Worm: The First Digital World War, by Mark Bowden
Do you recognize why you ought to read this site and also just what the relationship to reviewing e-book Worm: The First Digital World War, By Mark Bowden In this modern-day era, there are numerous means to acquire the book as well as they will be much easier to do. Among them is by getting the book Worm: The First Digital World War, By Mark Bowden by online as what we tell in the link download. The publication Worm: The First Digital World War, By Mark Bowden could be a choice considering that it is so proper to your need now. To obtain the e-book on-line is really simple by simply downloading them. With this chance, you could read the publication anywhere as well as whenever you are. When taking a train, awaiting listing, and awaiting a person or various other, you could read this on the internet publication Worm: The First Digital World War, By Mark Bowden as a great pal again.
Worm: The First Digital World War, by Mark Bowden
PDF Ebook Online Worm: The First Digital World War, by Mark Bowden
Worm: The First Digital World War tells the story of the Conficker worm, a potentially devastating piece of malware that has baffled experts and infected more than twelve million computers worldwide.
When Conficker was unleashed in November 2008, cybersecurity experts did not know what to make of it. Exploiting security flaws in Microsoft Windows, it grew at an astonishingly rapid rate, infecting millions of computers around the world within weeks. Once the worm infiltrated one system it was able to link it with others to form a single network under illicit outside control known as a “botnet.” This botnet was soon capable of overpowering any of the vital computer networks that control banking, telephones, energy flow, air traffic, health-care information―even the Internet itself. Was it a platform for criminal profit or a weapon controlled by a foreign power or dissident organization?
Surprisingly, the U.S. government was only vaguely aware of the threat that Conficker posed, and the task of mounting resistance to the worm fell to a disparate but gifted group of geeks, Internet entrepreneurs, and computer programmers. But when Conficker’s controllers became aware that their creation was encountering resistance, they began refining the worm’s code to make it more difficult to trace and more powerful, testing the Cabal lock’s unity and resolve. Will the Cabal lock down the worm before it is too late? Game on.
Worm: The First Digital World War, by Mark Bowden- Amazon Sales Rank: #1960314 in Books
- Brand: Bowden, Mark/ Lane, Christopher (NRT)
- Published on: 2015-03-10
- Formats: Audiobook, MP3 Audio, Unabridged
- Original language: English
- Number of items: 1
- Dimensions: 6.75" h x .50" w x 5.25" l,
- Running time: 8 Hours
- Binding: MP3 CD
Review Worm is worth attention. Government officials up to and including President Obama have taken notice of Conficker and begun to address some of the issues it raised.”BloombergWhen Mark Bowden writes, smart readers pay attention. . . . Bowden is a deserved brand name a superb reporter and compelling narrative writer, whether his subject is war in a forlorn land (Black Hawk Down, set in Somalia) or a variety of others in seven other books (Killing Pablo, Guests of the Ayatollah, etc.). And now we have the current masterpiece, Worm.”The Philadelphia InquirerThe author takes readers behind the scenes, showing the security specialists’ increasing frenzy, not to mention occasional infighting, as they worked to defeat the worm. Along the way, the author lucidly explains how malware can take over computers as well as how the very openness of the Internet makes it vulnerable to attack.”Publishers WeeklyFrom the author of Black Hawk Down, a different sort of blood-and-thunder heroism narrative, out on the frontiers of cybercrime. . . . A brief, punchy reminder of our high-tech vulnerabilities.”Kirkus ReviewsBowden . . . gives this account of the computer world’s efforts to neutralize the Conficker worm the flavor of a riveting report from the digital battlefield’s front lines. . . . A nerve-wracking but first-rate inside peek into the world of cybercrime and its vigilant adversaries.”Booklist[T]he thumbs of every 30-something üntergeek will still Tweet in ecstasy at seeing technical terms like NCP/IP, Port 445, and MS08-067 spread across the pages of a mainstream book. But the rest of us should take Mark Bowden’s warnings with the utmost seriousness because of the growing threats to our wired world.”New York Journal of Books
About the Author Mark Bowden is the author of seven books, including Black Hawk Down, Bringing the Heat, Killing Pablo, and Guests of the Ayatollah. He reported at The Philadelphia Inquirer for twenty years and is a national correspondent for The Atlantic Monthly. He lives in the Philadelphia area.
