Cover image for Invasion of Privacy : Big Brother and the Company Hackers.
Invasion of Privacy : Big Brother and the Company Hackers.
Title:
Invasion of Privacy : Big Brother and the Company Hackers.
Author:
Weber, Michael.
ISBN:
9781592002504
Personal Author:
Physical Description:
1 online resource (295 pages)
Contents:
Title -- Copyright -- Dedication -- Acknowledgments -- About the Author -- Contents at a Glance -- Contents -- Introduction -- What You'll Find in This Book -- This Book Is for You If -- How This Book Is Organized -- Keeping the Book's Content Current -- PART I The Invasion -- CHAPTER 1 The Death of Moore's Law -- Koyaanisqatsi -- The Tech Boom, Moore's Law, and the Next Killer App -- The Tech Slowdown -- Spy Technology -- The Dirty Little Secret -- CHAPTER 2 The Target Is You! -- Layers, Players, and Privacy Zones -- The Player Table -- Privacy Zones -- Zone Defense -- Trust -- Rats and Habits -- CHAPTER 3 Opting Out -- Practicing Stealth: How to Create a Digital Doppelganger -- The Digital Doppelganger: Garbage In, Garbage Out -- The Golden Rule of Personal Information -- The Three-Ring Information Circus -- The Legal Ring -- The Contractor Ring -- The Circus Ring -- Opting Out -- Privacy Agreements -- Where to Opt Out -- Who to Opt Out From -- Make a List -- Practicing Stealth -- CHAPTER 4 Convergence -- Everything Is Wired to Everything -- How a Simple Coupon Can Lead to Your Worst Nightmare -- When the Moon Hits Your I.D. Like a Big Pizza Pie -- Low-Tech Convergence -- Listless -- Xbox-The Name of the Game Microsoft Is Playing -- CHAPTER 5 Tactical and Practical Digital Defense (Part 1) -- The 2.2 Trillion Fax -- HOW I DISCOVERED FAX.COM -- Turnabout Is Fair Play -- The Fax.com Web Site -- My Fax Story -- Legal Update-March 21, 2003 -- Resourcefulness -- "Do Not Call" List Update -- The National "Do Not Call" Registry Is Online! -- How Does the National "Do Not Call" Registry Work? -- Who Is Covered by the National "Do Not Call" Registry? -- How Does the National "Do Not Call" Registry Square with State Lists? -- Unauthorized Billing -- Caller ID Transmission -- CHAPTER 6 Surveillance -- Wherever You Go, There You Are! -- Spyware.

The Symptoms of Spyware -- The Aureate/Radiate Go!Zilla Fiasco -- I Spy -- Workplace Surveillance -- Minority Report -- Presence Awareness Technology -- Instant Messaging -- Photo Surveillance -- Image Stabilization Technology -- CHAPTER 7 The Cheap Toothpick Syndrome -- Mediocrity and Hypocrisy -- Social Insecurity -- Corporate Heinie-Think -- CHAPTER 8 The Metaphysics of Hacking -- Don't Eat Yellow Snow -- The Three Sides of the Hacker Pyramid -- The Sport of Hacking -- The Business of Hacking -- The Hacker Pyramid -- Hollow Bunnies and Script Kiddies -- Ankle Biters -- Crackers -- Kevin Mitnick's New Leaf -- Kevin Mitnick's Release Conditions -- eBay's Evil Twin-The Black Hat Cracker Auctions -- Cyber Terrorists -- The Stench Of Cyber Terrorism -- Where Were You When The Lights Went Out? -- The Other Side of the Hacker Pyramid -- White Hat Hackers -- Full Disclosure Advocates -- Big Network/Small World -- If It's Wednesday It Must Be Microsoft Security Patch Day -- Intrusion Detectives -- Security Experts -- Top Secret? -- Uncle Sam Wants A Few Good Hackers -- The IT Pyramid -- CHAPTER 9 Media Meltdown -- The Politics of Piracy -- The Five-Legged Octopus -- The Sixth Leg -- Nobody Owns Cyberspace -- The Media Meltdown -- Broadband: The Internet's Baby -- Napster -- The Day the Tech Bubble Burst -- The New-Media Octopus -- The Media Knot -- The Z Factor: Warez, Sitez, Crackz, and Piratez -- The Politics of Piracy -- Microsoft versus Apple: The Rematch -- The iTunes DRM Model -- Snitch or Switch -- On a WildTangent: Not All Fun and Games -- Who Profits from Selling Your Behind? -- A Crystal Ball -- The Right Spin on Spyware -- Products Too Smart for Their Own Damn Good -- The Cheap Toothpick Syndrome -- CHAPTER 10 Badvertising -- How Madison Avenue Killed Rock 'n' Roll -- Animatics -- The Day Elvis Died -- Mnemonics -- Napster Nips Madison Avenue.

