www.amazon.com
Open in
urlscan Pro
2600:9000:2490:1400:7:49a5:5fd2:8621
Public Scan
Submitted URL: https://a.co/d/b0vbriV
Effective URL: https://www.amazon.com/dp/0316380504?ref_=cm_sw_r_mwn_dp_PTQFDY9BCQPV9QZZ3SPK
Submission: On February 19 via manual from US — Scanned from DE
Effective URL: https://www.amazon.com/dp/0316380504?ref_=cm_sw_r_mwn_dp_PTQFDY9BCQPV9QZZ3SPK
Submission: On February 19 via manual from US — Scanned from DE
Form analysis
5 forms found in the DOMName: site-search — GET /s/ref=nb_sb_noss
<form id="nav-search-bar-form" accept-charset="utf-8" action="/s/ref=nb_sb_noss" class="nav-searchbar nav-progressive-attribute" method="GET" name="site-search" role="search">
<div id="nav-search-bar-internationalization-key" class="nav-progressive-content">
<input type="hidden" name="__mk_de_DE" value="ÅMÅŽÕÑ">
</div>
<div class="nav-left">
<div id="nav-search-dropdown-card">
<div class="nav-search-scope nav-sprite">
<div class="nav-search-facade" data-value="search-alias=aps">
<span id="nav-search-label-id" class="nav-search-label nav-progressive-content" style="width: auto;">Bücher</span>
<i class="nav-icon"></i>
</div>
<label id="searchDropdownDescription" for="searchDropdownBox" class="nav-progressive-attribute" style="display:none">Wähle die Kategorie aus, in der du suchen möchtest.</label>
<select aria-describedby="searchDropdownDescription" class="nav-search-dropdown searchSelect nav-progressive-attrubute nav-progressive-search-dropdown" data-nav-digest="1SD8NwQshDByAo2UzADo2J0Dtdw=" data-nav-selected="3"
id="searchDropdownBox" name="url" style="display: block; top: 2.5px;" tabindex="0" title="Suchen in">
<option value="search-alias=aps">Alle Kategorien</option>
<option value="search-alias=automotive-intl-ship">Automobil</option>
<option value="search-alias=baby-products-intl-ship">Baby</option>
<option selected="selected" current="parent" value="search-alias=stripbooks-intl-ship">Bücher</option>
<option value="search-alias=computers-intl-ship">Computer</option>
<option value="search-alias=fashion-womens-intl-ship">Damenmode</option>
<option value="search-alias=electronics-intl-ship">Elektronik</option>
<option value="search-alias=movies-tv-intl-ship">Filme und Fernsehen</option>
<option value="search-alias=luggage-intl-ship">Gepäck</option>
<option value="search-alias=hpc-intl-ship">Gesundheit & Haushalt</option>
<option value="search-alias=pets-intl-ship">Haustierbedarf</option>
<option value="search-alias=kitchen-intl-ship">Heim und Küche</option>
<option value="search-alias=fashion-mens-intl-ship">Herrenmode</option>
<option value="search-alias=industrial-intl-ship">Industriell und Wissenschaftlich</option>
<option value="search-alias=digital-text">Kindle-Shop</option>
<option value="search-alias=arts-crafts-intl-ship">Kunst und Handwerk</option>
<option value="search-alias=fashion-boys-intl-ship">Mode für Jungen</option>
<option value="search-alias=fashion-girls-intl-ship">Mode für Mädchen</option>
<option value="search-alias=music-intl-ship">Musik, CDs & Vinyl</option>
<option value="search-alias=digital-music">Musik-Downloads</option>
<option value="search-alias=instant-video">Prime Video</option>
<option value="search-alias=deals-intl-ship">Sales & Angebote</option>
<option value="search-alias=beauty-intl-ship">Schönheit & Körperpflege</option>
<option value="search-alias=software-intl-ship">Software</option>
<option value="search-alias=toys-and-games-intl-ship">Spielzeug und Spiele</option>
<option value="search-alias=sporting-intl-ship">Sport und Freizeit</option>
<option value="search-alias=videogames-intl-ship">Videospiele</option>
<option value="search-alias=tools-intl-ship">Werkzeug & Heimwerken</option>
</select>
</div>
</div>
</div>
<div class="nav-fill">
<div class="nav-search-field ">
<label for="twotabsearchtextbox" style="display: none;">Suche Amazon</label>
<input type="text" id="twotabsearchtextbox" value="" name="field-keywords" autocomplete="off" placeholder="Suche Amazon" class="nav-input nav-progressive-attribute" dir="auto" tabindex="0" aria-label="Suche Amazon" spellcheck="false">
</div>
<div id="nav-iss-attach"></div>
</div>
<div class="nav-right">
<div class="nav-search-submit nav-sprite">
<span id="nav-search-submit-text" class="nav-search-submit-text nav-sprite nav-progressive-attribute" aria-label="Los">
<input id="nav-search-submit-button" type="submit" class="nav-input nav-progressive-attribute" value="Los" tabindex="0">
</span>
</div>
</div>
</form>
POST /gp/product/handle-buy-box/ref=dp_start-bbf_1_glance
<form method="post" id="addToCart" action="/gp/product/handle-buy-box/ref=dp_start-bbf_1_glance" class="a-content" autocomplete="off">
<input type="hidden" name="CSRF" value="g1NfnhK0fy69GSti0ML8t0Y0M4ViBYbOTIhOo+eP2gfNAAAADAAAAABj8YhFcmF3AAAAABVX8CwXqz4nuL9RKX///w=="> <input type="hidden" id="anti-csrftoken-a2z" name="anti-csrftoken-a2z"
value="g9eUEz45qbuXtqnFrnvh9jdQPiaYepktdHAHFtPWPuweAAAADAAAAABj8YhEcmF3AAAAABVX8CwXqz4nuL9RKf///w==">
<input type="hidden" id="offerListingID" name="offerListingID" value="">
<input type="hidden" id="session-id" name="session-id" value="140-9266407-4237822">
<input type="hidden" id="ASIN" name="ASIN" value="0316380504">
<input type="hidden" id="isMerchantExclusive" name="isMerchantExclusive" value="0">
<input type="hidden" id="merchantID" name="merchantID" value="">
<input type="hidden" id="isAddon" name="isAddon" value="0">
<input type="hidden" id="nodeID" name="nodeID" value="">
<input type="hidden" id="sellingCustomerID" name="sellingCustomerID" value="">
<input type="hidden" id="qid" name="qid" value="">
<input type="hidden" id="sr" name="sr" value="">
<input type="hidden" id="storeID" name="storeID" value="">
<input type="hidden" id="tagActionCode" name="tagActionCode" value="">
<input type="hidden" id="viewID" name="viewID" value="glance">
<input type="hidden" id="rebateId" name="rebateId" value="">
<input type="hidden" id="ctaDeviceType" name="ctaDeviceType" value="desktop">
<input type="hidden" id="ctaPageType" name="ctaPageType" value="detail">
<input type="hidden" id="usePrimeHandler" name="usePrimeHandler" value="0">
<input type="hidden" id="rsid" name="rsid" value="140-9266407-4237822">
<input type="hidden" id="sourceCustomerOrgListID" name="sourceCustomerOrgListID" value="">
<input type="hidden" id="sourceCustomerOrgListItemID" name="sourceCustomerOrgListItemID" value="">
<input type="hidden" name="wlPopCommand" value="">
<div id="usedOnlyBuybox" class="a-section a-spacing-medium">
<div class="a-row a-spacing-medium">
<div class="a-box">
<div class="a-box-inner">
<div class="a-section a-spacing-none a-padding-none">
<div id="usedBuySection" class="rbbHeader dp-accordion-row">
<div class="a-row a-grid-vertical-align a-grid-center" style="height:41px;">
<div class="a-column a-span12 a-text-left"> <span class="a-text-bold">Gebraucht kaufen</span> <span class="a-size-base a-color-price offer-price a-text-normal">35,75 $</span> </div>
</div>
<div class="a-row"> <span class="a-size-base a-color-price offer-price a-text-normal"></span> </div>
</div>
<div id="usedbuyBox" class="rbbContent dp-accordion-inner" spacingtop="small">
<input type="hidden" id="usedMerchantID" name="usedMerchantID" value="AAHKUF7HYJZYO">
<input type="hidden" id="usedOfferListingID" name="usedOfferListingID"
value="CCxPhMxcQ9OLGnUY2e7zrrwnFnyl6V%2BDc%2FXjIJzBQjbv4Z26gi0Uy1FcbsCWMaxHMpmSxm2Xc%2BL9VKS0gJaYnFMSmmrLO0inEZPhRkGiQvVPSNo%2BYUGVt8xfTiTQyTX%2B3h%2BfyMA3Ps1XR6OhRWu%2FhDDmX8LR9La0ZHlHggVvYSL3fzBzMOs%2Blw%3D%3D">
<input type="hidden" id="usedSellingCustomerID" name="usedSellingCustomerID" value="">
<input type="hidden" name="items[0.base][asin]" value="0316380504">
<input type="hidden" name="clientName" value="OffersX_OfferDisplay_DetailPage">
<input type="hidden" name="items[0.base][offerListingId]"
value="CCxPhMxcQ9OLGnUY2e7zrrwnFnyl6V%2BDc%2FXjIJzBQjbv4Z26gi0Uy1FcbsCWMaxHMpmSxm2Xc%2BL9VKS0gJaYnFMSmmrLO0inEZPhRkGiQvVPSNo%2BYUGVt8xfTiTQyTX%2B3h%2BfyMA3Ps1XR6OhRWu%2FhDDmX8LR9La0ZHlHggVvYSL3fzBzMOs%2Blw%3D%3D">
<div id="usedDeliveryBlockContainer" class="a-row">
<div id="deliveryBlock_feature_div" class="a-section a-spacing-none">
<div id="deliveryBlockMessage" class="a-section">
<div id="mir-layout-DELIVERY_BLOCK">
<div class="a-spacing-base" id="mir-layout-DELIVERY_BLOCK-slot-PRIMARY_DELIVERY_MESSAGE_LARGE"><span data-csa-c-type="element" data-csa-c-content-id="DEXUnifiedCXPDM" data-csa-c-delivery-price="" data-csa-c-value-proposition=""
data-csa-c-delivery-type="Lieferung" data-csa-c-delivery-time="16. - 23. März" data-csa-c-delivery-destination="" data-csa-c-delivery-condition="" data-csa-c-pickup-location="" data-csa-c-distance=""
data-csa-c-delivery-cutoff="" data-csa-c-mir-view="CONSOLIDATED_CX" data-csa-c-mir-type="DELIVERY" data-csa-c-mir-sub-type="" data-csa-c-mir-variant="DEFAULT" data-csa-c-delivery-benefit-program-id="paid_shipping"
data-csa-c-id="u3mb4-p727ua-c28nx6-8vvfdv"> Lieferung <span class="a-text-bold">16. - 23. März</span> </span></div>
<div class="a-spacing-base" id="mir-layout-DELIVERY_BLOCK-slot-SECONDARY_DELIVERY_MESSAGE_LARGE"><span data-csa-c-type="element" data-csa-c-content-id="DEXUnifiedCXSDM" data-csa-c-delivery-price="schnellste"
data-csa-c-value-proposition="" data-csa-c-delivery-type="Lieferung" data-csa-c-delivery-time="13. - 15. März" data-csa-c-delivery-destination="" data-csa-c-delivery-condition="" data-csa-c-pickup-location=""
data-csa-c-distance="" data-csa-c-delivery-cutoff="" data-csa-c-mir-view="CONSOLIDATED_CX" data-csa-c-mir-type="DELIVERY" data-csa-c-mir-sub-type="" data-csa-c-mir-variant="DEFAULT" data-csa-c-delivery-benefit-program-id=""
data-csa-c-id="zcomax-q5pa0t-xafej7-nnuxon"> Oder schnellste Lieferung <span class="a-text-bold">13. - 15. März</span> </span></div>
</div>
</div>
</div>
<div id="cipInsideDeliveryBlock_feature_div" class="a-section a-spacing-none">
<hza:getweblabtreatment var="auiOptimizationWeblab" treatment="OFFERSX_OD_JSP_AUI_OPTIMIZATION_564780" trigger="false">
<span class="a-declarative" data-action="dpContextualIngressPt" data-csa-c-type="widget" data-csa-c-func-deps="aui-da-dpContextualIngressPt" data-dpcontextualingresspt="{}" data-csa-c-id="4qtyzt-wfhahs-3533fm-82xww5"> <a class="a-link-normal" href="#"> <div class="a-row a-spacing-small"> <div class="a-column a-span12 a-text-left"> <div id="contextualIngressPt">
<div id="contextualIngressPtPin"></div>
<span id="contextualIngressPtLabel" class="cip-a-size-small">
<div id="contextualIngressPtLabel_deliveryShortLine"><span>Liefern nach </span><span>Deutschland</span></div>
</span>
</div>
</div> </div> </a> </span>
</hza:getweblabtreatment>
</div>
</div>
<div class="a-section a-spacing-base">
<div class="a-row"> <strong> Gebraucht: Gut </strong>
<span class="a-size-base"> <span class="a-color-tertiary"> | </span><a id="usedItemConditionInfoLink" class="a-link-normal a-declarative" href="#">Details</a> </span>
</div>
<div class="a-row"> Verkauft von <a id="sellerProfileTriggerId" data-is-ubb="true" class="a-link-normal" href="/-/de/gp/help/seller/at-a-glance.html?ie=UTF8&seller=AAHKUF7HYJZYO&isAmazonFulfilled=1">In D-Mand</a> </div>
<div class="a-row"> <a id="SSOFpopoverLink_ubb" class="a-link-normal a-declarative" href="/-/de/gp/help/customer/display.html?ie=UTF8&ref=dp_ubb_fulfillment&nodeId=106096011">Versand durch Amazon</a> </div>
</div>
<div class="a-popover-preload" id="a-popover-usedItemConditionDetailsPopover">
<div class="a-section a-spacing-micro"> <span class="a-size-mini"> <strong>Zustand:</strong> Gebraucht: Gut </span> </div>
<div class="a-section a-spacing-micro"> <span class="a-size-mini"> <strong>Kommentar:</strong> No highlighting/underlining. Minor wear. </span> </div>
</div>
<div class="a-popover-preload" id="a-popover-SSOFpopoverLink_ubb-content">
<p>Beim Versand durch Amazon nutzen Verkaufspartner die Logistik der Amazon-Versandzentren: Amazon verpackt und verschickt die Artikel und übernimmt den Kundenservice. <b>Deine Vorteile:</b> <em>(1) Lieferung ab 29 EUR Bestellwert
(Bücher, Bekleidung und Schuhe generell versandkostenfrei, auch zusammen mit Media-Produkten). (2) Kombinieren und sparen - bestelle bei Amazon.de oder Verkaufspartnern, die den Versand durch Amazon nutzen, wird deine Bestellung
zu einer Lieferung zusammengefasst. (3) Alle Artikel sind mit Amazon Prime für noch schnellere Lieferung bestellbar.</em></p>
<p>Wenn Sie Verkäufer sind, kann Versand durch Amazon Ihnen dabei helfen, Ihre Umsätze zu steigern. <a href="https://services.amazon.de/programme/versand-durch-amazon/merkmale-und-vorteile.html">Weitere Informationen zum Programm</a>
</p>
</div>
<script type="text/javascript">
P.when("A", "jQuery", "a-popover", "ready").execute(function(A, $, popover) {
"use strict";
var title = "Was bedeutet Versand durch Amazon?";
var triggerId = "#SSOFpopoverLink_ubb";
var contentId = "SSOFpopoverLink_ubb-content";
var options = {
"header": title,
"name": contentId,
"activate": "onclick",
"width": 430,
"position": "triggerBottom"
};
var $trigger = $(triggerId);
var instance = popover.create($trigger, options);
});
</script>
<div class="a-section a-spacing-small">
<div class="a-section a-spacing-none a-text-left">
<div class="a-row"> <span class="a-size-mini a-color-tertiary"> Zugriffscodes und Beilagen sind bei gebrauchten Artikeln nicht garantiert. </span> </div>
</div>
</div>
<script type="a-state" data-a-state="{"key":"atc-page-state"}">{"shouldUseNatcUsed":true}</script>
<div class="a-button-stack"> <span class="a-declarative" data-action="dp-pre-atc-declarative" data-csa-c-type="widget" data-csa-c-func-deps="aui-da-dp-pre-atc-declarative" data-dp-pre-atc-declarative="{}" id="atc-declarative"
data-csa-c-id="4q32mo-6jcog8-ohl9oi-t3bqkv"> <span id="submit.add-to-cart-ubb" class="a-button a-spacing-small a-button-primary a-button-icon natc-enabled"><span class="a-button-inner"><i class="a-icon a-icon-cart"></i><input
id="add-to-cart-button-ubb" name="submit.add-to-cart-ubb" title="In den Einkaufswagen" data-hover="<b> auswählen__dims__</b> auf der linken Seite<br> zum Hinzufügen zum Einkaufswagen" data-ref="" class="a-button-input"
type="submit" value="In den Einkaufswagen" aria-labelledby="submit.add-to-cart-ubb-announce" formaction="/cart/add-to-cart/ref=dp_start-ubbf_1_glance"><span id="submit.add-to-cart-ubb-announce" class="a-button-text"
aria-hidden="true">In den Einkaufswagen</span></span></span> </span> </div>
<div class="a-section a-spacing-none a-text-center">
<div class="a-row">
<div class="a-button-stack"> </div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="a-box a-spacing-top-base">
<div class="a-box-inner">
<script>
function atwlEarlyClick(e) {
e.preventDefault();
if (window.atwlLoaded) {
return; //if JS is loaded then we can ignore the early click case
}
var ADD_TO_LIST_FROM_DETAIL_PAGE_VENDOR_ID = "website.wishlist.detail.add.earlyclick";
var paramMap = {
"asin": "0316380504",
"vendorId": ADD_TO_LIST_FROM_DETAIL_PAGE_VENDOR_ID,
"isAjax": "false"
}
var url = "/hz/wishlist/additemtolist?ie=UTF8";
for (var param in paramMap) {
url += "&" + param + "=" + paramMap[param];
}
var xhr = new XMLHttpRequest();
xhr.open("POST", url, false);
xhr.setRequestHeader("anti-csrftoken-a2z", "gxAtVpCKffZYVqtyIJ/3kg79gm+TxE8v8/eIA2W6sMVgAAAAAQAAAABj8YhEcmF3AAAAAHuL9oHQYR32uqP6iUf9gA==");
xhr.onload = function() {
window.location = xhr.responseURL; //Needed to force a redirect; not supported on IE!
}
xhr.send();
}
</script>
<div id="wishlistButtonStack" class="a-button-stack">
<script>
'use strict';
P.when('A').execute(function(A) {
A.declarative('atwlDropdownClickDeclarative', 'click', function(e) {
window.wlArrowEv = e;
e.$event.preventDefault();
(function() {
if (window.P && window.atwlLoaded) {
window.P.when('A').execute(function(A) {
A.trigger('wl-drop-down', window.wlArrowEv);
})
return;
}
window.atwlEc = true;
var b = document.getElementById('add-to-wishlist-button-group');
var s = document.getElementById('atwl-dd-spinner-holder');
if (!(s && b)) {
return;
}
s.classList.remove('a-hidden');
s.style.position = 'absolute';
s.style.width = b.clientWidth + 'px';
s.style.zIndex = 1;
return;
})();
return false;
});
});
</script>
<div id="add-to-wishlist-button-group" data-csa-c-func-deps="aui-da-a-button-group" data-csa-c-type="widget" data-csa-interaction-events="click" data-hover="<!-- If PartialItemStateWeblab is true then, showing different Add-to-wish-list tool-tip message which is consistent with Add-to-Cart tool tip message. -->
Auf die Liste? Bitte wähle aus dem Sortiment links." class="a-button-group a-declarative a-spacing-none" data-action="a-button-group" role="radiogroup" data-csa-c-id="oerx9u-zengcg-eur7b9-tc25rs"> <span id="wishListMainButton"
class="a-button a-button-groupfirst a-spacing-none a-button-base a-declarative" role="radio" data-action="add-wishlist-declarative" aria-posinset="1" aria-setsize="1"><span class="a-button-inner"><a href="https://www.amazon.com/-/de/ap/signin?openid.return_to=https%3A%2F%2Fwww.amazon.com%2Fgp%2Faw%2Fd%2F0316380504&openid.identity=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.assoc_handle=usflex&openid.mode=checkid_setup&openid.claimed_id=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.ns=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0&" name="submit.add-to-registry.wishlist.unrecognized" title="Auf die Liste" data-hover="<!-- If PartialItemStateWeblab is true then, showing different Add-to-wish-list tool-tip message which is consistent with Add-to-Cart tool tip message. -->
Auf die Liste? Bitte wähle aus dem Sortiment links." class="a-button-text a-text-left"> Auf die Liste </a></span></span> </div>
<div id="atwl-inline-spinner" class="a-section a-hidden">
<div class="a-spinner-wrapper"><span class="a-spinner a-spinner-medium"></span></div>
</div>
<div id="atwl-inline" class="a-section a-spacing-none a-hidden">
<div class="a-row a-text-ellipsis">
<div id="atwl-inline-sucess-msg" class="a-box a-alert-inline a-alert-inline-success" aria-live="polite" aria-atomic="true">
<div class="a-box-inner a-alert-container"><i class="a-icon a-icon-alert"></i>
<div class="a-alert-content"> <span class="a-size-base" role="alert"> Hinzugefügt zu </span> </div>
</div>
</div> <a id="atwl-inline-link" class="a-link-normal" href="/-/de/gp/registry/wishlist/"> <span id="atwl-inline-link-text" class="a-size-base" role="alert"> </span> </a>
</div>
</div>
<div id="atwl-inline-error" class="a-section a-hidden">
<div class="a-box a-alert-inline a-alert-inline-error" role="alert">
<div class="a-box-inner a-alert-container"><i class="a-icon a-icon-alert"></i>
<div class="a-alert-content"> <span id="atwl-inline-error-msg" class="a-size-base" role="alert"> Hinzufügen war nicht erfolgreich. Bitte versuche es erneut. </span> </div>
</div>
</div>
</div>
<div id="atwl-dd-spinner-holder" class="a-section a-hidden">
<div class="a-row a-dropdown">
<div class="a-section a-popover-wrapper">
<div class="a-section a-text-center a-popover-inner">
<div class="a-box a-popover-loading">
<div class="a-box-inner"> </div>
</div>
</div>
</div>
</div>
</div>
<div id="atwl-dd-error-holder" class="a-section a-hidden">
<div class="a-section a-dropdown">
<div class="a-section a-popover-wrapper">
<div class="a-section a-spacing-base a-padding-base a-text-left a-popover-inner">
<h3 class="a-color-error"> Es ist ein Fehler aufgetreten. </h3> <span> Es gab einen Fehler beim Abrufen deines Wunschzettels. Versuche es noch einmal. </span>
</div>
</div>
</div>
</div>
<div id="atwl-dd-unavail-holder" class="a-section a-hidden">
<div class="a-section a-dropdown">
<div class="a-section a-popover-wrapper">
<div class="a-section a-spacing-base a-padding-base a-text-left a-popover-inner">
<h3 class="a-color-error"> Es ist ein Fehler aufgetreten. </h3> <span> Liste nicht verfügbar. </span>
</div>
</div>
</div>
</div>
<script type="a-state" data-a-state="{"key":"atwl"}">
{"showInlineLink":false,"hzPopover":true,"wishlistButtonId":"add-to-wishlist-button","dropDownHtml":"","inlineJsFix":true,"wishlistButtonSubmitId":"add-to-wishlist-button-submit","maxAjaxFailureCount":"3","asin":"0316380504"}</script>
</div>
<script type="a-state" data-a-state="{"key":"popoverState"}">{"formId":"addToCart","showWishListDropDown":false,"wishlistPopoverWidth":232,"isAddToWishListDropDownAuiEnabled":true,"showPopover":false}</script>
<script>
'use strict';
window.P.now('atwl-ready').execute(function(atwlModule) {
var isRegistered = (typeof atwlModule !== 'undefined');
if (!isRegistered) {
window.P.register('atwl-ready');
}
});
</script>
<div class="aok-hidden" data-amazon-lists-csrf-token="gxAtVpCKffZYVqtyIJ/3kg79gm+TxE8v8/eIA2W6sMVgAAAAAQAAAABj8YhEcmF3AAAAAHuL9oHQYR32uqP6iUf9gA=="></div>
<script type="text/javascript">
(function(f) {
var _np = (window.P._namespace("list-CF-register-js"));
if (_np.guardFatal) {
_np.guardFatal(f)(_np);
} else {
f(_np);
}
}(function(P) {
"use strict";
window.P.now('atwl-cf').execute(function(module) {
var isRegistered = (typeof module !== 'undefined');
if (!isRegistered) {
window.P.register('atwl-cf');
}
});
}));
</script>
<style type="text/css">
.registry-button-width {
width: 100%;
margin-left: ;
margin-right: ;
}
.add-to-baby-button-spacing-bottom {
margin-bottom: 0;
}
</style>
</div>
</div>
</div>
<script type="text/javascript">
P.when("accordionBuyBoxJS").execute(function(buyBoxJS) {
buyBoxJS.initialize();
});
</script>
<input data-addnewaddress="add-new" id="cartAddressNew" name="dropdown-selection" type="hidden" value="add-new" class="nav-progressive-attribute"><input data-addnewaddress="add-new" id="cartAddressUsed" name="dropdown-selection-ubb" type="hidden"
value="add-new" class="nav-progressive-attribute">
</form>
GET
<form method="get" action="" autocomplete="off" class="aok-hidden all-offers-display-params"> <input type="hidden" name="" value="true" id="all-offers-display-reload-param"> <input type="hidden" name="" id="all-offers-display-params"
data-asin="0316380504" data-m="" data-qid="" data-smid="" data-sourcecustomerorglistid="" data-sourcecustomerorglistitemid="" data-sr=""> </form>
POST
<form method="post" action="" class="_shopping-cx-feedback-widget_style_radio-feedback-form__2dveN">
<fieldset>
<h1 id="radioHeading" class="a-size-large a-spacing-double-large a-text-center feedbackRadioHeading a-text-bold">Wie bewertest du heute deine Erfahrung beim Kauf von Büchern auf Amazon?</h1>
</fieldset>
<table class="a-normal _shopping-cx-feedback-widget_style_radio-feedback-table__3PsBH">
<tbody>
<tr class="_shopping-cx-feedback-widget_style_form-horizontal-radiobutton-input-row__1t5DJ">
<td class="_shopping-cx-feedback-widget_style_form-table-column__3c_E1">
<div data-a-input-name="shoppingCXRadio" class="a-radio a-radio-fancy feedbackRadioButton"><label for="radio1"><input type="radio" id="radio1" name="shoppingCXRadio" value="1" autocomplete="off"><i class="a-icon a-icon-radio"></i><span
class="a-label a-radio-label"><span aria-hidden="false" hidden="">Sehr schlecht</span></span></label></div>
</td>
<td class="_shopping-cx-feedback-widget_style_form-table-column__3c_E1">
<div data-a-input-name="shoppingCXRadio" class="a-radio a-radio-fancy feedbackRadioButton"><label for="radio2"><input type="radio" id="radio2" name="shoppingCXRadio" value="2" autocomplete="off"><i class="a-icon a-icon-radio"></i><span
class="a-label a-radio-label"><span aria-hidden="false" hidden="">Schlecht</span></span></label></div>
</td>
<td class="_shopping-cx-feedback-widget_style_form-table-column__3c_E1">
<div data-a-input-name="shoppingCXRadio" class="a-radio a-radio-fancy feedbackRadioButton"><label for="radio3"><input type="radio" id="radio3" name="shoppingCXRadio" value="3" autocomplete="off"><i class="a-icon a-icon-radio"></i><span
class="a-label a-radio-label"><span aria-hidden="false" hidden="">Weder noch</span></span></label></div>
</td>
<td class="_shopping-cx-feedback-widget_style_form-table-column__3c_E1">
<div data-a-input-name="shoppingCXRadio" class="a-radio a-radio-fancy feedbackRadioButton"><label for="radio4"><input type="radio" id="radio4" name="shoppingCXRadio" value="4" autocomplete="off"><i class="a-icon a-icon-radio"></i><span
class="a-label a-radio-label"><span aria-hidden="false" hidden="">Gut</span></span></label></div>
</td>
<td class="_shopping-cx-feedback-widget_style_form-table-column__3c_E1">
<div data-a-input-name="shoppingCXRadio" class="a-radio a-radio-fancy feedbackRadioButton"><label for="radio5"><input type="radio" id="radio5" name="shoppingCXRadio" value="5" autocomplete="off"><i class="a-icon a-icon-radio"></i><span
class="a-label a-radio-label"><span aria-hidden="false" hidden="">Großartig</span></span></label></div>
</td>
</tr>
<tr class="_shopping-cx-feedback-widget_style_form-horizontal-radiobutton-label-row__2mRxc">
<td class="_shopping-cx-feedback-widget_style_form-table-column__3c_E1">
