Whether readers want to attain pointers on eavesdropping and sabotage, protect data, or learn how to cruise the Internet surreptitiously, this book shows what's beneath cyberspace and where to find the actual programs to buy--or just try.
"synopsis" may belong to another edition of this title.
Wallace Wang is the author of several best-selling computer books including of the Steal This Computer Book series, Steal This File Sharing Book, The Book of Nero 7, and Visual Basic 2005 Express: Now Playing (all No Starch Press). He is also a successful standup comic who has appeared on A&E’s "Evening at the Improv" and appears regularly at the Riviera Comedy Club in Las Vegas.
From Chapter 5, Hiding Yourself with Encryption and Anonymity: Anything you store on your computer could be used against you. Write a letter to a pen pal who lives in North Korea, Iran, or Cuba, and you could be suspected of transferring state secrets. Send e-mail to a friend about your current work, and you might be accused of leaking proprietary corporate information. Type personal information in your word processor or address book, and a spy could use this information to blackmail you later.
As long as you assume that everything you type into your computer could be read by both your friends and enemies, you should have no problems exposing any secrets you may have. However, if you prefer to keep information on your computer private, then you have two choices: physically lock up your computer so no one else can use it or use encryption.
Unfortunately, physical deterrents, such as locks and cables, can be defeated by anyone with sufficient time and strength-supplemented by pliers and wire clippers. Once a thief snaps a restraining cable or smashes open the lock on your computer case, you're screwed.
As an alternative to cumbersome cables and locks, use software encryption. Encryption scrambles your data and only your password will unscramble it.
Learning About Encryption Encryption can be weak or strong, depending on the method used. For example, weak encryption might just substitute one letter for another, such as the letter "A" for the letter "B," the letter "B" for the letter "C," and so on. This type of encryption is considered weak because it's fairly easy for anyone to figure out that the message "Uif IBM dpnqvufs jt tnbsu" really stands for "The HAL computer is smart."
Strong encryption uses more complicated algorithms to encrypt data. Some of the more popular encryption algorithms are the Data Encryption Standard (DES), International Data Encryption Algorithm (IDEA), and Blowfish. Just remember that strong encryption algorithms can only protect your data as long as nobody steals your password. If someone steals your password, strong encryption will be as useless as a bank vault without a lock.
Because the weakest link in encryption is access to your password, two types of password methods have emerged: private-key encryption and public-key encryption.
"About this title" may belong to another edition of this title.
FREE shipping within U.S.A.
Destination, rates & speedsSeller: SecondSale, Montgomery, IL, U.S.A.
Condition: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Seller Inventory # 00083739754
Quantity: 2 available
Seller: Wonder Book, Frederick, MD, U.S.A.
Condition: Good. Good condition. A copy that has been read but remains intact. May contain markings such as bookplates, stamps, limited notes and highlighting, or a few light stains. Seller Inventory # A14J-00753
Quantity: 1 available
Seller: Wonder Book, Frederick, MD, U.S.A.
Condition: Very Good. Very Good condition. A copy that may have a few cosmetic defects. May also contain light spine creasing or a few markings such as an owner's name, short gifter's inscription or light stamp. Bundled media such as CDs, DVDs, floppy disks or access codes may not be included. Seller Inventory # K13D-01154
Quantity: 1 available
Seller: More Than Words, Waltham, MA, U.S.A.
Condition: Very Good. A bright, square, and overall a nice copy. Seller Inventory # BOS-G-09c-01747
Quantity: 1 available
Seller: More Than Words, Waltham, MA, U.S.A.
Condition: Good. . . All orders guaranteed and ship within 24 hours. Before placing your order for please contact us for confirmation on the book's binding. Check out our other listings to add to your order for discounted shipping. Seller Inventory # BOS-V-10b-01239
Quantity: 1 available
Seller: HPB-Ruby, Dallas, TX, U.S.A.
paperback. Condition: Very Good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_431119058
Quantity: 1 available
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Good. 1st Edition. Used book that is in clean, average condition without any missing pages. Seller Inventory # 3819512-75
Quantity: 1 available
Seller: Better World Books: West, Reno, NV, U.S.A.
Condition: Very Good. 1st Edition. Used book that is in excellent condition. May show signs of wear or have minor defects. Seller Inventory # 3819513-6
Quantity: 1 available
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Very Good. 1st Edition. Used book that is in excellent condition. May show signs of wear or have minor defects. Seller Inventory # 3819513-6
Quantity: 1 available
Seller: ThriftBooks-Reno, Reno, NV, U.S.A.
Paperback. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.25. Seller Inventory # G1886411212I4N00
Quantity: 1 available