Steal This Computer Book 4.0
Wallace Wang
Copyright 2010
All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher.
No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark.
The information in this book is distributed on an "As Is" basis, without warranty. While every precaution has been taken in the preparation of this work, neither the author nor No Starch Press, Inc. shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in it.
Praise for Steal This Computer Book
"If ever a book on cyberculture wore a fedora and trench coat and leaned against a lamppost on a foggy street, this is the one. It is an unabashed look at the dark side of the Netthe stuff many other books gloss over. It's hard-edged, wisecracking, and often quite cynical as it pours over the reality of online scams, illegal activities, and simple annoyances."
Amazon.com editorial review
"If this book had a soundtrack, it'd be Lou Reed's 'Walk on the Wild Side.'"
InfoWorld
"A documentary tour into sourcing information, defeating Internet filters, banned books & web pages, hactivism, hate groups, hackers, viruses, con games, and a whole bunch of other things that should make you squirm if you've got a heartbeat and a little paranoia."
The Inquirer
"A provocative look at the ways the Internet can be used, misused, and abused"
Security Management Online
"This book has some of the best information about protecting yourself, your family and your computer from illegal or malicious acts perpetrated electronically... it is almost as compelling as a good novel."
kickstartnews.com
"A technology classic that is as entertaining and irreverent as it is informative"
MacDirectory
"A terrific guide to the world of hacking, cracking and malware"
Software Developer (SD) Times
"I found the book fascinating, at times almost addicting."
MacCompanion
"A quirky, colorful tour of the anti-social side of the Internet"
Unix Review
"A delightfully irresponsible primer "
Chicago Tribune
"This book is not going to make a lot of people very happyand it's going to make a lot of others very nervous."
Houston Chronicle
"If you're smart, and you work on the Internet, you'll get [ Steal This Computer Book ] before that teen-aged computer geek down the block does."
The Sarasota Herald-Tribune
Dedication
This book is dedicated to everyone who believes in the true principles of democracywhich pretty much eliminates 90 percent of the people running the government.
Acknowledgments
If it weren't for the wonderful people at No Starch Press, this book would still be just another good idea floating around the publishing industry. The most important person involved in the creation of this book is William Pollock, who provided guidance for the book and gently nursed it from a rough idea to a completed manuscript. Three other extremely important people are Patricia Witkin, Raven Alder, and Elizabeth Campbell, all of whom worked tirelessly to ensure that the manuscript was as complete and error-free as possible. Thanks also to Riley Hoffman, who laid out the pages you see here.
Many hackers deserve credit for their work that directly or indirectly influenced this book. While I have never met many of these people, their books, text files, websites, and software creations have helped influence my thoughts about the "underground" aspect of the computer industry.
Additional thanks go to Steve Schirripa (who appears in HBO's hit show The Sopranos ) and Don Learned for giving me my break in performing at the Riviera Comedy Club (www.rivierahotel.com) in Las Vegas. Also a big thanks go out to all the stand-up comedians I've had the pleasure of working with over the years, including Dobie Maxwell, Judy Tenuta, Larry Omaha, Darrell Joyce, Kip Addotta, Bob Zany, Gerry Bednob, Patrick DeGuire, and Doug James.
More thanks go to Roger Feeny at the Ann Arbor Comedy Showcase (www.aacomedy.com), Joe Jarred at Funniez Comedy Club, Mark Ridley at the Comedy Castle (www.comedycastle.com), and Russ Rivas at Laffs Comedy Club (www.laffscomedy.com) for running the best comedy clubs in the country.
Final thanks go to stand-up comedians Barry Crimmins, Jimmy Tingle, George Carlin, and Will Durst for their delightfully insightful humor that reveals the truth while making you laugh at the same time. If you want to know what's really happening with our governments, foreign policies, and world leaders, listen to these four comedians. I guarantee you'll learn more about world news, politicians, and international politics from their stand-up comedy acts than you ever could from Newsweek , the New York Times , the Wall Street Journal , the CBS Evening News , or CNN.
People get mad at me for these views [antiAmerican government opinions]. They say, "If you don't like this country, why don't you get out of it?" And I say, "Because I don't want to be victimized by its foreign policy."
BARRY CRIMMINS
I predict that with military enrollment down the US military will actively start to seek out gay recruits.
JIMMY TINGLE
I'm completely in favor of the separation of Church and State. My idea is that these two institutions screw us up enough on their own, so both of them together is certain death.
GEORGE CARLIN
Q. Why are there no Democrats on Star Trek?
A. Because it's set in the future.
This book won't turn you into a hacker any more than reading a military manual will turn you into a soldier. You won't find step-by-step instructions explaining how to break into a computer, nor will you find technical discussions of all the flaws inherent to any particular type of operating system. This isn't a technical book about computer hacking. This is a philosophy book about the implications of hacking. Hacking isn't just about breaking into computers. Hacking is about exploring, extending boundaries, and searching for knowledge for its own sake.
So if you're looking for detailed information about writing C code to create buffer overflows in an Apache server, or you want to find out how to configure a SonicWALL firewall to protect a corporate network from attack, look somewhere else. But if you want a book that explores both the technical and social implications of the hidden, darker side of the Internet that most people never see, read about, or hear about, keep reading. The world of hackers, virus writers, political activists, phone phreakers, censorship, and disguised propaganda awaits you.
Not surprisingly, some people will find the information in this book distasteful, disturbing, and downright dangerous. Some will see this same information as an excuse to cause havoc and make trouble for others. Neither of these is correct.