User Control Panel
Search iVirtua
Advanced/Tag Search...
Search Users...
What is iVirtua Exclusive Community?
  • An exclusive gaming industry community targeted to, and designed for Professionals, Businesses and Students in the sectors and industries of Gaming, New Media and the Web, all closely related with it's Business and Industry.
  • A Rich content driven service including articles, contributed discussion, news, reviews, networking, downloads, and debate.
  • We strive to cater for cultural influencers, technology decision makers, early adopters and business leaders in the gaming industry.
  • A medium to share your or contribute your ideas, experiences, questions and point of view or network with other colleagues here at iVirtua Community.
Guest's Communication
Live Chat
Teamspeak (VOIP) Audio Conference
Private Messages
Check your Private Messages
Themes
Choose an iVirtua Community theme to reflect your interests...
Business Theme
India/Arabic Theme

Gaming Theme
iVirtua Recommends
Fly Emirates Advertising
Hacker's Handbook V3.0
Digg This Digg Topic Tag it on del.icio.us Tag topic on On del.icio.us Technorati Search Technorati Search Post to Slashdot Post to Slashdot
You are currently in Programming, Web and Software Design/Development
Post new topic Reply to topic
Sun Dec 30, 2007 8:44 pm Reply and quote this post
Quote:

I have had a lot of people ask about whether there would be a"Hacker's Handbook v3.0" as there have been many many changes acrossthe years since I wrote v1.0.
I am pleased to announce that I have just been informed by my editor(god bless him!) that Carlton have given the green light to the 3rdEdition of "Hacker's Handbook" - but in their infinite wisdom arerebranding it as "Cyberthreat Handbook" (bless their little cottonsocks!).

via spyblog.org.uk/drk/2007/12/hackers_handbook_v30.html

Anyhow - I have no idea when they plan to publish it (probably inthe Spring) - and now I have to sit down and re-write, edit andgenerally get off my lazy fat behind and do some real work ...
Anyhow here is the info-sheet used by Carlton along with a mock up of the cover and the back cover blurb.
Since the first edition of Complete Hackers Handbook nearly everythinghas changed – sometimes for the better and mostly for the worse.
The word “Hacker” has been reclaimed by real hackers who like toplay with things and make something new of them. The explosion oftechnology called “Web 2.0” is the result.
Meanwhile the “Black Hat Hackers” have moved on. Hacking is nolonger a game for “script kiddies” or computer enthusiasts – but aserious and organised criminal enterprise.
Cyberspace has become occupied by transnational criminal gangs whomount “Phishing” attacks to steal personal information and who use“BotNets” to run “Distributed Denial of Services” (DDOS) attacks onlikely targets for “CyberExtortion”.
“CyberActivists” of all creeds and religions battle it out on theInternet using “0 day exploits” and “drive by Trojans” to infectservers and personal computers alike.
During open warfare and times of tension between factions in thereal world there is likely to be a corresponding increase incyber-attacks and web-defacements that affects every Web user byincreasing the chances of their computer being attacked.
Finally - “The Balkanisation of the Internet” caused by “CyberCensorship” - is a problem that affects the Internet at a hidden level,whether it is enforced by “Blacklist” style “CensorWare” programs at alocal level or by “Cyber Curtains” that restrict free speech in certaincountries (e.g. “The Great Firewall of China”).
Examining the new dangers the Internet faces underscores the pointthat the Internet is still a vulnerable and fragile technology. Thesenew threats undermine the very nature of the Internet - and mayultimately destroy it as the utility of tools such as email and webbrowsing decreases to zero - leading to the “Death of the Internet”

The CyberThreat Handbook is the ultimate guide to this intriguing electronic art.

Since Hackers Handbook 1.0 was published the Internet has got moredangerous – with the numbers of attacks accelerating on a daily basis.
Cyberspace has been invaded by transnational criminal gangs whomount “Phishing” attacks to steal personal information for IdentityTheft and use “BotNets” to run “Distributed Denial of Services” (DDOS)attacks on likely targets for “CyberExtortion”.
These criminal hackers attack computers as a means to an end – sothey target people who use the Internet on a daily basis to mount theircriminal attacks – placing ordinary users at risk..
The growth of Information Warfare means that CyberJihadis,CyberActivists and Black Hat Hackers funded by secretive intelligenceagencies, battle it out on the Internet by infecting servers andpersonal computers alike.
During open warfare and times of tension between factions in thereal world there is likely to be an increase in cyber-attacks andweb-defacements that affects every Web user – wherever they are.

These new threats undermine the very nature of the Internet - and mayultimately destroy it as the utility of tools such as email, onlinecommerce and web browsing decreases to zero.

The CyberThreat Handbook is not just Hacker’s Handbook 3.0 – instead itoffers the ultimate guide to an art that is no longer just intriguing –but also highly dangerous.
Revised and Updated: Phishing, BotNets, CyberExtortion, CyberJihad,Information Warfare, DarkNets, and the links between Hackers andTransnational Crime.
ABOUT THE AUTHOR
Described by the BBC as an “author and chronicler of the hackingscene”, Dr.K is a veteran IT specialist and “old school” hacker who hasworked with computers for over 24 years.
Trained in Cognitive Psychology, Psycholinguistics and ArtificialIntelligence, Dr.K soon spotted the potential of the Internet and beganlearning TCP/IP in the days before the “World Wide Web” had even beendeveloped.
Dr.K later worked in IT as part of the team that developed theprototype smartcard systems that later became the “Oyster Card” -before moving on to be an IT specialist for what The Times has called“The World’s Most Famous Secret Society”.
A long time attendee of “London 2600” - Dr.K eventually went on towrite Complete Hacker’s Handbook (Carlton 2000, 2nd Edition 2002) andHackers’ Tales (Carlton 2004).

I'll update here as I have more information - but I guess thatwriting a book about the Internet is a much more public experiencesince the 1st Edition and a lot of stuff will spill over into this blog.

Contributed by Editorial Team, Executive Management Team
372659 iVirtua Loyalty Points • View ProfileSend Private MessageBack to Top

Related Articles
Post new topic   Reply to topic


Page 1 of 1

iVirtua Latest
Latest Discussion

Discuss...
Latest Articles and Reviews

Latest Downloads
Subscribe to the iVirtua Community RSS Feed
Use RSS and get automatically notified of new content and contributions on the iVirtua Community.


Tag Cloud
access amd announced applications author based beta building business card case company content cool core course cpu create data deal dec demo design desktop developers development digital download drive email feature features file files firefox flash free future gaming google graphics hardware help industry information intel internet iphone ipod jan launch linux lol love mac market media memory million mobile money movie music net nintendo nov nvidia oct office official online patch performance playing power price product program ps3 pst publish ram release released report rss sales screen search security sep server show size software sony source speed support technology thu tue update video vista war web website wii windows work working works xbox 360 2006 2007 2008

© 2006 - 2008 iVirtua Community (UK), Part of iVirtua Media Group, London (UK). Tel: 020 8144 7222

Terms of Service and Community RulesAdvertise or Affiliate with iVirtuaRSSPress Information and Media CoverageiVirtua Version 4PrivacyContact