Internet, identity theft, cybercrime

where can I find information revenge revenge dirty tricks

The Ultimate Internet Terrorist

How Hackers, Geeks, and Phreaks Can Ruin Your Trip on the Information Superhighway -- And What You Can Do to Protect Yourself by Robert Merkle
This is an owner's manual to the "Darkside" of the Web. Learn what your e-mail address reveals to cyberterrorists, how electronic stalkers can find you and make your life hell, the dangers of chat rooms, the methods used by "cybergangs" and "codeslingers," the art and science of downloading information off the 'Net, and the intrigue of black archives and forbidden files from the Darkside.
5 1/2 x 8 1/2, softcover, 152 pp.Price: $ 19.95

The Complete Guide To E-Security

Using the Internet and E-Mail without Losing Your Privacy by Michael Chesbro
In this eye-opening guide, Michael Chesbro (Privacy for Sale) discusses how the average Americanís personal and business e-mail can be read in more than a dozen places between the time itís sent and the time itís received, how marketersand other snoops can find out which Web sites you visit (not to mention such private information as your IP address, e-mail address, geological location and the type of computer youíre using), and how the government is working toward limiting your right to use encryption. Chesbro then tells you everything you need to know about safely and anonymously surfing the Internet, setting up encrypted e-mail, creating an uncrackable password, understanding unbreakable encryption programs such as PGP (PrettyGood Privacy), and sending e-mail through remailer services to disguise the source. You will also learn the importance of securely deleting or hiding files on your home computer to safeguard your private records from seizure.
5 1/2 x 8 1/2, softcover, 160 pp.Price: $ 21.95

Secrets of a Super Hacker

by The Knightmare
This shocking exposť of how crafty hackers can attack your system and read, copy or ruin your most private electronic secrets is not to be missed. Learn how hackers hurl passwords at a system until it cracks, seduce legitimate users into revealing their passwords, deliver fake e-mail, get system managers to do their dirty work, secretly record every image that appears on a computer screen, use low-level accounts to gain ever-higher levels of access and much more!
8 1/2 x 11, softcover, illus., 224 pp.Price: $ 21.95

Back to Home

Company History | Online Catalog | Best Sellers | Ordering Information | Frequently Asked Questions | Home | E-mail Us | Revenge | Sex Havens | New ID | Make Money on the Net | Financial Opportunities | Privacy Issues | Private Investigation | Personal Improvement Techniques | College Education | Foreign Passports and Identification | Criminal Records | Credit | Debt | Jobs | LIFESTYLE AND ROMANCE | Internet Topics |