Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Steal This Computer Book

Steal This Computer Book

List Price: $19.95
Your Price:
Product Info Reviews

<< 1 >>

Rating: 4 stars
Summary: Amusing and informative.
Review: A great way of teaching some of the less enlightened about computer saftey some of the ins and outs. It has some wonderful information. One complaint: it doesn't really *tell* you how to certain things, just hints at how you could find out.

Highly recommended.

Rating: 1 stars
Summary: Not even close to a hacker book.
Review: Fist of all it is a cracker not a hacker. A hacker is some one who enjoys learning about computers and breaks down software to learn about it. Cracking is attacking another computer. Second of all it uses Visual Basic. VB is THE worst programming language. No hacker or cracker would recommend the use of such. It tells you how to be a Skript Kiddie. A SK is some one who uses other peoples software and goes around saying they are a hacker or a cracker. Thirdly virus writers aren't good people. They are niether hackers or crackers. They are black hat crackers(NOT HACKERS). A cracker has ethics and is often reffered to as a white hat hacker. Blacks do bad things, and get little benefit if not zero, but merely enjoy ruining other peoples computers. Black hat hackers are usually SKs with a wee bit more knowledge.

If you want to be a hacker(which if you are a good one, means you can probably crack), I recommend using Linux, learning C and C++, Networking, A+ certified(don't actually get certified but get a book, it provides basic hardware info). Get to know GCC and become fluent in C and C++. If you know no language and they will be your first, I recommend Python. Python is a good starting language. But first of all switch to Linux. use sourceforge.net and tldp.org for info and free software. That'll start you up. Oh yeah...never use the "elite" jargon. If you use this you are no cracker you are a SK.

Rating: 2 stars
Summary: Doormatt
Review: From the outside the book might appear to contain an abundance of useful information, while in fact this is merely a disguise. In actuality it focuses too much effort on redundancy of useless information with the wrong intension. The book is great if you want to know locations of popular search engines or the local news in Third World Countries that no one really thinks exist. Some ideas were actually present, but were not presented very well and are extreamely incomplete. "Steal This Computer Book" does have a lot of potential and I hope that Wallace Wang does release newer editions of this book as promised. I am curious to see where he takes the book in the future, but for the time being, in my opinion, it needs a new cover. -dM

Rating: 1 stars
Summary: Misleading, Basic Hacker Ha!
Review: I do NOT reccomend this book. I ordered it, and I thought that maybe something useful would be in it... all this book does is explain "WHAT" hackers do, not "HOW" they do it... if you are looking for a HOW book, i reccomend Maximum Linux Security... dont hesitate to buy that one, you wont put it down! (until the last few chapters where it kinda starts getting repetitious) but it is a GREAT how book if you ask me.

Rating: 5 stars
Summary: A real mind buster !
Review: I had seven days of my live. This book showed me stuff I didn't know excisted. This book opened a whole new world on the internet. INCREDIBLE !

WE NEED MORE OF THESE KIND OF BOOKS!

Rating: 4 stars
Summary: Good book. It is worth your money. (unless you're a bum. )
Review: Overall this is a good book. The first part is sorta stupid, though. It talks mainly about how not to only listen to one person but to get information from multiple sources. It could be summed up in about a page.

Chapter 4 talks about buying computers and software. It helped me out by giving me some tricks to do next time I buy a computer.

Chapter 5 tells you about keeping your files secure with encryption. It tells you about some different types of encryption algorithms and how to write your own encryption programs. It also shows you how to play some dirty tricks. It talked about using anonymous remailers to send anonymous email and talked about just how anonymous they were. It even told you how to surf the web anonymously so that people couldn't receive information about your computer, browser, and more.

Chapter 6 told about phone phreaking history such as captian crunch. Wallace then goes on by telling you possibly things that could've happened but didn't. When telling these stories he tries to make himself sound like a phreaker but he didn't even do anything. Then, he tells your some really obvious stuff like "To start phone phreaking, you need access to a telephone." and "phreaking from your own phone will let the telephone company trace it to your house." I don't know if he couldn't think of anything else or he thinks you are really stupid. After that, he talks about phreaking color boxes and then goes on to voice mail hacking. Then, he talks about cellular phone fraud and tv satellite descrambling.

