Black Hat: Misfits, Criminals, and Scammers in the Internet Age Paperback – Sep 21 2004
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.
To get the free app, enter your mobile phone number.
About the Author
John Biggs is a skilled journalist with seven years of intensive, real-world experience in IT programming and management as well as a Master's degree in business and economic reporting/management. He is an expert in open source software, theory and technical aspects. Among the publications he has written for are: Linux Journal New York Times Popmatters.com www.deadmule.com www.toasted-cheese.com www.aphelion-webzine.com Laptop Tech Edge PC Upgrade Surge Pittsburgh City Paper In Pittsburgh Alternative Newsweekly
Top Customer Reviews
The book opens with an illuminating look at spam and some of the Spam Kings making money off what they consider to be a legal business method.Read more ›
"Black Hat" is a book that is long overdue for publication. Most books on this subject are too technical for the average reader; this one is the exception. Everyone who surfs the net, for whatever reason, should read a book like this just so they know what can happen. If you are a non-technical user then "Black Hat: Misfits, Criminals, and Scammers in the Internet Age" is the best book available today for this purpose. This book should be considered as a gift for friends and family you love that surf the net and need to be safe.
The chapter selection is as follows: Black Hats: Things That Go Ping In The Night; Y.O.U MAYHAVE ALREDY 1!: SPAM; Deep Cover: Spyware; Shockwave: Worms and Viruses; Dear Friend: Scams; Upload Or Perish: Pirates; Break In: Hacking; Don't Get Burned: White Hats; Glossary; Selected Reading; Index
Biggs has written a relatively short (158 pages) book that deals with most of the major security risks an average user will face on a regular basis on the internet. For example, the chapter on spam starts off with a real-life scenario involving Alan Ralsky, a well-known spammer. You're then taken back to the early days of the 'net when the first generally recognized piece of spam made its appearance in UseNet. The growth of unsolicted mail is tracked to current day levels, as well as the reasons why spammers do what they do. He even takes a typical piece of spam mail and dissects the headers to show the reader how all is not as it seems in terms of where it came from and how it got to you. The current solutions, along with the pros and cons of each are discussed, in addition to where spam seems to be headed in the future. All this is done in a narrative fashion that stays at a level that is understandable to the average "Joe Computer User".
The chapter on scams is also very valuable for helping people avoid getting fleeced.Read more ›
Then there is the explanation of downloading of copyrighted material (usually music). This differs from the others in that here millions actively participate. Whereas the others are pushed out to millions, most of whom decline.
The book is ideal for a person still new to the Internet, and worried about snares. It eshews a sensationalistic or preachy tone.
The only unfortunate thing is that it is pessimistic about defeating spam. The reasons give reflect the current consensus in the antispam field. But a few others, like myself, believe, based on our own works, that spam can indeed be crushed.
Look for similar items by category
- Books > Computers & Technology > Computer Science > Software Engineering > Information Systems
- Books > Computers & Technology > History & Culture > Security
- Books > Computers & Technology > Internet & Social Media > Hacking
- Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs
- Books > Computers & Technology > Programming > Software Design, Testing & Engineering > Software Development
- Books > Computers & Technology > Web Development > Security & Encryption > Encryption
- Books > Textbooks > Computer Science & Information Systems > Computer Science
- Books > Textbooks > Computer Science & Information Systems > Networking
- Books > Textbooks > Computer Science & Information Systems > Software Design & Engineering