Describes how computer viruses are created and spread, and discusses computer harassment, online con artists, protecting data with encryption, and general computer security issues
Explains the hows and whys of many subversive computer activities. While there is information for those wishing to protect themselves from would-be hackers, focus is on the hacker, the disgruntled employee, the rebel with a cause, and the prankster with lots of time on his hands. Those who fall into any of those categories will love this plain-talk guide to using computers and the Internet for mischievous purposes. Discusses areas such as alternate sources of news and information, encryption software, harassing an online service, and writing a computer virus. Annotation c. by Book News, Inc., Portland, Or.