The Cuckoo's Egg or Chasing a Spy in a Computer Maze
after payment (24/7)
(for all gadgets)
(including for Apple and Android)
Unlike a bad dancer, a good system administrator is only hindered by cuckoo eggs. They are put into his computer by evil hackers so that they can hatch into programs that make their cuckoo father a superuser. But no matter how much the cable curls, there will be a tip: the brave system administrator does not sleep and within a year or two brings the attackers to clean water: this time the hacker party flew by coolly. This is an extremely brief summary of the classic book by computer security expert Cliff Stoll, “The Cuckoo's Egg.” Unlike American films devoted to the same problem, which are fairly stuffed with technical blunders, this documentary detective accurately describes the work of hacker hunters who managed to identify unscrupulous Germans who were transferring hacked Pentagon information to Soviet intelligence in exchange for money and cocaine. So we can say that the author, who advocates the ethical unacceptability of hacking, has significantly simplified his life by identifying as his opponents hackers who sell information to foreign intelligence, and not enthusiasts who distribute it for free around the world. The book, of course, is already historical (the action takes place in 1986), but nevertheless reads with interest.
Data sheet
- Name of the Author
- Клиффорд Столл
- Language
- Ukrainian
- Release date
- 1996