"Steal This Computer Book" Feedback
Its been nearly 15 years since the last edition of "Steal This Computer Book"(STCB) and a lot has changed on the internet within the hacker community, and the information security industry. I'm asking you to make your voice heard, be part of the process, and tell us what you think should go into the next edition. Answer one, or all, of the questions below. Your feedback will be heard. - Grifter
Sign in to Google to save your progress. Learn more
What's your general opinion about STCB? What's your favorite, or least favorite, thing about it? Hit us with your suggestions here!
We've got the table of contents below? What's missing? (Cryptocurrency, Dark Web, Hacker Spaces, etc)
Table of Contents - Should I Stay or Should I Go?
What chapters do think need to be updated, and what chapters are better off scrapped? Keep or Discard? You tell us. We've also left an "Other" option in there if you've got an idea for a certain chapter. So hit us with it.
Chapter 1 - The Hacker Mentality
Clear selection
Chapter 2 - The First Hackers: The Phone Phreakers
Clear selection
Chapter 3 - Hacking People, Places, and Things
Clear selection
Chapter 4 - ANSI Bombs and Viruses
Clear selection
Chapter 5 - Trojan Horses and Worms
Clear selection
Chapter 6 - Warez (Software Piracy)
Clear selection
Chapter 7 - Where the Hackers Are
Clear selection
Chapter 8 - Stalking a Computer
Clear selection
Chapter 9 - Cracking Passwords
Clear selection
Chapter 10 - Digging Into a Computer with Rootkits
Clear selection
Chapter 11 - Censoring Information
Clear selection
Chapter 12 - The Filesharing Networks
Clear selection
Chapter 13 - The Internet Con Artists
Clear selection
Chapter 14 - Finding People on the Internet
Clear selection
Chapter 15 - Propaganda as News and Entertainment
Clear selection
Chapter 16 - Hacktivism: Online Activism
Clear selection
Chapter 17 - Hate Groups and Terrorists on the Internet
Clear selection
Chapter 18 - Identity Theft and Spam
Clear selection
Chapter 19 - Banner Ads, Pop-up Ads, and Search Engine Spamming
Clear selection
Chapter 20 - Adware and Spyware
Clear selection
Chapter 21 - Computing on a Shoestring: Getting Stuff for (Almost) Free
Clear selection
Chapter 22 - Computer Forensics: The Art of Deleting and Retrieving Data
Clear selection
Chapter 23 - Locking Down Your Computer
Clear selection
Thank You!
Seriously, thanks so much for taking the time to answer a few questions about the direction of this project. I  know a lot of us think back on this book fondly and I'd really like to do it justice. Keep watching twitter for more and I'll keep you updated as the project progresses.
Submit
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy