Download Das Phantom im Netz by Kevin D. Mitnick PDF

By Kevin D. Mitnick

Dies ist eine wahre Geschichte über Intrigen, Manipulation und eine abenteuerliche Flucht. Zugleich ist es das Porträt eines Genies, dessen Einfallsreichtum, Beharrlichkeit und Fähigkeiten eine ganze Branche zum Umdenken zwangen. Kevin Mitnick battle der meistgesuchte Hacker der Welt. Er verschaffte sich mehrfach Zutritt zu den Computern der weltgrößten Firmen wie solar Microsystems, Motorola, Nokia und Fujitsu Siemens und enttarnte deren Anfälligkeit. Sogar Einbrüche in laptop des Pentagons wurden ihm vorgeworfen. Egal wie schnell die Behörden reagierten, Mitnick battle ihnen immer drei Schritte voraus. Doch das Netz des FBI zog sich immer weiter zu. Es begann ein dramatisches Katz-und-Maus-Spiel, bei dem der Hacker seiner Festnahme oft nur um Haaresbreite entging – bis zu einem spektakulären Showdown, bei dem es für ihn kein Entrinnen mehr gab. Mitnick wurde ohne Prozess viereinhalb Jahre gefangen gehalten, davon acht Monate in Einzelhaft, da die FBI-Beamten einen Richter davon überzeugen konnten, er sei in der Lage »einen Atomkrieg auszulösen, indem er in ein Telefon pfeift«. Nach sieben Jahren Schweigepflicht geht der Hacker in seiner Autobiografie aufs Ganze: Er erzählt nicht nur seine Geschichte, sondern rechnet auch mit Justiz und Presse ab.

Show description

Read Online or Download Das Phantom im Netz PDF

Similar hacking books

Reversing: Secrets of Reverse Engineering

Starting with a simple primer on opposite engineering—including machine internals, working platforms, and meeting language—and then discussing many of the functions of opposite engineering, this ebook offers readers with useful, in-depth thoughts for software program opposite engineering.

Hack Proofing Your E-commerce Site

While it comes all the way down to it, the method of defending your e-commerce web site from malicious hackers is not too assorted from that of developing defenses round the other form of website. the one attribute that distinguishes an e-commerce website from different kinds of web sites is its skill to take check info from buyers, this means that there is yet one more technique to assault the positioning.

The Database Hacker's Handbook: Defending Database Servers

Databases are the nerve heart of our financial system. each piece of your individual details is saved there-medical files, financial institution bills, employment background, pensions, motor vehicle registrations, even your children’s grades and what groceries you purchase. Database assaults are probably crippling-and relentless. during this crucial follow-up to The Shellcoder’s instruction manual, 4 of the world’s most sensible defense specialists educate you to damage into and shield the seven most well-liked database servers.

Additional info for Das Phantom im Netz

Example text

It also reassures potential customers that you will address problems, and won't just leave your bidders twisting in the wind. If you feel the bidder will be understanding and cooperative once you follow up with an email, you may wish to request to have the feedback removed, as described in [Hack #6]. Naturally, no bad feedback is the most desirable outcome. The same approach applies if you're a bidder, and a seller leaves the following feedback for you: "Deadbeat! Buyer bid high and never paid.

1 Search Within a Category Click Browse at the top of any eBay page to view the top-level categories. Choose a category here, and then a subcategory from the assortment displayed on the next page. At three levels deep and beyond you'll see standard category views, including auction listings and a Basic Search field, as shown in Figure 2-1. ) Figure 2-1. html Hack 12 Tweaking Search URLs Tap into eBay's massive database right from your own address bar. eBay is essentially a massive database. Every time you view an auction page, you're just looking at a single database record.

But given the importance of feedback in the eBay community, your main goal should be to use it to lessen the impact of such comments on your own reputation. For example, consider the following complaint lodged against you, a seller, by an unhappy bidder: "Item arrived damaged; very expensive to repair. " Obviously, this is the wrong response: "Stupid buyer! What a jerk for complaining! " Think of the message this sends to other people, prospective future customers, who might scrutinize your feedback profile.

Download PDF sample

Rated 4.69 of 5 – based on 26 votes