Internet, identity theft, cybercrime

where can I find information revenge revenge dirty tricks


The Ultimate Internet Terrorist
PP021


How Hackers, Geeks, and Phreaks Can Ruin Your Trip on the Information Superhighway -- And What You Can Do to Protect Yourself by Robert Merkle
This is an owner's manual to the "Darkside" of the Web. Learn what your e-mail address reveals to cyberterrorists, how electronic stalkers can find you and make your life hell, the dangers of chat rooms, the methods used by "cybergangs" and "codeslingers," the art and science of downloading information off the 'Net, and the intrigue of black archives and forbidden files from the Darkside.
5 1/2 x 8 1/2, softcover, 152 pp.Price: $ 19.95

The Complete Guide To E-Security
PP022


Using the Internet and E-Mail without Losing Your Privacy by Michael Chesbro
In this eye-opening guide, Michael Chesbro (Privacy for Sale) discusses how the average American’s personal and business e-mail can be read in more than a dozen places between the time it’s sent and the time it’s received, how marketersand other snoops can find out which Web sites you visit (not to mention such private information as your IP address, e-mail address, geological location and the type of computer you’re using), and how the government is working toward limiting your right to use encryption. Chesbro then tells you everything you need to know about safely and anonymously surfing the Internet, setting up encrypted e-mail, creating an uncrackable password, understanding unbreakable encryption programs such as PGP (PrettyGood Privacy), and sending e-mail through remailer services to disguise the source. You will also learn the importance of securely deleting or hiding files on your home computer to safeguard your private records from seizure.
5 1/2 x 8 1/2, softcover, 160 pp.Price: $ 21.95

Secrets of a Super Hacker
PP023


by The Knightmare
This shocking exposé of how crafty hackers can attack your system and read, copy or ruin your most private electronic secrets is not to be missed. Learn how hackers hurl passwords at a system until it cracks, seduce legitimate users into revealing their passwords, deliver fake e-mail, get system managers to do their dirty work, secretly record every image that appears on a computer screen, use low-level accounts to gain ever-higher levels of access and much more!
8 1/2 x 11, softcover, illus., 224 pp.Price: $ 21.95


Back to Home

Company History | Online Catalog | Best Sellers | Ordering Information | Frequently Asked Questions | Home | E-mail Us | Revenge | Sex Havens | New ID | Make Money on the Net | Financial Opportunities | Privacy Issues | Private Investigation | Personal Improvement Techniques | College Education | Foreign Passports and Identification | Criminal Records | Credit | Debt | Jobs | LIFESTYLE AND ROMANCE | Internet Topics |