pt. 1. Information overload (lies, damn lies, and statistics)
Finding what you need: the magic of search engines
Alternative sources of news and information
Censoring information (we know whatʼs best for you)
Hacktivism: online activism
Pledging alliance: hatred as patriotism
pt. 2. Dangerous threats on the Internet: viruses and worms
Trojan horses: beware of geekʼs bearing gifts
Con games on the Internet
pt. 3. Breaking and entering computers: probing a target
pt. 4. Protecting yourself: computing on a shoestring
Protecting your data and your privacy
Web bugs, adware, pop-ups, and spyware
pt. 5. Protecting your computer: firewalls, intrusion-detection systems, and honeypots
Computer forensics: recovering and deleting data
Appendix B. A hackerʼs gallery of rogue tools
Appendix C. A bit of history: phone phreaking and other phun.