Loading ...
Sorry, an error occurred while loading the content.

REVIEW: "Black Hat", John Biggs

Expand Messages
  • Rob, grandpa of Ryan, Trevor, Devon & Han
    BKBLCKHT.RVW 20070923 Black Hat , John Biggs, 2004, 1-59059-379-0, US$19.99 %A John Biggs john@blackhatbook.com www.blackhatbook.com %C 2560 Ninth
    Message 1 of 1 , Dec 6, 2007
    • 0 Attachment
      BKBLCKHT.RVW 20070923

      "Black Hat", John Biggs, 2004, 1-59059-379-0, US$19.99
      %A John Biggs john@... www.blackhatbook.com
      %C 2560 Ninth Street, Suite 219, Berkeley, CA 94710
      %D 2004
      %G 1-59059-379-0
      %I Apress
      %O U$19.99 510-549-5930 fax 510-549-5939 info@...
      %O http://www.amazon.com/exec/obidos/ASIN/1590593790/robsladesinterne
      %O http://www.amazon.ca/exec/obidos/ASIN/1590593790/robsladesin03-20
      %O Audience n- Tech 1 Writing 1 (see revfaq.htm for explanation)
      %P 158 p.
      %T "Black Hat: Misfits, Criminals and Scammers in the Internet Age"

      Chapter one contains the all-too-common exhortation that "Bad Stuff"
      is out there on the Internet. The chapter content tends to the
      sensational and is short on details and accuracy. The discussion of
      spam, in chapter two, is rather specific to the time the book was
      written (and will therefore date quickly). It doesn't provide much
      detail on the general types of anti-spam systems, although it does
      have a short (but reasonable) section on dissecting headers to track
      down spam sources. The information on spyware and adware that chapter
      three provides is unreliable: the text confuses spyware with
      keylogging trojans, the FBI's proposed Magic Lantern system, and even
      hardware keyloggers. Chapter four's examination of viruses and worms
      is even worse, containing a compilation of tidbits (some true, other
      not too reliable) and stories of various programs but providing little
      or no useful background on the basic concepts.

      By the nature of the topic, the examples of scams that are listed in
      chapter five are more helpful: if you recognize them, you can avoid
      them. Chapter six, about software piracy, is less so. The tales
      touch on a number of concepts, but there is no subsequent analysis of
      the implications. Biggs seems to have swallowed, wholesale, the
      narratives given to him about intrusions, retailed in chapter seven.
      These yarns are, however, the usual pieces of blackhat boasting, and
      deal with many disparate activities and technologies. Chapter eight
      supposedly approaches all the themes of the volume from the whitehat
      (protection) side, but contains only some banal and generic advice.

      Yet another attempt to jump on the Internet security "Fear,
      Uncertainty, and Doubt" bandwagon.

      copyright Robert M. Slade, 2007 BKBLCKHT.RVW 20070923

      ====================== (quote inserted randomly by Pegasus Mailer)
      rslade@... slade@... rslade@...
      Inside some of us is a thin person struggling to get out,
      but he can usually be sedated with a few pieces of chocolate cake.
    Your message has been successfully submitted and would be delivered to recipients shortly.