An exclusive gaming industry community targeted
to, and designed for Professionals, Businesses
and Students in the sectors and industries
of Gaming, New Media and the Web, all closely
related with it's Business and Industry.
A Rich content driven service including articles,
contributed discussion, news, reviews, networking, downloads,
and debate.
We strive to cater for cultural influencers,
technology decision makers, early adopters and business leaders in the gaming industry.
A medium to share your or contribute your ideas,
experiences, questions and point of view or network
with other colleagues here at iVirtua Community.
I have had a lot of people ask about whether there would be a"Hacker's Handbook v3.0" as there have been many many changes acrossthe years since I wrote v1.0.
I am pleased to announce that I have just been informed by my editor(god bless him!) that Carlton have given the green light to the 3rdEdition of "Hacker's Handbook" - but in their infinite wisdom arerebranding it as "Cyberthreat Handbook" (bless their little cottonsocks!).
via spyblog.org.uk/drk/2007/12/hackers_handbook_v30.html
Anyhow - I have no idea when they plan to publish it (probably inthe Spring) - and now I have to sit down and re-write, edit andgenerally get off my lazy fat behind and do some real work ...
Anyhow here is the info-sheet used by Carlton along with a mock up of the cover and the back cover blurb.
Since the first edition of Complete Hackers Handbook nearly everythinghas changed – sometimes for the better and mostly for the worse.
The word “Hacker†has been reclaimed by real hackers who like toplay with things and make something new of them. The explosion oftechnology called “Web 2.0†is the result.
Meanwhile the “Black Hat Hackers†have moved on. Hacking is nolonger a game for “script kiddies†or computer enthusiasts – but aserious and organised criminal enterprise.
Cyberspace has become occupied by transnational criminal gangs whomount “Phishing†attacks to steal personal information and who use“BotNets†to run “Distributed Denial of Services†(DDOS) attacks onlikely targets for “CyberExtortionâ€.
“CyberActivists†of all creeds and religions battle it out on theInternet using “0 day exploits†and “drive by Trojans†to infectservers and personal computers alike.
During open warfare and times of tension between factions in thereal world there is likely to be a corresponding increase incyber-attacks and web-defacements that affects every Web user byincreasing the chances of their computer being attacked.
Finally - “The Balkanisation of the Internet†caused by “CyberCensorship†- is a problem that affects the Internet at a hidden level,whether it is enforced by “Blacklist†style “CensorWare†programs at alocal level or by “Cyber Curtains†that restrict free speech in certaincountries (e.g. “The Great Firewall of Chinaâ€).
Examining the new dangers the Internet faces underscores the pointthat the Internet is still a vulnerable and fragile technology. Thesenew threats undermine the very nature of the Internet - and mayultimately destroy it as the utility of tools such as email and webbrowsing decreases to zero - leading to the “Death of the Internetâ€
The CyberThreat Handbook is the ultimate guide to this intriguing electronic art.
Since Hackers Handbook 1.0 was published the Internet has got moredangerous – with the numbers of attacks accelerating on a daily basis.
Cyberspace has been invaded by transnational criminal gangs whomount “Phishing†attacks to steal personal information for IdentityTheft and use “BotNets†to run “Distributed Denial of Services†(DDOS)attacks on likely targets for “CyberExtortionâ€.
These criminal hackers attack computers as a means to an end – sothey target people who use the Internet on a daily basis to mount theircriminal attacks – placing ordinary users at risk..
The growth of Information Warfare means that CyberJihadis,CyberActivists and Black Hat Hackers funded by secretive intelligenceagencies, battle it out on the Internet by infecting servers andpersonal computers alike.
During open warfare and times of tension between factions in thereal world there is likely to be an increase in cyber-attacks andweb-defacements that affects every Web user – wherever they are.
These new threats undermine the very nature of the Internet - and mayultimately destroy it as the utility of tools such as email, onlinecommerce and web browsing decreases to zero.
The CyberThreat Handbook is not just Hacker’s Handbook 3.0 – instead itoffers the ultimate guide to an art that is no longer just intriguing –but also highly dangerous.
Revised and Updated: Phishing, BotNets, CyberExtortion, CyberJihad,Information Warfare, DarkNets, and the links between Hackers andTransnational Crime.
ABOUT THE AUTHOR
Described by the BBC as an “author and chronicler of the hackingsceneâ€, Dr.K is a veteran IT specialist and “old school†hacker who hasworked with computers for over 24 years.
Trained in Cognitive Psychology, Psycholinguistics and ArtificialIntelligence, Dr.K soon spotted the potential of the Internet and beganlearning TCP/IP in the days before the “World Wide Web†had even beendeveloped.
Dr.K later worked in IT as part of the team that developed theprototype smartcard systems that later became the “Oyster Card†-before moving on to be an IT specialist for what The Times has called“The World’s Most Famous Secret Societyâ€.
A long time attendee of “London 2600†- Dr.K eventually went on towrite Complete Hacker’s Handbook (Carlton 2000, 2nd Edition 2002) andHackers’ Tales (Carlton 2004).
I'll update here as I have more information - but I guess thatwriting a book about the Internet is a much more public experiencesince the 1st Edition and a lot of stuff will spill over into this blog.