Flylib.com
Steal This File Sharing Book: What They Wont Tell You About File Sharing
Steal This File Sharing Book: What They Wont Tell You About File Sharing
ISBN: 159327050X
EAN: 2147483647
Year: 2004
Pages: 98
Authors:
Wallace Wang
BUY ON AMAZON
Table of Contents
Steal This File Sharing Book-What They Wont Tell You About File Sharing
Part 1: Learning About File Sharing
Chapter 1: Finding the Files
THE INTERNET: A GRAB BAG OF FILES
TRADING FILES MANUALLY
THE THIEVES MINDSET
Chapter 2: The Peer-to-Peer File Sharing Networks
HOW FILE SHARING WORKS
THE DIFFERENT FILE SHARING NETWORKS
ADDITIONAL FILE SHARING FEATURES
SPECIALIZED FILE SHARING NETWORKS
Chapter 3: Navigating Newsgroups
GETTING STARTED WITH NEWSGROUPS
NAVIGATING NEWSGROUPS
SHARING FILES THROUGH A NEWSGROUP
NEWSGROUP ETIQUETTE
Chapter 4: Instant Messaging and Online Chat Rooms
INTERNET RELAY CHAT (IRC)
INSTANT MESSAGING SERVICES
HOW INSTANT MESSAGING WORKS
PEER-TO-PEER INSTANT MESSAGING PROGRAMS
Chapter 5: Finding Files on Web and FTP Sites
TYPES OF SITES
FINDING A FILE SHARING SITE
COPYING FILES TO YOUR COMPUTER
PROS AND CONS OF WEB AND FTP SITES
Part 2: Stealing Files
Chapter 6: Protecting Your Identify
HIDING YOUR IDENTITY
SECRETS OF ANONYMOUS FILE SHARING
Chapter 7: Protecting Your Computer
CATCHING MALICIOUS FILES
PROTECTING DATA ON YOUR COMPUTER
DESTROYING THE EVIDENCE
Chapter 8: The File Formats
MUSIC FILE FORMATS
FILE COMPRESSION FORMATS
ELECTRONIC BOOK FORMATS
MOVIE FORMATS
PHOTOGRAPH FORMATS
WHERE TO GO FROM HERE
Chapter 9: Sharing Music
COPYING CDS
FINDING MUSIC ON THE INTERNET
FINDING THE BEST AUDIO FILES
THE PROBLEM WITH FILE NAMES
WHOS STEALING FROM WHOM?
Chapter 10: Finding Movies (or TV Shows)
COPYING A MOVIE
TYPES OF VIDEO PIRACY
DOWNLOADING MOVIES
THE FUTURE OF VIDEO PIRACY ON THE INTERNET
Chapter 11: Sharing Books
SCANNING A BOOK
WHAT TYPES OF BOOKS ARE STOLEN?
CRACKING AN E-BOOK S COPY PROTECTION
FINDING ILLEGAL E-BOOKS
THE FUTURE OF E-BOOKS
THE FUTURE OF E-BOOKS AND PIRACY
Chapter 12: Pirating Software (WAREZ)
THE WAREZ UNDERGROUND
HOW COMPANIES FIGHT BACK
WHERE THE WAREZ ARE
Chapter 13: Sharing Video Games
VIDEO GAMES AS WAREZ
VIDEO GAMES AS EMULATION
THE LEGALITIES OF ROM IMAGES
Chapter 14: Sharing Pornography
FINDING PORNOGRAPHY
PORNOGRAPHY: A REFLECTION OF SOCIETY
Chapter 15: Miscellaneous Thievery
STEALING SOUNDS
STEALING GUITAR CHORD CHARTS
STEALING HDTV SHOWS
STEALING BANDWIDTH
STEALING WEBSITES
STEALING PHOTOGRAPHS AND IMAGES
STEALING RECIPES
STEALING EVERYTHING DIGITALLY
Part 3: The Future
Chapter 16: The Legal Alternatives
MUSIC
MOVIES
BOOKS
SOFTWARE
LEGAL FILE SHARING SPINOFFS
Chapter 17: How the Corporations Fight Back
FILING A LAWSUIT
EDUCATIONAL CAMPAIGNS
TAXING BLANK RECORDABLE MEDIA
ANTI-PIRACY COPY PROTECTION
ANTI-P2P SERVICES
SABOTAGING FILES WITH CUCKOO EGGS
KILLING A COMPUTER
WHAT THE FUTURE HOLDS
List of Figures
Steal This File Sharing Book: What They Wont Tell You About File Sharing
ISBN: 159327050X
EAN: 2147483647
Year: 2004
Pages: 98
Authors:
Wallace Wang
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Navigating Between Parent and Child Records Using a DataRelation
Improving DataReader Performance with Column Ordinals
Retrieving Database Schema Information from SQL Server
A.4. Interfaces
A.6. Delegates
Inside Network Security Assessment: Guarding Your IT Infrastructure
The Role Authentication, Authorization, and Accountability Play in a Secure Organization
Scoping the Project
Determining the Next Step
IT Security Architecture and Framework
Analysis
High-Speed Signal Propagation[c] Advanced Black Magic
Signal Propagation Model
Skin-Effect Region
Discrete Time Mapping
Pcb Signal Propagation
Preferred Cable Combinations
Java How to Program (6th Edition) (How to Program (Deitel))
Data Abstraction and Encapsulation
Recursive Backtracking
Self-Review Exercises
Class Character
Special Section: Challenging String-Manipulation Projects
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
The Challenges of Web Application Development
Form Presentation and Validation with Struts
Managing Business Logic with Struts
Templates and Velocity
Building the JavaEdge Application with Ant and Anthill
MPLS Configuration on Cisco IOS Software
TE Basics
MPLS TE Theory
Introduction to Layer 2 VPNs
Local Switching
Configuration and Implementation of MPLS QoS in Uniform Mode and Short Pipe Mode Operation
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies