STEHL THIS COMPUTER BOOK 2 What They Won't Tell You About The Wallace Wang

ho S t fc r c L pr«SS

San Francisco CONTENTS IN DETAIL

PORT 1: INFORMHTION OVERLORD Chapter 1 FINDING WHAT YOU NEED: THE MflGIC OF SEARCH ENGINES Search Engines 7 Meta-search engines 8 Specialized search engines 8 Kid-safe search engines 10 . Regional search engines 11 Searching for more search engines 13 Tips for Using Search Engines 13 Search within categories 14 . • Use specific words 14 Use multiple words 14 Use boolean operators 15 Remember the Limitations of Search Engines 15

Chapter 2 RLTERNRTIVE SOURCES OF NEWS RND INFORHRTION Newspapers Online 17 ,. Magazines Online 23 News Services Online 25 Finding More News Sources 27 Reading to Learn 27 Chapter 3 CENSORSHIP ONLINE Fighting Government-Sponsored Censorship 29 Cuba 29 China 30 Censorship elsewhere 31 Parental Control Software 31 Blocking political and educational sites 32 Parental control software gone really bad: CYBERsitter 33 Project Bait and Switch: Revealing the double standard of censorship 35 Other users of parental control software 36 Defeating Parental Control Software Z6 Defeating CYBERsitter. 37 Defeating Cyber Patrol 37 Defeating SurfWatch 39 Defeating Net Nanny 40 Recessing Banned Web Pages 41 Reading Banned Books Online 42 Secretly reading a banned book in broad daylight 43

Chapter 4 PLEDGING RLLEGIRNCE: HRTRED RS PATRIOTISM Monitoring Hate Groups 45 White supremacy 46 Neo-Nazis 48 Holocaust deniers 49 Black racists 50 Anti-Semitism 51 AntirArab groups 52 Anti-Christians 54 Anti-Gay activists 55 Learning from Hate Groups 57

Chapter 5 WHERE THE HRCKERS RRE Web Sites 59 Hacker Magazines 61 Finding Hacker Web Sites 62 • Hacker search engines 63 Hacker Web site lists 63 Web rings 64 Hacker Usenet Newsgroups 64 General hacking newsgroups 64 newsgroups 65 Encryption newsgroups 65 Cracking newsgroups 65 Finding on IRC 66 Hacker Conventions 66 Don't Panic: Hackers flre People, Too 67 PHRT 2: GflMES PEOPLE PLHY Chapter 6 COMPUTING ON R SHOESTRING Getting a Computer on a Budget 73 Floor models and returns 74 Online auctions 74 Factory outlets 75 Government auctions 76 Recycled computers 76 Build it yourself 76 fllmost-Free Software 77 Free software 77 Shareware and freeware 78 Pirating software 78 Cracking software 80 Buying software at an academfc discount 81 Upgrade offers 82 Free Music 83 HP3 players 84 HP3 rippers 84 , HP3 search engines 84 Free Internet ftccess 85 Advertising-sponsored Internet accounts 85 Internet accounts that pay you to surf 86 Cybercafes and public libraries 86 Free email 87 Free fax services 87 Free Web site hosting 87 Computing on a Budget 88 Chapter 7 STRLKING PEOPLE Finding Phone Numbers, Street Rddresses, and Email Rddressess 89 People finders 90 Reverse searches 92 Track down someone using a Social Security number 93 Finding people in the military 94 Searching public records 96 Finding relatives 100 Finding email addresses 101 Protecting Yourself 102 Chapter 8 CON GAMES ON THE INTERNET The Rrea Code Scam 105 ' Beware of Nigeria 107 Pyramid Schemes 109 Beware of Mega$Nets 110 Cracking Mega$Nets 112 Work-at-Home Businesses 113 Stuffing envelopes 113 Make-it-yourself kits 114 Work as an independent contractor 114 Fraudulent 114 The 115 The infallible forecaster 116 Packet Sniffers, Web Spoofing, and Phishers 117 Packet sniffers 117 Web spoofing 118 119 Rerouting Your Internet Connection 120 Online Ruction 121 The Fallacy of Internet Malls 122 Urban Legends 123 Credit Card 124 Protecting Yourself 125 PflRT 3: GAMES HHCKERS PLAY Chapter 9 PHONE AND OTHER PHUN fl Short History of Phone Phreaking 133 Possibly True Stories about Phone Phreaking 135 The toilet paper crisis in Los Angeles 135 The Santa Barbara nuclear hoax 138 The President's secret 139 Getting Started 142 "Shoulder Surfing" Calling Card Numbers 143 Color Boxes 143 Aqua box 144 144 145 Cheese box 145 Crimson box 145 Lunch box 145 146 Color Box Programs 146 War Dialers and Prank Programs 147 Voice Mailbox Hacking 149 Cellular and TV Satellite Descrambling 150 Chapter 10 HARASSING OTHERS ONLINE Cyberstalking 153 What the cyberstalker wants 153 Protecting yourself against cyberstalking 154 The Internet and Pedophilia 156 How pedophiles stalk children 156 Private messaging leads to a private meeting 157 Protecting your kids from online pedophiles 158 Protecting your kids from instant messaging pedophiles 159 Trading Pornography on flmerica Online 160 Finding Dirty Pictures on CompuServe 161 Harassing an Online Service 162 Generating fake online accounts 162 Creating Havoc with Online Harassment Programs 164 AOHell 164 Finding Credit Card Generators and Online Harassment Programs 167 Writing Your Own Online Harassment Program 168 IRC Hacking 170 Scripts 170 Flooding 171 Bots 171 Cloaking 171 Nukes 172, ICQ Hacking 174 Message flooding 175 Spoofing 175 Defeating authorization lists and tracking invisible people 176 Stealing passwords 176 Pros and Cons of Harassing Others Online 176 Chapter 11 BREAKING AND ENTERING Defeating Passwords 179 Disabling or circumventing a password 180 Stealing a password 181 •• Dictionary attacks on passwords 187 PHRT 4: DESTRUCTIVE THREATS ON THE INTERNET Chapter 12 INTERNET HACKING Hactivism: Politically-Motivated Web Site Hacks 193 Hackers vs. Indonesia 194 Hackers vs. China 195 Hackers vs. the 197 Hackers vs. racists 198 Scanning for Targets 199 Ping sweeping 200 Port scanning 201 Fingerprinting the target computer's operating system. 203 Obtaining a Password 204 Software Loopholes and Flaws 204 Microsoft Internet Information Server (IIS) 205 Red Hat Linux Piranha server 206 Allaire ColdFusion scripts 207 Finding more software exploits 207 Protecting a Web Site 208 Use difficult passwords 209 Avoid using default configurations 209 Use a firewall 209 Detect changes in files 210 Use a honey pot 211 Think like a hacker 213

Chapter 13 VIRUSES I: HISTORY AND SYMPTOMS What.Is a Computer Virus? 215 216 fl Historical Perspective 217 Michelangelo 218 Virus writing spreads 218 Macro viruses 219 Melissa and the Love Bug 220 What the future may bring 221 The Parts of a Computer Virus 224 Have You Got a Virus? 225 Computer slows to a crawl 226 Strange pictures or messages appear 226 Computer plays music for no reason 227 Programs mysteriously fail to load 227 Keyboard doesn't work right 228 Time and date stamps on files have changed 228 Unknown files appear or existing files disappear 229 Hard disk fails to boot 230 Disk drive light goes on and off for no apparent reason 230 Other computers at work have similar problems 231 Infection Methods 231 Fiie infectors 233 Boot viruses 235 Multipartite viruses 239 Macro viruses 240 Companion viruses 242 Windows viruses 244 Linux viruses 245 Macintosh viruses 246 Can a Virus Ever Be Good? 248 The worm in Microsoft Word 248 Cruise viruses 249 The KOH encryption virus 250 The future of "good" viruses 251 Virus Myths and Hoaxes 252 The chain letter virus 252 The JPEG virus 253 The fax machine virus 254 The Iraqi printer virus 254 Learning More Rbout Viruses 255 Chapter 14 VIRUSES II: WRITING A COMPUTER VIRUS Who Writes Computer Viruses? 257 The Bulgarian virus factory 260 The fall of Communism and the rise of viruses 261 The Quick Way to Write a Virus: Modify an Existing Virus 262 What the heck is disassembling? 263 Finding a disassembler- 265 Assembling virus source code 265 Virus-Writing Tools and Toolkits 266 Writing a Virus From Scratch 267 Virus-Writing Newsletters 268 How Viruses flvoid Detection 269 Stealth 269 Polymorphism 270 Retaliators 270 Do Viruses Ever flttack Their Creators? 271 The Rntivirus Company Wars 272 Legal Concerns 273 The Next Generation of Viruses? 274 Chapter 15 VIRUSES III: PREVENTION AND CURE The Common Parts of an Rntivirus Program 275 Virus monitors 275 Scanners 277 Integrity checkers 278 Heuristic Rnalysis 279 "Fishing" For Viruses 280 Rescue Disks 280 How flntivirus Programs Fail 281 Rntivirus programs become obsolete quickly 281 Antivirus programs con be fooled 282 What to Do If You Find a Virus 282 Verify that it's a virus 282 Remove the virus 284 Check other computers 284 Preventing Viruses 285 Educate people around you 285 Never boot from a floppy 285 Check your email 286 Know who uses your computer 286 Detecting Viruses 286 Scan every disk periodically 287 Scon every suspicious disk 287 Keep your antivirus programs up-to-date 287 Recovering from a Virus 288 Make backup copies 288 Save your CMOS settings 288 Make a clean boot disk 289 Learning More Rbout Popular flntivirus Programs 292 Really Technical Ways to Search for a Virus 293 The DOS Debug program 293 Chapter 16 TROJAN HORSES: BEWARE OF GEEKS BEARING How Trojan Horses Spread 297 Downloading software from a BBS or Web site 298 Opening a as an email file attachment 299 Catching a Trojan Horse from a chat room or instant messaging service 299 Physically copying a Trojan Horse to a computer 300 Types of Trojan Horses 300 Joke Trojans 300 Destructive Trojans 301 Trojans that steal passwords and other sensitive information 303 Remote access Trojans 306 How Hackers Write a Trojan Horse 311 Stopping a Trojan Horse 311 Rollback Programs 312 flntivirus Programs 313 Firewalls 313 flnti-Trojan Horse Programs 314 Hacker flnti-Trojan Tools 315 PART 5: PROTECTING YOURSELF Chapter 17 WRGING WRR ON SPAM Why Companies Spam the Internet and How They Do It 323 Retrieving email addresses 323 Masking your identity 325 Finding a bulk emailing program 325 Protecting Yourself from Spammers 326 Complain to the spammer 327 Complain to the spammer's ISP 327 Complain to the Internal Revenue Service 328 Use an email filter 328 Locating the spammer's postal address 329 Dealing with forged email addresses 330 Final tactics for avoiding spam 338 flnti-Spam Resources 338 Chapter 18 COMPUTER FORENSICS: RECOVERING AND DELETING DATA Deleting Data 341 Fiie shredders 342 Self-destructing email 347 Securely deleting Windows registry entries 348 Finding Data 349 Finding evidence in a file's slack space 349 Finding evidence in temporary files 350 Searching your Web browser cache 351 Computer Forensics Tools 353 Fiie undeleting programs 353 Hex editors 354 Magnetic sensors and electron microscopes 355 Disk splicing 355 Experimenting with Forensics Tools 356 Free forensics tools 356 Commercial forensics tools 357 Protecting Yourself 358 Chapter 19 PROTECTING YOUR COMPUTER, YOUR DATA, AND YOURSELF Locking Up Your Computer 361 Here's an interesting trick 363 Protecting Your Laptop 363 Tracking your laptop 364 Remote Tracking Services 364 Password Protecting Your Computer 365 Covering Your Tracks 365 Stopping cookies 365 Cleaning out your Web browser cache 368 Shielding Your Privacy 370 browsing 371 Browsing as someone else-sort of 371 Sending anonymous email 372 Your own Private Idaho 375 Encryption in pictures 376 Encrypting Your Data 378 Hiding files on your hard disk 381 Writing your own encryption programs 381 Appendix A GLOSSARY 387 Appendix B A HACKER'S GALLERY AOHell 399 B02K-Back Orifice 400 Crack Whore 401 Death 'n Destruction 402 Donald Dick 402 ICQ War 2000 403 John the Ripper 403 NetBus 405 Nmap 405 Senna Spy Internet Worm Generator 2000 406 SubSeven 407 TakeAdvantage 408 ToneLoc 409 UpYours 410 VBS Worm Generator 411 Virus Creation Laboratory (VCL) 412 Appendix C WHAT'S ON THE CD 413

INDEX 443