3 of 7 people found the following review helpful
Gain Insight of the Mindset of Hackers, Crackers, Phreakers!,
This review is from: Hack Attacks Encyclopedia: A Complete History of Hacks, Cracks, Phreaks, and Spies Over Time (Paperback)
The widespread availability of computers and access to telephone and Internet technologies has contributed to the sharp rise in the number of people going online over the years. Unfortunately, many of these people found their way online through less-than-honest means, and once online, they would set out to perform a great deal of mischief and damage to various computers and computer information systems.
Hack Attacks Encyclopedia edited by John Chirillo serves as the ultimate source for collected information on the history of hacking, cracking, and phreaking. The book features nearly 2,000 text and HTML document extracts that includes news articles, online postings, and other snippets of insightful information. Some of the accounts are startling. Readers will quickly pick up just how clever some hackers, crackers, and phreakers really are. The following snippet exemplifies available talent in Northern America:
"Silver Spy has everything going for him - comfortable surroundings, a father who is an engineer. He ranks in the top 3 percent of his high-school class. His SAT scores for college admission totaled 1,400 of a possible 1,600. He wants to attend Stanford or the Massachusetts Institute of Technology. But in the eyes of the phone companies he is a thief, and in the eyes of the law he's a criminal. Such is the portrait of this 17-year-old computer "hacker" and "phone phreaker" who lives about 20 miles outside Boston. He spoke with U.S. News & World report on the condition that neither his real name nor home town be revealed."
The Hack Attack Encyclopedia is broken up into major sections by decade - the 70's, the 80's, the 90's, the Millennium, and a special historical synopsis. From beginning to end, readers will be able to follow the history of mischievous behavior. It will be an eye-opening experience for anyone to follow the advancements made in communications technologies and how they can be easily circumvented and otherwise compromised to carryout further activities. Although some of the technologies disclosed in the book are outdated and have been replaced, readers will still gain helpful insight of the mindset of hackers, crackers, and phreakers operating today. They are a force to be taken very seriously.
An extensive 217-page glossary of terms will enlighten readers about the slang talk used in the hacking, cracking, and phreaking communities. As a special bonus, the CD accompanying the book features full-length editions of the article and snippet extracts included in the book, hundreds of computing and Internet exploits, and a sampling of useful utility programs.
Hacking, cracking, phreaking, and virus infection still poses problems for many people today. This book will open the eyes of many people - including business people, IT managers, and law enforcement officials. It will serve as an excellent starting point for taking necessary corrective action to prevent further mischief and harm caused to personal and company computer systems. I can't wait to see an updated edition. Highly recommended reading.