Chapter 7 talks about defeating windoz 3.1/95/98 screen saver passwords which if you ever tried you should've done it on the first or second try. It also talks about cracking program passwords and then it goes on to defeating parental control software. If you can't access certain web pages, Wallace tells you how by having the html code emailed to you. He also shows you how to read banned books in secret.

Chapter 8 talks about harassing online services, how pedophiles stalk innocent children and what you can do to stop them. He tells you about generating fake credit card numbers and making your own online harassment program.

Chapter 9 talks about stopping spam. It shows you multiply ways to take revenge on spammers. If the spammer used a forged email address, Wallace shows you how to track down the spammer like two magnets attracting each other.

Chapter 10 shows some pictures of acctual hacked web sites and how to hack them.

Chapter 11 shows you how to track people down by using specific things about them. For example if you only had their SSC# how you could still find them no matter where they were. At the end of the chapter, he shows you how to hide yourself if you don't want to be tracked down or how to let someone easily find you if, for example, you gave your child up for adoption years ago and you don't want to contact him/her but you do want to let them find you if they ever wanted you.

Chapter 12 shows you about ConGames on the Internet. It shows you how to do them and how to protect yourself from them.

Chapter 13 Viruses Part I. ( I heard that the plural form of virus is exposed to be virii, just like the plural form or fungus is fungi but in the book it is written viruses so that's how I will spell it.)

This chapter expains what viruses are, the parts of them, how to tell if you have a virus on your computer, the different infection methods, if all viruses are bad and how to learn more about them.

Chapter 14 Viruses Part II.

This chapter shows the different methods of how an antivirus program works and what to do if you find a virus ( If you say any idiot knows that if you find one you should delete it, but you could also send it in to an antivirus program if you think it is a uncommon virus, keep a copy of it, modify the virus and make a new one and many other things.)

Chapter 15 tells you about writing your own computer virus. Wallace also tells you to watch out because viruses sometimes attack their own creators. He tells you some true things about antivirus companies like how they hire virus writers to help them detect viruses (makes sense, doesn't it) and how that their isn't any evidence of this, but that they may hire the virus writers to write a virus that only they have the antidote for so people will buy their program to detect it.

Chapter 16 is about Java applets. I haven't read all of it but so far so good.

Appendice A is the glossary with a decent amount of terms covered in the book. I really haven't used it too much because I never needed to.

Appendice B is Visual Basic 3.0 ( a very easy programming language that I suggest you learn ) source code for altering Mega$hack. A program he discusses in 12. ( it is used by cons but he alters it so they get a taste of their own medicine.) The source code is written on the page so you will have to type it into your Visual Basic Compiler.

Appendice C is about additional resources. It is compiled of online magazines, webpages, hacker conventions and more.

Summary: This book is for you if you are interested in the above things. The websites and newsgroups in the book lead to nothing except for a few like metacrawler that he obviously was paid to advertise for. If you are still unsure after unreading all the reviews, go to a local bookstore and see if they have this book there. If they do then look at it, see if you like it and if so, compare the prices of Amazon plus the shipping and time to the prices of the bookstore. I hope that this review helped you because I know what it is like to have one person rate it 5 stars and another person rate it 1 star. Sinse this is a pain, I figured that instead of giving my opinion, I would tell you what the book had in it.

Rating: 1 stars
Summary: Lame
Review: This looks like a overview done by some mainstream news show reporter who is mostly clueless. Ex. under how to hack Linux is to download/install a copy and practice using it--end of lesson. Well duh! Chapter on viruses talks only about having a virus checker. Oooh, big secret. They killed a tree for this?

The chapter titles promise, but the material just doesn't deliver except for some links that are probably out of date. Whether you think this will tell you how to hack or whether you want to learn about hacking and secuity matters to protect your system, you will be sorely disappointed. Computer neophytes should save money and buy a used copy to put on their bookshelves to impress their equally neophyte friends.


<< 1 >>

© 2004, ReviewFocus or its affiliates