Where to Download Worm: The First Digital World War, by Mark Bowden
Most helpful customer reviews
122 of 122 people found the following review helpful. Should interest newbies and experts alike By Chris Lee Mullins One of the greatest things about airport bookstores - they often ignore sale dates. I purchased Worm a few days ago without realizing it wasn't supposed to be released yet. Which is good, because it made that flight from Denver to Baltimore tolerable.First things first. If you are a network newbie, you will be coddled by this book. You don't need to have your MCSE or CISSP to read "Worm". Bowden does a good job of breaking down salient data - what is TCPIP, what is RPC - and creating explanations that make sense. Don't know why Port 445 is so special? Wonder why Windows is so often the target of malware around the world? (the technical explanation, not the political answer) You will after reading this book. It won't win you any medals at the next Cisco shareholders meeting or net you a job in IT, but at least you'll know why Patch Tuesday is important and why malware isn't just a problem with code - it's a social engineering problem, too.The next best thing about this book is how much it stresses that the Internet is still in it's adolescence. It's a hodgepodge of ancient protocols and new-fangled protocols shoehorned into communicating with one another, and that's a fragile animal. you'll wonder why it doesn't go down more often."Worm" is entertaining and informative. Personally, I think it's too short. You'll get a quick bio about a particular researcher, follow them through some problem solving and then, inexplicably, drop them entirely while picking up with another researcher. I think the personalities involved are as important as the science. But those quibbles are trivial.
17 of 17 people found the following review helpful. The true story of how hackers almost brought down the Internet -- and still could By Mal Warwick It's out there. Waiting. Chances are, you've never heard of it. Nobody knows who controls it, or why. No one knows what it will do. But its destructive capacity is terrifying.Welcome to the world of cyberwar! And, no, this is NOT science fiction."It" is the Conficker Worm, an arcane name (an insider's joke) for the most powerful "malware" -- malicious software -- yet encountered on the Internet. First detected in November 2008, Conficker is a devilishly clever bit of programming that took advantage of a vulnerability in the Windows operating system. Microsoft immediately moved to "patch" the vulnerability, but therein lay the problem: Windows is the most-pirated software of all, so hundreds of milliions of computers were running versions of Windows without the patch -- all of them vulnerable to Conficker (and to hundreds of other malicious programs whose authors now knew how to embed their work in Windows).Mark Bowden, the very capable author of Blackhawk Down, tells the story in Worm of a group that included many of the world's top computer security experts who privately came together early in 2009 to combat Conficker. At first, they were confined exclusively to the private sector, and their work was informal. Eventually, they managed to gain the attention of senior government officials and -- slowly, reluctantly -- obtain limited official support from the U.S. and Chinese governments. The group, known among themselves as the Conficker Cabal, even managed to get onto the White House agenda late in the game, as Conficker was upgraded once and then again - because the worm represented nothing less than an existential threat to the Internet itself.I did say the potential was terrifying, didn't I?Bowden is a superb journalist and a capable writer, as Blackhawk Down made clear. However, Delta Force soldiers pinned down in a firefight in Mogadishu make for great copy. Geeks exchanging emails about technical material don't. Bowden does an excellent job explaining in plain English the nature of Conficker and how it operates, and he does his best to sketch the members of the Cabal in three diimensions, but the result is hardly a page-turner. Still, Worm is a very important book, because it brings to light just how vulnerable is the infrastructure of the world we live in.And, oh yes, the Cabal managed to fight Conficker to something of a standstill. But they couldn't destroy it, and to date they've never found the hackers who created it. Conficker is still out there.[...]
30 of 37 people found the following review helpful. This Will Really Get You Thinking About Computer Security! By Loyd Eskildson Author Bowden does a great job of summarizing malware in general, and the Conficker worm in particular. He begins by explaining that there are three types of malware - Trojans, viruses, and worms. A Trojan is a piece of software that masquerades as one thing to get inside a computer, then attacking. A virus attacks its host computer after entering its operating system - it depends on the operator opening an e-mail attachment or clicking on a lilnk. A worm works like a virus, but doesn't attack once it enters - it's primarily designed to spread, then wait for instructions delivered later.Some computer malware is intended to damage or destroy one's computer, and victims quickly realize the problem. A computer worm, by contrast, is a packet of computer code designed to infiltrate a computer without attracting attention and then scans for others to invade, spreading exponentially. The Conficker computer worm emerged in November, 2008 and infiltrated 1.5 million of the world's computers in the first month. By January, 2009 it had spread to at least 8 million computers, exploiting flaws in Microsoft Windows that it closed after entering. They constantly check with its unknown creaters at their unknown location for directions. Frustrated cyber-security experts at Microsoft, Symantec, SRI International, etc. have merged forces to try and defeat it - so far they've been unsuccessful. Bowden's 'Worm' tells how hackers, entrepreneurs, and computer security experts are trying to defend the Internet from Conficker - what the author calls 'the first digital world war.'In the 'good old days,' infected computers slowed down because user commands had to compete with viral invaders for processing power. Computers would slow down, and programs would freeze. Worm-linked computers ('botnets') can be used to steal information, assist fraudulent schemes, or launch denial-of-service attacks. So far, Conficker (35 kilobytes of code - less than a 2,000-word document) has done none of those things, and been activated only once to perform a short, simple spamming operation that sold a fake anti-spyware program for two weeks, then stopped.The Microsoft operating system has over 65,000 ports designed to transmit and receive certain kinds of data. Conficker exploited Port 445, which Microsoft had tried to repair 10/23/2008. Firewalls are security programs that guard these ports, but Port 445 was vulnerable even when protected by a firewall if both print-sharing and file-sharing were enabled. However, many fail to apply new patches promptly, and others run pirated Windows systems which Microsoft doesn't update. Thus, reverse-engineering patches allows attackers to create targeted worms.Experts trying to disable Conficker have learned that it tries to prevent communication with security providers, it avoided Ukrainian IP addresses, and disabled system restore points that allowed users to reset infected machines to a date prior to infection. To prevent IT-defenders from predicting how the infected computer would try to communicate home by setting the computer's clock ahead and then watching what happened (it generates 250 random-codes/day for each of 8 domains - eg. .com, .edu, .uk, etc.). Conficker-infected computers use system clocks (eg. Google, Yahoo) that can't be set ahead. The 'bad guys' only have to pay $10 to register one address, and wait for botnetted computers to make contact. Unfortunately for computer defenders, that communication used coding techniques employed in the latest standard, MD-6, revised.Defenders, however, were flooded by 50,000 domain names/day needing investigation. Each requires checking to ensure it belongs to a good guy, and their spread out all over the world. Worse yet, a newer version introduced peer-to-peer communication, meaning that all infected computers no longer needed to call home for instructions, and defenders no longer have any way of telling how many computers are infected.Another insidious Conficker attribute is that it could also be spread by USB drives - thus, systems not connected to the Internet were also vulnerable.Most of the world's 'best' malware comes from Eastern Europe, drawing on high levels of technical expertise and organized criminal gangs. That's a very big area within which to search.
See all 104 customer reviews... Worm: The First Digital World War, by Mark BowdenWorm: The First Digital World War, by Mark Bowden PDF
Worm: The First Digital World War, by Mark Bowden iBooks
Worm: The First Digital World War, by Mark Bowden ePub
Worm: The First Digital World War, by Mark Bowden rtf
Worm: The First Digital World War, by Mark Bowden AZW
Worm: The First Digital World War, by Mark Bowden Kindle
Tidak ada komentar:
Posting Komentar