<div class="_shopping-cx-feedback-widget_style_feedback-radio-label__JZ92s"><span aria-hidden="true" class="a-size-base">Sehr schlecht</span></div>
</td>
<td></td>
<td class="_shopping-cx-feedback-widget_style_form-table-column__3c_E1">
<div class="_shopping-cx-feedback-widget_style_feedback-radio-label__JZ92s"><span aria-hidden="true" class="a-size-base">Weder noch</span></div>
</td>
<td></td>
<td class="_shopping-cx-feedback-widget_style_form-table-column__3c_E1">
<div class="_shopping-cx-feedback-widget_style_feedback-radio-label__JZ92s"><span aria-hidden="true" class="a-size-base">Großartig</span></div>
</td>
</tr>
</tbody>
</table>
</form>
Name: ue_backdetect — get
<form name="ue_backdetect" action="get"><input type="hidden" name="ue_back" value="2"></form>
Text Content
Zum Hauptinhalt wechseln .us Liefern nach Deutschland Bücher Wähle die Kategorie aus, in der du suchen möchtest. Alle Kategorien Automobil Baby Bücher Computer Damenmode Elektronik Filme und Fernsehen Gepäck Gesundheit & Haushalt Haustierbedarf Heim und Küche Herrenmode Industriell und Wissenschaftlich Kindle-Shop Kunst und Handwerk Mode für Jungen Mode für Mädchen Musik, CDs & Vinyl Musik-Downloads Prime Video Sales & Angebote Schönheit & Körperpflege Software Spielzeug und Spiele Sport und Freizeit Videospiele Werkzeug & Heimwerken Suche Amazon DE Hallo, anmelden Konto und Listen Warenrücksendungen und Bestellungen 0 Einkaufswagen Anmelden Neuer Kunde? Starte hier. Meine Listen Neue Liste anlegen Liste finden AmazonSmile Charity Lists Mein Konto Konto Bestellungen Empfehlungen Browserverlauf Watchlist Gekaufte und geliehene Videos Kindle Unlimited Inhalte und Geräte Spar-Abo-Artikel Mitgliedschaften und Abonnements Musikbibliothek Anmelden Neuer Kunde? Starte hier. Alle INTERNATIONALE EINKÄUFE BENACHRICHTIGUNG FÜR ÜBERGANG Wir liefern international Wir zeigen Ihnen Artikel, die nach DE geliefert werden. Um Artikel anzuzeigen, die in ein anderes Land geliefert werden, ändern Sie bitte Ihre Versandadresse. FORTFAHREN DIE ADRESSE ÄNDERN Angebote des Tages Kundenservice Wunschlisten Geschenkkarten Verkaufen bei Amazon Kundensupport bei Behinderungen Angebote in der Elektronik einkaufen Bücher Erweiterte Suche Neuerscheinungen Bestseller und mehr Amazon Buchclubs Kinderbücher Lehrbücher Lehrbücher leihen des Monats Amazon.com: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data: 9780316380508: Mitnick, Kevin, Vamosi, Robert, Hypponen, Mikko: Bücher * Bücher * › * Computer & Internet * › * Netzwerke Gebraucht kaufen 35,75 $ Lieferung 16. - 23. März Oder schnellste Lieferung 13. - 15. März Liefern nach Deutschland Gebraucht: Gut | Details Verkauft von In D-Mand Versand durch Amazon Zustand: Gebraucht: Gut Kommentar: No highlighting/underlining. Minor wear. Beim Versand durch Amazon nutzen Verkaufspartner die Logistik der Amazon-Versandzentren: Amazon verpackt und verschickt die Artikel und übernimmt den Kundenservice. Deine Vorteile: (1) Lieferung ab 29 EUR Bestellwert (Bücher, Bekleidung und Schuhe generell versandkostenfrei, auch zusammen mit Media-Produkten). (2) Kombinieren und sparen - bestelle bei Amazon.de oder Verkaufspartnern, die den Versand durch Amazon nutzen, wird deine Bestellung zu einer Lieferung zusammengefasst. (3) Alle Artikel sind mit Amazon Prime für noch schnellere Lieferung bestellbar. Wenn Sie Verkäufer sind, kann Versand durch Amazon Ihnen dabei helfen, Ihre Umsätze zu steigern. Weitere Informationen zum Programm Zugriffscodes und Beilagen sind bei gebrauchten Artikeln nicht garantiert. In den Einkaufswagen Auf die Liste Hinzugefügt zu Hinzufügen war nicht erfolgreich. Bitte versuche es erneut. ES IST EIN FEHLER AUFGETRETEN. Es gab einen Fehler beim Abrufen deines Wunschzettels. Versuche es noch einmal. ES IST EIN FEHLER AUFGETRETEN. Liste nicht verfügbar. Möchtest du verkaufen? Bei Amazon verkaufen Zum Buchclub hinzufügen Deine Buchclubs werden geladen. Beim Laden deiner Buchclubs ist ein Problem aufgetreten. Bitte versuche es noch einmal. Nicht in einem Club? Weitere Informationen Mitglied werden oder Buchclubs erstellen Wählt gemeinsam Bücher aus Verfolge deine Bücher. Bringe deinen Club zu Amazon Buchclubs, gründe einen neuen Buchclub und lade Freunde ein oder finde kostenlos einen Club, der zu dir passt. Amazon Book Clubs erkunden Gesponsert Lade die kostenlose Kindle-App herunter und lese deine Kindle-Bücher sofort auf deinem Smartphone, Tablet oder Computer – kein Kindle-Gerät erforderlich. Weitere Informationen Mit Kindle für Web kannst du sofort in deinem Browser lesen. -------------------------------------------------------------------------------- Scanne den folgenden Code mit deiner Mobiltelefonkamera und lade die Kindle-App herunter. Zur Rückseite klappen Zur Vorderseite klappen Hörprobe Wird gespielt... Angehalten Du hörst eine Hörprobe des Audible Hörbuch-Downloads. Mehr erfahren Alle 2 Bilder anzeigen -------------------------------------------------------------------------------- DEM AUTOR FOLGEN Kevin D. Mitnick Folgen Ein Fehler ist aufgetreten. Wiederhole die Anfrage später noch einmal. OK THE ART OF INVISIBILITY: THE WORLD'S MOST FAMOUS HACKER TEACHES YOU HOW TO BE SAFE IN THE AGE OF BIG BROTHER AND BIG DATA GEBUNDENE AUSGABE – 14. FEBRUAR 2017 von Kevin Mitnick (Author), Robert Vamosi Mikko Hypponen (Foreword) & 0 mehr 4,5 von 5 Sternen 1.964 Sternebewertungen Von der Redaktion empfohlen Beste Sachbücher -------------------------------------------------------------------------------- Alle Formate und Editionen anzeigen Sorry, there was a problem loading this page. Try again. Preis Neu ab Gebraucht ab Kindle "Bitte wiederholen" 11,99 $ — — Audible Hörbuch, Ungekürzte Ausgabe "Bitte wiederholen" 0,00 $ Gratis im Audible-Probemonat Gebundenes Buch "Bitte wiederholen" 35,75 $ 73,95 $ 12,00 $ Taschenbuch "Bitte wiederholen" — 13,30 $ 6,92 $ Taschenbuch "Bitte wiederholen" 11,83 $ — 11,83 $ Audio-CD, Hörbuch, CD, Ungekürzte Ausgabe "Bitte wiederholen" 22,75 $ 22,50 $ — * Kindle 11,99 $ Lies mit kostenfreien App * Hörbuch 0,00 $ Gratis im Audible-Probemonat * Gebundenes Buch 35,75 $ 23 Gebraucht ab 12,00 $ 7 Neu ab 73,95 $ * Taschenbuch ab 6,92 $ 39 Gebraucht ab 6,92 $ 30 Neu ab 13,30 $ * Taschenbuch 11,83 $ 3 Gebraucht ab 11,83 $ * Audio-CD 22,75 $ 2 Neu ab 22,50 $ Optimiert für Kindle Ein hochwertiges digitales Leseerlebnis. Entdecke unser optimiertes digitales Leseerlebnis Jedes Buch in Optimiert für Kindle bietet ein großartiges Leseerlebnis zu einem günstigeren Preis als das gebundene Buch. Blättere durch das Buch und springe mit PageFlip immer wieder dorthin zurück, wo du aufgehört hast. Vergrößere Bilder mit hoher Qualität, um sie genauer zu betrachten. Profitiere von weiteren Funktionen, die nur in digitaler Form möglich sind: Nimm deine Bibliothek überallhin mit, lies mit der Kindle App auf all deinen Geräten, passe die Schriftart an, erstelle gemeinsam nutzbare Notizen und Markierungen, und vieles mehr. Entdecke dank der Wikipedia-Integration zusätzliche Details zu den Ereignissen, Personen und Orten in deinem Buch. Entdecke die Kindle eBook-Version dieses Buchs Lade die kostenlose Kindle App herunter: Entdecke dieses Buch als Kindle eBook und genieße ein optimiertes digitales Leseerlebnis. Erfahre mehr über unsere Auswahl an Büchern Optimiert für Kindle, die in vielen Kategorien verfügbar sind. Kindle eBook anzeigen Real-world advice on how to be invisible online from "the FBI's most wanted hacker" (Wired). Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility" -- online and real-world tactics to protect you and your family, using easy step-by-step instructions. Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity. Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. The world's most famous -- and formerly the US government's most wanted -- computer hacker, he has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point was on a three-year run from the FBI. Now Mitnick is reformed and widely regarded as the expert on the subject of computer security. Invisibility isn't just for superheroes; privacy is a power you deserve and need in the age of Big Brother and Big Data. "Who better than Mitnick -- internationally wanted hacker turned Fortune 500 security consultant -- to teach you how to keep your data safe?" --Esquire arsene_lupin Mehr lesen -------------------------------------------------------------------------------- Previous page 1. Seitenzahl der Print-Ausgabe 320 Seiten 2. Sprache Englisch 3. Herausgeber Little, Brown and Company 4. Erscheinungstermin 14. Februar 2017 5. Abmessungen 16.13 x 3.18 x 24.26 cm 6. ISBN-10 0316380504 7. ISBN-13 978-0316380508 8. Alle Details anzeigen Next page KUNDEN, DIE DIESEN ARTIKEL ANGESEHEN HABEN, HABEN AUCH ANGESEHEN Seite 1 von 7 Zum AnfangSeite 1 von 7 Previous page 1. Ghost in the Wires: My Adventures as the World's Most Wanted Hacker Kevin Mitnick 4,6 von 5 Sternen 2.695 Taschenbuch 82 Angebote ab 4,92 $ 2. Social Engineering: The Science of Human Hacking Christopher Hadnagy 4,7 von 5 Sternen 846 Taschenbuch 20,49$20,49$ 10,27 $ Versand 3. Hacking: The Art of Exploitation, 2. Auflage Jon Erickson 4,7 von 5 Sternen 1.294 Taschenbuch Bestseller Nr. 1 in Web-Verschlüsselung 77 Angebote ab 11,60 $ 4. Extreme Privacy: What It Takes to Disappear Michael Bazzell 4,8 von 5 Sternen 198 Taschenbuch 40,73$40,73$ 14,32 $ Versand 5. The Art of Deception: Controlling the Human Element of Security (English Version) Kevin D. Mitnick 4,7 von 5 Sternen 867 Taschenbuch 116 Angebote ab 2,31 $ 6. Permanent Record Edward Snowden 4,7 von 5 Sternen 12.650 Taschenbuch 69 Angebote ab 8,98 $ 7. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Kevin D. Mitnick 4,6 von 5 Sternen 486 Gebundene Ausgabe 29,81$29,81$ Erhalte es bis Montag, 6. März 11,07 $ Versand Nur noch 1 vorrätig – bestellen Sie bald. Next page REZENSIONEN DER REDAKTION REVIEW Praise for The Art of Invisibility "How would it feel to find out that your neighbor and friend has secretly observed you in your own home for years? The place that should be most private to you was not, and the intruder's devices themselves weren't something you'd ever have thought to look for. This kind of behavior is the opposite of giving normal people freedom and security, of valuing and respecting them as humans--and it's happening more and more. The answer to peeping eyes and cyber theft is to move society toward greater cyber-security and it all starts with essential education about being private and invisible in our daily lives. Kevin's book is the must read in this new world."―Steve Wozniak, cofounder, Apple Inc. "The FBI's most-wanted hacker."―Wired "Who better than Mitnick -- internationally wanted hacker turned Fortune 500 security consultant -- to teach you how to keep your data safe from spear phishing, computer worms, and Fancy Bears?"―Esquire "Offers a sobering reminder of how our raw data -- from email, cars, home Wi-Fi networks and so on -- makes us vulnerable."―Amy Webb, New York Times Book Review "Mitnick's new book aims to help everyone -- from the everyday internet users to the hardcore paranoid -- do a better job of keeping personal information private."―Laura Hautala, CNET Praise for The Art of Deception "The most famous computer hacker in the world. A tour de force."―Publishers Weekly "The world's most famous computer hacker and cybercult hero...has written a blueprint for system security based on his own experiences. Required reading for IT professionals, this book is highly recommended for public, academic, and corporate libraries."―Library Journal Praise for Ghost in the Wires "Intriguing, insightful and extremely educational into the mind of one who truly mastered the art of social engineering with the use of a computer and modern day technologies. I strongly believe that one can learn a great deal about protecting themselves once they understand how another one perpetrates the crime."―Frank W. Abagnale, author of Catch Me if You Can ABOUT THE AUTHOR Kevin Mitnick has been the subject of countless profiles published and broadcast throughout the world. Mitnick's leading penetration-testing team is highly respected and sought after for its security services by the world's top corporations and governments. The company he founded, Mitnick Security Consulting LLC, has clients that include dozens from the Fortune 500 and many nations across the globe. Mitnick is the bestselling author of The Art of Invisibility, Ghost in the Wires, The Art of Intrusion, and The Art of Deception. He lives in Las Vegas and travels the world as the top keynote speaker on cybersecurity. -------------------------------------------------------------------------------- PRODUKTINFORMATION * Herausgeber : Little, Brown and Company (14. Februar 2017) * Sprache : Englisch * Gebundene Ausgabe : 320 Seiten * ISBN-10 : 0316380504 * ISBN-13 : 978-0316380508 * Artikelgewicht : 530 g * Abmessungen : 16.13 x 3.18 x 24.26 cm * Amazon Bestseller-Rang: Nr. 279,872 in Bücher (Siehe Top 100 in Bücher) * Nr. 146 in Online-Datenschutz & Sicherheit * Nr. 202 in Hacking * Nr. 473 in Internet & Telekommunikation * Kundenrezensionen: 4,5 von 5 Sternen 1.964 Sternebewertungen Brief content visible, double tap to read full content. Full content visible, double tap to read brief content. VIDEOS Hilf anderen, mehr über dieses Produkt zu erfahren, indem du ein Video hochlädst! Ihr Video hochladen -------------------------------------------------------------------------------- INFORMATIONEN ZUM AUTOR Folge Autoren, um Neuigkeiten zu Veröffentlichungen und verbesserte Empfehlungen zu erhalten. Folgen KEVIN D. MITNICK Brief content visible, double tap to read full content. Full content visible, double tap to read brief content. Hello Mehr lesenWeniger lesen -------------------------------------------------------------------------------- Gesponsert -------------------------------------------------------------------------------- WIE BEWERTEST DU HEUTE DEINE ERFAHRUNG BEIM KAUF VON BÜCHERN AUF AMAZON? Sehr schlecht Schlecht Weder noch Gut Großartig Sehr schlecht Weder noch Großartig VIELEN DANK FÜR IHR FEEDBACK. -------------------------------------------------------------------------------- KUNDENREZENSIONEN 4,5 von 5 Sternen 4,5 von 5 1.964 globale Bewertungen 5 Sterne 72% 4 Sterne 17% 3 Sterne 7% 2 Sterne 2% 1 Stern 2% So funktionieren Kundenrezensionen und -bewertungen Kundenbewertungen, einschließlich Produkt-Sternebewertungen, helfen Kunden, mehr über das Produkt zu erfahren und zu entscheiden, ob es das richtige Produkt für sie ist. Um die Gesamtbewertung der Sterne und die prozentuale Aufschlüsselung nach Sternen zu berechnen, verwenden wir keinen einfachen Durchschnitt. Stattdessen berücksichtigt unser System beispielsweise, wie aktuell eine Bewertung ist und ob der Prüfer den Artikel bei Amazon gekauft hat. Es wurden auch Bewertungen analysiert, um die Vertrauenswürdigkeit zu überprüfen. Erfahre mehr darüber, wie Kundenbewertungen bei Amazon funktionieren. -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- Gesponsert REZENSIONEN FILTERN NACH * Deutsch * Englisch -------------------------------------------------------------------------------- * Spitzenrezensionen Neueste zuerst Spitzenrezensionen SPITZENBEWERTUNGEN AUS USA Alle Rezensionen ins Deutsche übersetzen DERZEIT TRITT EIN PROBLEM BEIM FILTERN DER REZENSIONEN AUF. BITTE VERSUCHE ES SPÄTER ERNEUT. Zachariah B. Brown 5,0 von 5 Sternen This need for vigilance reminds the anonymous participant to not log into any sites or applications with one's real identity and that it is best to turn off one's wireless router before you boot ... Rezension aus den Vereinigten Staaten vom 15. Februar 2018 Verifizierter Kauf We obviously live in an age of increasing digital surveillance, informed by the prevalence of ipads, iphones, laptop computers, and desktop computers. There is even increasing discussion of the 'internet of things' where microwaves, thermostats, and televisions can become nodes on a larger network. And people can have legitimate needs to create an anonymous identity, such as in a legal dispute with a former partner or a disagreement with a corporate chain of command, and this need for a separate identity has to be matched with a willingness to rigorously defend it from potential disclosure. There are resources available to help with this endeavor, such as with VMWare Fusion to create a virtual machine on which Tails is used as the operating system and Tor is used as the browser. There is also the option to use a chromebook for all online banking, in addition to another workstation for routine, day-to-day usage. This need for vigilance reminds the anonymous participant to not log into any sites or applications with one's real identity and that it is best to turn off one's wireless router before booting the anonymous laptop at the residence. The secondary laptop can be purchased with gift cards while exercising extreme caution due to surveillance cameras; there is also the option to hire a randomly chosen person to make the purchase of non-refillable gift cards (such a candidate can also be used to go into a Verizon, AT and T, or T-Mobile store to purchase a personal hotspot for $200, in exchange for $100 cash compensation). There is also the guidance in the book to change the MAC address of your machine each time public wi-fi is accessed so that the system unit is not identifiable. An important point to remember is that when the personal hotspot is turned on, the device registers with the closest cell tower. Furthermore, anonymity is supported by remembering to never turn on one's personal phone or laptop in the same place where turning on the anonymous laptop, burner phone, or anonymous hotspot takes place. As mentioned above, the Tor browser must always be used to create and access all online accounts associated with this anonymous identity. Protonmail.com, Tutanota.com, and fastmail.com are resources available that support anonymity. Funding to support an anonymous identity will have to be run through an anonymity mechanism: such as to convert prepaid giftcards into Bitcoin and then running the Bitcoin through a laundering service. Supporting this endeavor, the Tor browser can be used to set up an initial bitcoin wallet at paxful.com. And tumblers are a specific form of online laundering service where Bitcoin is taken from a variety of sources and then mixed together so that the result retains value and carries traces of many owners, thus diminishing further the possibility of identification. In addition to using the resources specified thus far, this endeavor makes advantageous the use of a VPN, and to make certain to closely review a VPN provider's terms of service and privacy policies. This complete 'invisibility' setup can cost from $200 up to $500; while while this requires a certain investment of capital, the pursuer of comprehensive privacy can them move onward. With this set up in place, an important point to remember is that electronic devices can measure the nanosecond differences in the way each person presses keys on keyboards. This can lead to a 'keystroke profile' and to counter this, KeyBoard Privacy is an available plugin for the Chrome browser. Moving along after acknowledging this keyboard-related issue, the Deep web includes subscription-only sites and corporate intranet sites, whereas the Dark Web is where the Silk Road exists along with the ability to hire an assassin and acquire child pornography. Already mentioned a number of times, Tor (or the Onion router) was created by the US Naval Research Lab, and is vital for the implementation of these privacy steps while traveling. In this context, a number of pointers are important: 1. Clean up any sensitive data before you travel and perform a full backup. 