm sorry but this book just sucked, surely the author does not even know how to hack or maybe even turn on her computer. This book will teach you nothing, u'll find more on the net.

Rating: 1 stars
Summary: that book's a joke...
Review: This book is even worth than I had imagined. I've heard a lot of people say that this book is for the absolute beginner. I disagree. This book is for the absolute idiot who was foolish enough to buy this crap. Even Meinel's highly idiotic mailing list is better than this book (because you don't have to pay for the outdated info from her list...)

And one last word...I've heard Meinel complain that hackers hate her book because she explains hacking to the masses...that is entirely incorrect ! Hackers hate her book (or rather, make fun of it and its author) because she makes people believe that the crap she 'teaches' IS hacking...

If you're a beginner get Maximum Security and The C Programming Language as well as a book about TCP/IP (there are many good ones)...BUT DON'T BUY THE HAPPY HACKER !!

Rating: 1 stars
Summary: The Happy Lamer!
Review: Carolyn P. Menial is a perfect example of what, in the terminology, is referred to as a wannabe, a lamer, or an AOL kiddie. Unfortunately, it often happens nowadays that people write books with no clue on the subject they are writing about. The sad thing is that there are dozens of even less-educated kiddies who will buy it. And they have, as Carolyn P. Menial's case proves. However, one thing amazed me: Carolyn P. Menial has of course no idea on any subjects concerning hacking, or, for that matter, on anything that concerns computer. Yet her command of what supposedly is her native language is even worse. Here we have an illiterate who at the same time is a lamer. And she writes books - and sells them! O tempora, o mores...

To Carolyn P. Menial (at the moment posing as a "Security Expert" - sic!): publishing your daughter's data was an excellent move to hit you. May it eventually prove to be the least damaging one of all that attacks that you will hopefully suffer.

Rating: 4 stars
Summary: A MUST READ FOR NEWBIES!!!
Review: A very interesting book for anyone who wants to get into the world of hacking. But this is just for beginners who would like to learn about the basics.

Rating: 5 stars
Summary: A great book for begining hackers.
Review: This was an excellent book. It was really good for teaching the basics, and teaching that true hackers don't break the law, or cause damage. I would recomment this book to anyone who wants to become a hacker.

Rating: 2 stars
Summary: Please read my review... before you pull out your wallet
Review: Let me tell you several things which you'll profit dearly from in life:

1) 'dev/null' is a common path in the Unix OS which obliterates all documents sent to it. Repeat this statement incessantly and you'll probably succeed in appearing smart to a few clueless morons.

2) to change your windows background, goto your control panel window, double-click display, then proceed from there.

3) ftp and telnet to a site and type 'help' for help. Then end your session. Now you're really advancing. Programming is *so* easy. Who would have guessed that printf() is an output statement? Of course that's all you need to know to become proficient in C. Type 'man' for the rest.

4) study the methods involved in faking email paths and sources- particularly those that don't work. Shoot yourself in the foot and say they don't work, but write a couple of hundred Kb files about the techniques anyhow.

5) As you discover random oddities about computing, stand up on a podium and preach about your enlightenment. Regurgitate lines from any old 'Jargon file', then forget what you've said. The media will notice. Revel in the spotlight.

6) Muhahaha.

7) Now the important step: write a little book that can be placed in an infant's Christmas stocking, using your own work which is distributed over the Internet. Don't forget to explain how to use a search engine.. People are generally incompetent these days. Accept your profound ingenuity and uncanny mental aptitude. Entitle the book something like "Dummies for Dummies". Swim in your money.

Now you are 31337. Forward all flames to dev/null@wherever.com.

*Newbie Note: dev/null@wherever.com is an email address*

Do yourself a favour...take a look at the other books on Amazon.com before you decide to invest in "The Happy Hacker".

Rating: 0 stars
Summary: The book both the FBI and Computer Criminals Love to Hate!
Review: Welcome to the second edition of the book that was the trigger that set off the largest hacker war in history -- a war that crested with the three-hour siege of the New York Times web site of Sept. 13, 1998. During that attack, an obscenity-tinged diatribe repeatedly was uploaded to the Times web site -- during peak Sunday morning reading hours. After the New York Times hack, rival gangs Armchair Lumberjacks and Legions of the Underground retaliated by hacking tens of thousands of Web sites, on each insulting HFG.

According to the article "Tracking the Hack" in the Nov. 16, 1998 Forbes magazine, the top inspiration for the Hacking for Girliez rampage was "The Happy Hacker" book. I am "its (Hacking for Girliez) public enemy number one," asserts reporter Adam Penenberg. He describes my book as "a kind of Hacking for Dummies... The goal of the book is to teach 'newbies' how to hack legally. The book's tone irks (those)... who claim to be on a mission to show how porous most computer security is-the law be damned."

According to security expert Winn Schwartau, "If you've ever wanted to know exactly how systems are broken into, this is the book for you." ("Network World" magazine, May 25, 1998, pg. 41.)

"Info Security" magazine's Michael Tucker says "Meinel...is no threat to the public well being... Maybe one of the Happy Hacker's protégés will end up on your staff one day."

I have also also authored "How Hackers Break in ...and How they Are Caught," which appeared in the October 1998 issue of "Scientific American" magazine. I am currently writing about my adventures at the epicenter of the biggest hacker war in history.

The latest news in the saga of The Happy Hacker book is that the Albuquerque FBI office has repeatedly demanded that I take a lie detector test to prove I'm not the guy who hacked the "New York Times" web site. Gosh, I don't know whether to be flattered that they think I'm that good a hacker, or insulted that they think I'm the kind of person who would put up obscenity-laced Web sites all over the place. I'm in favor of *legal* and *harmless* hacking!

Table of Contents for second edition, The Happy Hacker: a Guide to Mostly Harmless Computer Hacking

Introduction: So You Want to Be a Hacker?

Section 1: Hacking with Windows

1.1 How to Turn your Windows 95/98 Computer into a Haxor Box

1.2 How to Break into Windows 95/98 Computers

1.3 How to Use Windows to Hack the Internet

1.4 Mac Hacking

1.5 How to be a Hero in Computer Lab

1.6 Hacker Wars on Internet Relay Chat

1.7 How to Forge Email Using Eudora Pro

1.8 How to Dig Up Hacking Information on the Internet

Section 2: Hacking with Unix

Introduction to Section 2

2.1 How to Get a Good Shell Account -- and Keep it

2.2 Hacking with Finger

2.3 Heroic Hacking in Half an Hour

2.4 How to Decipher Headers -- Even Forged Headers

2.5 Linux!

2.6 Port Surf's Up!

2.7 How to Map the Internet

Section 3: Programming for Hackers

Introduction to Section 3

3.1 Introduction to Shell Programming

3.2 Advanced Shell Programming: A Computer Break-in Shell Script Explained

3.3 How to Write, Link and Compile C Programs;an Exploit Explained

Section 4: Welcome to War!

Introduction to Section 4

4.1 How to Break into Computers

4.2 How to Fight Spammers

4.3 Email Bombs

4.4 Hacker War

4.5 Congratulations, you Have a Computer Virus

4.6 War Tools: Scan, Sniff, Spoof and Hijack

4.7 How Hackers Break in -- and How they Are Caught (reprint of my Scientific American article)

4.8 Busted!

Section 5: Hacker Culture

5.1 The History of Hacking

5.2 Real Hackers

5.3 How to Meet Other Hackers

5.4 Hacker Humor

Index

Rating: 5 stars
Summary: justa dude from ONLINE
Review: This book has nothing but, poor qualaty. for thos hackers who want to read this book, i would say don't.Instead lear on the web, it's nothing, it's just going to tell you a bigganing things. this book is not the way that so many people are thinking of.

Rating: 5 stars
Summary: A great book for Newbies and Some Network Administrators
Review: This book is not for everyone - but if you would like to learn some neat tricks, find some holes in your security and be amused then you are here. If you consider yourself a Hacker GURU - it's not for you, Write your own book! But for the average person wanting to learn more, this is it! One nice thing is that it will help you stay out of trouble with the the members of law enforcement, it will tell you what you can legally do and when it CAN get you in trouble! If you are looking for a guide to get you into Chase Manhattan's main system and transfer Millions of dollars to all of your friend's accounts, it will fall short. It does go over the start of some nice knowledge building blocks that can help out the average (even some elite) users and make computing fun and safer.

Rating: 5 stars
Summary: Great for newbies
Review: In response to all of you who gave negative reviews of this book, I assume you must have been born "31337". This is a good book for:

1) Newbie hackers

2) Casual hacker-wannabes

3) Those who will probably never touch UNIX

This book is, plain and simple, a lot of fun!

As for those books written by 'security experts', I've found that they contain 50% utterly useless technical drivel, 35% outdated crap, and if you're lucky, a nice hint or two on security.


<< 1 .. 4 5 6 7 8 9 10 >>

© 2004, ReviewFocus or its affiliates