The Silver Lining -- Advertising's Second Heyday -- The Stuart Principle -- The Day of Reckoning -- Testing -- How Advertising Became Badvertising -- Digital Marketing -- The Mousetrap -- Ad Blocking -- The Advertising Police -- CHAPTER 11 Practical and Tactical Digital Defense (Part 2) -- An eBay Version of Rocky -- Epilogue -- Don't Get Mad. Get Even! -- PART II Zone Defense -- CHAPTER 12 The Computer Zone -- The Administrator Account -- Granting Other User Accounts Limited Access -- Creating a Dummy Administrator Account for Troubleshooting -- Passwords -- Windows System Restore -- Get in the Habit of Creating Restore Points -- Disabling Error Reporting -- Disabling File and Printer Sharing -- When Was the Last Time You Used Remote Assistance? -- Convenience versus Paranoia -- Tweak UI -- The Recycle Bin -- Performing Disk Cleanup -- Defragmenting Your Hard Drive -- Windows XP Professional Encryption -- Windows Update -- Scanning for Spyware -- Using a Good Antivirus Software -- Updating Your Virus Definitions -- Scanning for Viruses -- Performing On-Demand Virus Scans -- Using a Good Firewall -- Software Defaults -- Windows Media Player 9 -- MusicMatch Jukebox -- The Google Toolbar -- It's Safe to Assume That All Software Profiles and Tracks You! -- Out-of-the-Box Defaults -- Optimizing Your Startup -- Password-Protecting Your Computer -- CHAPTER 13 The Internet Zone -- Opt-Out Sites -- The Federal Trade Commission National "Do Not Call" Registry -- Don't Fall for Strong-Arm Tactics -- Beware of Web Sites with No User Agreement -- Opt Out When You Register -- Transactional Passwords versus Convenience -- The Cookie Monster -- Install a Cookie Manager -- Web Bugs -- Clear Your Web Browser's Cache Memory -- Clear Your Web Browser's History -- Disable AutoComplete -- Secure Sockets Layer -- The First Step to Protect Yourself on the Internet.

E-Mail and Its Evil Twin -- Spam Blockers -- Anti-Spam Plan -- Spammers Can't Spam What They Can't Find -- Delete All Unsolicited E-Mail without Opening It -- Spam Filters -- Instant Messaging -- Downloads and Spyware -- Online Scams -- Web Spoofing -- Dot-Cons -- CHAPTER 14 The Public Zone -- Devise a Vigilant Exit Strategy -- The Best Way to Avoid Danger -- Don't Fit the Profile -- Develop a Public Persona -- Security Checkpoints -- Air Travel -- Keep Your ID Handy -- Protect Your Wallet and Purse from Theft -- Identity Theft -- Credit Card Skimming -- Dispose of Credit Card Receipts Properly -- Workplace Surveillance -- Workplace Privacy -- Photo Enforcement -- That's All, Folks! -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- X -- Y -- Z.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: