Buy Used
CDN$ 4.73
+ CDN$ 6.49 shipping
Used: Good | Details
Condition: Used: Good
Comment: All items ship from the USA.  Arrival time is usually 2-3 weeks.  Light shelving wear with minimal damage to cover and bindings. Pages show minor use. Save a tree, buy from Green Earth Books. All books guaranteed. Read. Recycle. Reuse.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Hackish C++ Pranks & Tricks [With CDROM] Paperback – Nov 2004


See all 3 formats and editions Hide other formats and editions
Amazon Price
New from Used from
Paperback, Nov 2004
CDN$ 38.79 CDN$ 4.73

Harry Potter and the Cursed Child
click to open popover

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.




Product Details

  • Paperback: 326 pages
  • Publisher: A-List Pub; Pap/Cdr edition (November 2004)
  • Language: English
  • ISBN-10: 1931769389
  • ISBN-13: 978-1931769389
  • Product Dimensions: 23.4 x 18.7 x 1.7 cm
  • Shipping Weight: 599 g
  • Average Customer Review: Be the first to review this item
  • Amazon Bestsellers Rank: #1,044,913 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

Product Description

About the Author

Michael Flenov is a technical writer who specializes in C++ and Delphi programming, hacking, and code optimization. He has dealt with many issues related to SQL Server and Delphi, C++, and system programming, including CAD development, optimization techniques, code research, and database creation.

Customer Reviews

There are no customer reviews yet on Amazon.ca
5 star
4 star
3 star
2 star
1 star

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: HASH(0x9e774774) out of 5 stars 19 reviews
HASH(0x9e76c2b8) out of 5 stars Program for Laughs!!!!!! June 18 2015
By Aspiring Professional - Published on Amazon.com
Format: Paperback Verified Purchase
I had this book on my shelf maybe for about a year, don't remember exactly. At the time, I didn't know C++. I was a student at Brooklyn College and I took two semesters of C++ programming, and soon after, I took another look here.

This is one of the funniest books you will ever buy. Most "hacking" books are network security related, inasmuch as they teach you ways to protect your network from hackers and teach you about firewalls and IDSs and web hacking and encryption etc. Forget about security! This book won't teach you how to break in, but it'll teach you how to design software that will drive people crazy!!!!

You can search all over the bookstore, and you are not going to find a single book that will teach you how to build computer viruses. And that's because viruses damage computers or cause problems. But, this book is not about that. This book is about pulling pranks and driving people nuts!!!!!

I haven't used the examples to build anything yet, but I've gotten a CD-ROM that the book references. And I've ran the software on my PC. The programs do exactly what you'd expect in a virus, except you can get rid of it without a problem.

There is also another book very similar, VB.NET Hacks & Pranks by Alexander Klimov that teaches you the same but with a different programming language.
7 of 8 people found the following review helpful
HASH(0x9e8f17d4) out of 5 stars Another useless book from the ill-famous Russian copy-paster Dec 27 2005
By Vitaliy Titov - Published on Amazon.com
Format: Paperback
Another useless book from the ill-famous Russian copy-paster.

1) Author is not an expert in anything he writes about. His level of knowledge is close to one of a sophomore.

2) Book was unprofessionally translated from Russian, it's hard to read.

3) Morale and legal aspects of many pranks and tricks are questionable for an educated and law-obeying reader.
17 of 22 people found the following review helpful
HASH(0x9e6ea36c) out of 5 stars This is a great book Dec 15 2004
By Hoang Tran - Published on Amazon.com
Format: Paperback
This is a great book all the examples are alot more interesting when compared to the many other programming books I have read. I think every C programmer must read it more than once, every single line is valuable.
11 of 14 people found the following review helpful
HASH(0x9ec0f0fc) out of 5 stars full of errors July 31 2005
By Radu State - Published on Amazon.com
Format: Paperback
Do not buy this book. The positive reviewers do not have any other reviews on amazon -it really looks like self-reviewed by the author.

I've read this book, its full of mistakes. For instance, the authors says that TCP works by sending packages -- no comments, but for everybody else (beside the author) TCP works with segments. The list of mistakes is way to long. You should also note, that whenever a negative review is posted, a positive review (written by reviewers with no other reviews on amazon) follows. This book is very poor and a waste of money and time.
5 of 6 people found the following review helpful
HASH(0x9e721aa4) out of 5 stars intriguing challenges Sept. 24 2005
By W Boudville - Published on Amazon.com
Format: Paperback
The book offers an alternative viewpoint on programming C++ under Microsoft's operating systems. It deliberately eshews a sober tone, in presenting programming challenges. Like making a window of an arbitrary shape, like the profile of a person. We are so used to rectangular windows that this hack can be hilarious to try and show to others.

Flenov gives a chapter on networking hacks. Imagine writing a server that, with simple extensions, could reboot its machine upon prompt by an external signal that comes in over the net. Or the server might send out passwords, based on that signal. Such a program is malware; a Trojan. Now Flenov does not actually take you that far. But he shows enough that a capable reader could extrapolate the short steps to the Trojan.


Feedback