This book offers an abundance of technical information, yet not so much as to overwhelm the casual reader or novice computer user. What the author best describes is the tactical problem-solving enterprise with which hackers work. They root out weaknesses in systems, and rather than being defined by limitations, they learn to exploit these to their own uses and to their own ends. Sometimes those ends are sinister and sometimes not. There are two whole chapters on the art of social engineering, which is rather like hacking a human being. The hacker approaches his subject just as he would a computer—researching, analyzing, and then piercing through the chinks of peoples’ personal armor until they end up divulging some seemingly harmless detail which may just allow one to penetrate their computer systems. In this way hackers appears to be grifters par excellence, but the author paints them as romantic social rebels.
This is a great book on the mindset of those who watch and prey on people, whether they use computers to do so or not. The psychological profiles in the book are enough to scare any system operator into examining the necessity of updating computer systems. Though this book was published in 1994 (nearly a millennium ago by computer standards), the information is ever timely. Although computer technology such as firewalls can be developed, hackers, like other con men, have already cataloged and organized the human psyche, making it only a matter of time to overcome any new obstacles.
MM
Publisher: Loompanics
Paperback: 205 pages
Illustrated