I finished reading CIG: Internet Privacy and Security. Throughout the chapters, some things were repeated so you could understand everything without having to read them in numerical order or any order at all. This got a bit annoying. Also, it was written in 1991 so much of it has changed by now. Fortunately, it provided many subtle hints as to how hackers can get into your computer. They were vaguely mentioned but sounded as if it were trying to point you in the correct detention for illegal activity. A sort of transparent bug was mentioned that is in the form of a very tiny GIF image that you can't really see when going on a webpage. A "backdoor" to internet networks that hackers use was also repeated once or twice. And then, there were a list of webpages that you should contact to ask for your information to be taken away if you feel like it, but they were technically lists of resources for stalkers. They weren't exactly amazingly useful resources, but they were there. I didn't learn much from the book and I'm not hinting that I already know how to maneuver myself into your computer.
The book's copyright date clearly indicated that it was too outdated to help me stalk. ;)
I'm kidding.
I almost forgot.
And in honor of this special day(I do not take credit for this picture):
No comments:
Post a Comment