What's New!

Chat with

How to Defend
Your Computer 

The Guides
to (mostly) 
Harmless Hacking

Happy Hacker 
Digests (old stuff) 

Hacker Links 


Meet the 
Happy Hacksters 

Help for 



It Sucks 
to Be Me!

How to Commit
Computer Crime (not)! 

What Is a 
Hacker, Anyhow? 

Have a 
Great Life! 

News from the 
Hacker War Front

What's New in the Second Edition of Überhacker!?

Welcome to the new Mecca of hacking: Wireless Fidelity (Wi-FI) Local Area Networks (WLANS). Thanks to the poorly designed IEEE 802.11b standard and the weak encryption of Wireless Equivalent Privacy (WEP), today spammers, crackers, kode kiddies and the just plain curious armed with dog-food-can antennas can break into countless networks from miles away. This book shows exactly how it's done and exactly why no organization should deploy Wi-Fi. A new version has just come online, IEEE 802.11g. It remains to be seen whether it will prove to be secure. Click here to read an excerpt from the book about LANjacking -->

This edition also covers the latest and not so greatest Windows operating systems, all based upon the old Windows NT operating system. These are Windows XP Personal Edition, Windows XP Professional, Windows 2000 Professional, Windows 2000 Server and Windows 2003 Server. It seems that for every advance Microsoft makes in computer security, it opens up two more ways to break in. As a result, these NT-code base systems have become the playground of hackers, crackers, worms and viruses.

We explain much more about how easy it is to create new ways to deface and make merry with webservers, especially those Microsoft Internet Information Servers (IIS), that never seem to get Unicode just right. And then there are those vulnerable database servers, and all the Warhol worms that explode across cyberspace and take over tens or hundreds of thousands of web or database servers in under fifteen minutes.

We offer much more on how easy it is to make end runs on all sorts of encryption. Many of those Java-enabled Smart Cards are just begging to be exploited, and all it takes is a light bulb.

Gosh, what a bunch of ways to fold, spindle, mutilate and make merry at the expense of poorly designed protocols, operating systems, servers and applications. Yet for five years now the lead technical editor of this book, Vincent Larsen (http://sage-inc.com) has been challenging the world to attack the web, email and ftp servers he has designed. So far nobody has broken in. No worm or virus has infiltrated them. Maybe it is possible to run secure computer systems. Check us out at http://thirdpig.com, http://uberhacker.com, http://cmeinel.com and http://happyhacker.org to see us in action, fending off all attackers.

Carolyn's most
popular book,
in 4th edition now!
For advanced
hacker studies,
read Carolyn's
Google Groups
Subscribe to Happy Hacker
Visit this group

© 2013 Happy Hacker All rights reserved.