2.Leave the data there [on the computer] but encrypt it with a strong key; do not keep the passphrase with you. 3.Upload the encrypted data to a cloud service, then download and upload as needed. 4.Use a free product such as VeraCrypt to create a hidden encrypted file folder on your hard drive. 5.Whenever entering your password into your devices, cover oneself and one's computer with a jacket. 6.Seal one's laptop and other devices in a FedEx or other Tyvek envelope and sign it. Furthermore, this book also describes that there are Automated Targeting Systems (ATS) that create an automatic dossier about a traveller when commuting internationally. And when deleting data on a computer it is important to remember that deletion changes to the MBR entry for a file (the index used to find parts of the file on the hard drive); the file (or some of its parts) remains on the hard drive until the new data is written over that part; it is very difficult to 'wipe' a solid state drive. Related to this, an important point is that '...if you plug your iphone into another person's computer and 'trust' it, a trusted relationship is created between the computer and the iOS device which allows the computer to access photos, videos, SMS messages, call logs, and WhatsApp messages..' For iTunes backups, it is good to set a password for encrypted files. If an end-user needs to share files, and he or she is using an Apple product, there is the option to use 'Airdrop;' if a phone needs to be charged, the lightning cable plugged into the system or an electrical outlet, not into someone else's computer. When going through any security checkpoint, it is important to make sure one's laptop and electronic devices are the last on the conveyor belt. Along with this, to encrypt an entire drive, there are different options available: Symantec's PGP Whole Disk Encryption, Windows WinMagic, and OSX File Vault 2. An important point to consider, along with drive encryption, is that Tails is an OS that can be booted up on any modern-day computer to avoid leaving any forensically recoverable data on the hard drive, preferably one that can be write-protected. Tails can be downloaded onto a DVD or USB stick, and the BIOS firmware or the EFI initial boot sequence can be set for either DVD or USB so as to boot the Tails distribution. And while the utility provides a useful advantage, there are potential issues with Bitlocker: it uses a pseudorandom number generator called Dual_EC_DRBG which might contain a NSA backdoor, it is privately owned, and the key must be shared with Microsoft unless purchased for $250. While travelling, there is also the need to be aware of the possibility of an Evil Maid Attack, which involves a powered-down laptop whose hard drive is encrypted. Someone enters the room and inserts a USB stick containing a malicious bootloader. The target laptop must then be booted off the USB to install the malicious bootloader that steals the user's passphrase, and the maid can re-enter almost any hotel room the next day and type in a secret key combination that extracts the key combination. Providing additional perspective there are a number of steps that can be taken to use the Internet privately while travelling: 1.purchase prepaid gift cards anonymously. In the EU, you can purchase prepaid credit cards anonymously at viabus<dot>com. 2. Use open wi-fi after changing our MAC address. 3.Find an email provider that allows the traveller to sign up without SMS validation or he/she can sign up for a skype-in number using Tor and a prepaid giftcard. With Skype-in, you can receive voice calls to verify one's identity. Make sure to be out of camera view. Use Tor to mask the physical location when signing up. 4.Using a newly anonymous email address, sign up at a site such as paxful.com, again using Tor, to sign up for a bitcoin wallet, and buy a supply of bitcoin. Pay for them using the prepaid gift cards. 5.Set up a second anonymous email address and new secondary bitcoin wallet after closing and establishing a new Tor circuit to prevent any association with the first email account and wallet. 6.Use a bitcoin laundering service such as bitlaunder.com to make it hard to trace the currency's origin. Have the laundered bitcoin sent to the second bitcoin address. 7.Sign up for a VPN service using the laundered bitcoin that does not log traffic or IP connections. A subscriber can usually find out what is logged by reviewing the VPN provider's privacy policy. 8.Have a cutout [temporary hired hand] obtain a burner portable hotspot device on one's behalf. Give the cutout cash to purchase it. 9.To access the Internet, use the burner hotspot device away from home, work, and other cell services. 10.Once powered on, connect to VPN through the burner hotspot device. 11.Use Tor to browse the internet. Much more common than travelling is the reality of corporate work life. There is tracking software on Corporate Owned, Personally Enabled (COPE) smartphones and service trucks with GPS to surveil employees. Some companies monitor employee's outlook calendar entries, email headers, and I.M. logs, ostensibly used to help companies figure out how their employees are spending their time. Anything passing through a corporate network belongs to the company - it is not the employee's. And when at work an employee must remember to always lock his or her computer screen. If concerned about privacy, one needs to not do anything personal while at work. Keep a strict firewall between one's worklife and home life. Never use company wi-fi, turn off SSID broadcast if using a portable hotspot. There is the need to keep personal business out of the company computer systems, especially when searching for health-related topics or looking for a new job. There is also a technology called KeySweeper, which is a disquised USB charger that wirelessly and passively looks for, decrypts, logs, and reports back (over GSM) all keystrokes from any MS wireless keyboard in the vicinity, thus increasing the possibility of workplace surveillance. Impacted by resources used frequently at the workplace, Google Drive has introduced a new information rights management (IRM) feature; in addition to the documents, spreadsheets, and presentations created within Google docs, Google Drive now accepts PDF and other file formats as well. Useful features include the ability to disable the download, print, and copy capabilities for commenters and viewers. An employee can also prevent anyone from adding additional people to a shared file. Of course these management features are only available to file owners. That means if someone has invited an employee to share a file that person has to set the privacy restriction. Similar to this, SpiderOak is a service provider that offers the full benefits of cloud storage and sync capability along with 100% data privacy; this resource protects sensitive data through 2-factor password authentication and 256-bit AES encryption so that files and passwords stay private. Another concern to keep in mind is that in 2013 Google started what is called hotwording, which is a feature that allows an end-user to give a simple command that activates the listening mode in Chrome. Moving on, Shodan is a publicly available web search engine that exposes nontraditional devices configured to connect to the Internet; this resource not only displays from IOT devices at home but also from internal municipal utilities networks and industrial control systems that have been misconfigured to connect their sensors to the public network. Similar to this expanding network of remote inspection, a skilled technician can reverse engineer the protocol controlling a vehicle by intercepting and analyzing the GSM or CDMA traffic from a car's onboard computer to the automaker's systems. GodView is an administrative tool which is used by Uber to track the location of its thousands of contract drivers as well as their customers. If one rides a bus, train, or ferry to work, he or she is no longer invisible among the masses. Transit systems are experimenting with using mobile apps and near field communications (NFC) to tag riders as they get on and get off public transportation. NFC is a short-distance radio signal that often requires physical contact. Payment systems such as Apple Pay, Android Pay, and Samsung Pay all use NFC to make fumbling for quarters a thing of the past. According to Tesla's privacy policy, the company may collect the VINs, speed information, odometer readings, battery usage information, battery charging history, information about electrical system functions, software version information, infotainment system data, and safety related data [all of which is touched on in the ownership paperwork, and frequently given only cursory inspection, while providing the vendor with plausible deniability with many concerns]. Continuing with the topic of motoring, in one altercation with another motorist, the author describes: 'I grabbed my cell phone, called the DMV, and impersonated law enforcement. I got the DMV to run his plates, then they gave me his name, address, and SSN. Then I called AirTouch Cellular impersonating an AirTouch employee, and had them do a search on his SSN for any cellular accounts.' The author then gave the motorist a phonecall, communicating a terse reprimand. As an example from history, in 1888 that kind of constant exposure was still a shocking and disconcerting novelty. The Hartford Courant sounded an alarm: 'The sedate citizen can't indulge in any hilariousness without incuring the risk of being caught in the act and having his photograph passed around among his sunday-school children. And the young fellow who wishes to spoon with his best girl while sailing down the river must keep himself constantly sheltered.' On a different note with usage of corporate resources, exchangeable image file (EIF) data in a digital image contains, among other things, the date and time when the picture was snapped, the make and model of the camera, and, if you have geolocation activated on the device taking the photo, the longitude and latitude of the place where you took the image. 'Some repressive governments ... have taken photos of protestors at large anti-government rallies and then put the images on the Web. This is not using image recognition software so much as it is crowdsourcing the identification process.' One can also perform what is called a reverse image search in google by clicking on the tiny camera within the google seach window and uploading any photo from your hard drive. In a few minutes the investigator will see any copies of that image findable online. In theory, if it one's own photo, he or she should know all the sites that came up in the results. Consistent with remaining vigilant while on business travel, if a dating site is in use and is being accessed from someone else's computer, or from a public kiosk computer, always remember to log out to make sure that no personally identifiable information is cached, or accessible to other kiosk users. Impacting the usage of mobile devices and according to Apple, its various products will automatically connect to networks in this order of preference: 1.the private network the device most recently joined. 2.another private network. 3.a hotspot network. If one has something sensitive to do away from the house, it is better to use the cell connection on your mobile device; he or she can also tether to a mobile device using USB, bluetooth, or wi-fi (preferably with WPA2 security). IPSec automatically includes PFS (perfect forward security) but not all services actually bother to configure it. VPNs are more expensive than proxies; if one's particular VPN vendor keeps logs, read the privacy policy to make sure that the service does not retain traffic or connection logs - even encrypted - and that it doesn't make the data easy to share. Again a factor while travelling, GoGo and other in-air services throttle UDP packets to prevent skype or other voice-call apps; most VPNs use UDP by default. UDP is preferable for ease and speed of connection, without guaranteeing delivery of the data payload. To remedy this concern, TorGuard and ExpressVPN are connection services that use TCP; one can also install a VPN on a mobile phone. Email providers such as google, yahoo, and MS retain login records for more than a year, and these reveal the particular IP addresses a consumer has logged in from. When one connects to a wireless network, the MAC address on a computer is automatically recorded by the wireless networking equipment. A best practice is to never trust a public PC terminal. Even if one is using a telephone-based dial-up modem or a cable-based ASM (any-source multicast) router (available from Cisco and Belkin, among others), these devices have had their share of software and configuration issues. It is best to always download the latest firmware and to update the router configuration settings. If an end-user does not have the instructions for the router in question, there's an online list of URLs that tells the investigator what to type into the browser window so as to connect directly to the router on a residential network. Helping to understand better the need for VPNs, there is a hacker tool called Aircrack-NG that can reveal the authorized MAC address of a currently connected user and then an attacker can then the MAC address to connect to the wireles router. Also an important consideration with residential wireless security, WPS (Wireless protected setup) is vulnerable to the attack method called Pixie Dust, which is an offline attack that affects only a few chip makers, including Ralink, Realtek, and Broadcom, and it works by helping hackers gain access to the password on wireless routers. Therefore, it is a good idea to turn off WPS. There is also theft-tracking software: when someone using the software reports that his or her school system-issued laptop has been stolen, the school system administration department can log on to a website and see images from the stolen laptop's webcam as well as hear sounds from the microphone. Furthermore, whether from a corporate, educational, or private residential network, it is a good idea to avoid clicking on email attachments unless opening them in Google Quick View or Google Docs. AdBlockPlus is an effective ad-removal plugin that complements smooth email access in all these contexts and helps to minimize the possibility of malware infection. Providing important perspective on when and when not to access certain online resources, 70% of health sites' URLs contain information exposing specific conditions, treatments, and diseases. While it is important to have HTTPS Everywhere enabled in the browser while accessing such material, any person using a browser needs to remember that it encrypts contents of sites but not the URL. In order to know better about how to be anonymous while online, Panopticlick<dot>com is a site built by the Electronic Frontier Foundation that will determine just how common or unique a browser configuration is compared to others. Marketers, criminal hackers, and governments are all trying to get information that a private end-user may not want to give. Addressing this concern, NoScript is a Firefox plugin that effectively blocks just about everything considered harmful to the typical residential computer (the equivalent for Chrome is called ScriptBlock). With such a resource implemented, there should be no flashing ads on the google home page, otherwise the computer/browser may be compromised. For both Firefox and Chrome, Ghostery is a utility that identifies all the web traffic trackers that sites use to follow an individual end-user's activity. Having multiple online personality profiles dilutes the privacy impact of having only one identifiable address, and thus the serious pursuer of anonymity must be firmly aware of hardware, software, and circumstantial challenges. To add further perspective with web browser security, magic cookies provide third parties with information about account and specific preferences; they are proxies for the data that lives on the back end of the website. OAuth is an authentication protocol that allows a site to trust an end-user even if one does not enter a password, and thus is important to be aware of. Facebook Disconnect for Chrome is used to block facebook services on third party sites. 'Given what Facebook knows about its 1.65 billion subscribers, the company has been fairly benevolent - so far. It has a ton of data, but it, like Google, has chosen not to act on all of it.' 'The best way to remove a toolbar is to uninstall it the way you would uninstall any program on your traditional PC. But some of the most persistent and parasitic toolbars may require you to download a removal tool, and often the process of uninstalling can leave behind enough information to allow advertising agents related to the toolbar to reinstall it.' 'A geolocation discrepancy like this often flags an attempt to purchase as possible abuse. [in reference to online transactions made via Tor].' Moving deeper on the issue of website security, Content Delivery Networks (CDNs) cache pages for their clients to deliver them faster, no matter where one is in the world. '...Every website should have a certificate, a third party guarantee that when you connect the website is not fraudulent.' An 'extended verification certificate' is the most stringent level of certificate verification. HTTP://BENWERD<dot>COM/LAB/GEO.PHP is a test site that will tell the end-user whether the browser is reporting the location to other resources on the Internet. CTRL-SHIFT-I can be used to open the developer tools, and thus the informed end-user can work on countering this type of surveillance. Mentioned above, HTTPS Everywhere is the best way to prevent Javascript injections from monitoring one's activity via the browser. Google Dashboard gives any person full control should he or she ever want to remove synced information from your account, in addition to the steps enumerated above. Even if one is not logged into MS, Yahoo, or Google accounts, the IP address is still tied to each search engine request. One way to avoid this one-to-one match is to use the google-proxy Startpage.com or the search engine DuckDuckGo [which is typically used in tandem with the Tor browser]. As an aside, an important piece of meta-data is that open-source and nonprofit organizations provide perhaps the most secure software and services because there are literally thousands of eyes pouring over the code and flagging anything that looks suspicious or vulnerable. Apps such as AIM, Blackberry Messenger, and Skype all store messages without encrypting them. That means the service provider can read the content (if it's stored in the cloud) and use it for advertising. AIM keeps an archive of all messages sent through its service; it also saves the message content, keeping records of the messages in the cloud in case the end-user ever wants to access a chat history from any device different from the one where the last session took place. Off the Record (OTR) messaging is a higher standard of end-to-end encryption protocol used for text messages and can be found in a number of products: ChatSecure, Signal, Cryptocat, and Tor Messenger and thus directly supports a project of anonymous internet usage. To clarify an important point with the usage of mobile devices, the IMSI (International Mobile Subscriber Identity) is a unique number assigned to a phone's SIM card; the first part of that number uniquely identifies the mobile network operator and the remaining part identifies the mobile phone. With mobile devices in general, the 2G network offered two standards: Global System for Mobile Communications (GSM) and Code Division Multiple Access (CDMA). That technology also introduced short message service (SMS), unstructured supplementary service data (USSD), and other simple communication protocols that are still in use. While in a live environment, an important piece of information is that Signalling System Protocol keeps mobile calls connected when driving along a freeway and switching from cell tower to cell tower; this handles the process for call establishment, billing, routing, and information exchange functions. VoIP uses the same coaxial cable that brings streaming video and high-speed internet into your home. '...Whenever you write an email, no matter how inconsequential, and even if you delete it from your inbox, remember that there's an excellent chance that a copy of those words and images will be scanned and will live on.' As countermeasures for this risk, PGP, OpenPGP, and GPG (GNU Privacy Guard) are interoperational methods of email encryption. '...When you receive an unsolicited phone call from your bank asking for your SSN or account info you should always hang up and call the bank yourself.' Public algorithms have been vetted for weakness (as discussed above with opensource software). When one encrypts a message - an email, text, or phone call - it is highly adviseable to use end-to-end encryption. That means the message stays unreadable until it reaches its intended recipients; only sender and receiver have the key to decode; a researcher can do a google search for 'End-to-End Encryption Voice Call. [to circle back to the brief discussion above about VoIP]' On the same note, MailVelope is a PGP plug-in that handles the public and private encryption keys. Metadata is information in the to and from fields, IP address of involved servers, and the subject line. These pieces of information are not typically encrypted. Therefore, third parties will still be able to see the metadata of an encrypted message unless this concern is specifically addressed. Moving on with the topic of telephony, Call Detail Records (CDRs) show the time a call was made, number dialed, length of the call, and number of times a particular number was called; this information can be used in tandem with social engineering (which is a 'hacking technique that uses manipulation, deception, and influence to get a human target to comply with a request'). An app developed at Dartmouth College matches patterns of stress, depression, and loneliness in user data, and thus very intimate details can be divulged in an unsecured discussion. To be truly invisible and counter such a concern, a few things are essential: removal of true IP address, obfuscation of hardware and software, and defense of anonymity. Instead of hosting one's own proxy, he or she can use a service known as an 'anonymous remailer' which will mask your email's IP address for the sender. These services can be identified with a search engine and change the email addresses of the sender before sending the message to its intended recipient. And an anonymous remailer can be used in tandem with Tor, which was designed to be used by people living in harsh regimes as a way to avoid censorship of popular media and services and to prevent anyone from tracking what search terms they use. There are several weaknesses with Tor: no control over the exit nodes, which may be under the control of government or law enforcement, a user can still be profiled and possibly identified, and Tor is very slow [due to the additional, robust security precautions]. A very basic rule is that one has to keep anonymous accounts completely separate from anything that could relate back to a true identity (and the Tor browser certainly helps with this). To communicate in secrecy, one will need to create new email accounts using Tor so that the IP address setting up the account is not associated with a real identity in any way. Moving on, there are email services that don't require verification, and if one does not need to worry about authorities, Skype numbers work well for google account registration and similar stuff; after using Tor to randomize the IP address, and after creating a gmail account that has nothing to do with one's real phone number, google sends the phone number a verification code or a voice call. An end-user needs to be aware of all the ways that someone can identify him or her even if undertaking some (but not all) of the precautions described; an explorer needs to perform due dilligence every time anonymous accountsare used. As emphasized above, end-to-end encryption is very important. Reflecting the impressive breadth of this book, Elcomsoft Phone Password Breaker (EPPB) is discussed as a utility that is intended to enable law enforcement to access iCloud accounts. Similar to this, iBrute is a password-hacking mechanism specifically designed for acquiring iCloud credentials. Choosing a hard-to-guess password will not prevent hacking tools like oclHashcat, which leverages GPUs for high-speed cracking. Similarly, John the Ripper is an open source password guessing program; it is able to permute the password letters using rule sets that are extremely effective. With that said, obfuscation is a powerful factor, as being one of hundreds of millions of participants in the world-wide online community, and also the time-intensive nature of cracking well-put-together passwords. On this very same note, one also have the option to forego the creation of a password and automate the process with a digital password manager; he or she can use a digital locked vault and allow one-click access when needed; password managers use one master password for access; if the master password is lost then all passwords are lost. Very similar to password selection, Strong passphrases of at least twenty characters are the best and it is best to never use the same password/passphrase for two different accounts; PasswordSafe and KeePass are open-source password managers that only store Lese weiter 41 Personen fanden diese Informationen hilfreich Nützlich Missbrauch melden Rezensionen auf Deutsch übersetzen Jonathan Laboy 5,0 von 5 Sternen Great book to understand your internet fingerprint and more. Rezension aus den Vereinigten Staaten vom 6. Februar 2023 Verifizierter Kauf This book helps understand the fingerprints left in every click or connection. The knowledge that provides about invisibility is excellent. I gave it 5 stars because it definitely achieved the purpose of the book although it gives more stories and examples than needed. Recommended for Security Researchers, Hackers (Blue Team, Red Team, Purple Team), Reporters, Lawyers and even Judges. Lese weiter Nützlich Missbrauch melden Rezensionen auf Deutsch übersetzen Shane Dyer 5,0 von 5 Sternen It’s An Art Rezension aus den Vereinigten Staaten vom 1. Januar 2023 Verifizierter Kauf I really never put thought of how much information we give out without even the inking twice about why we are online. This book is a very good book to read especially if you are a parent with kids that are on the internet. We have been online for years now versus our children, it would probably take us adults the rest of our time on earth to try and get what information we can about us, so let’s get our kids in the habit of not just putting their information online Lese weiter Nützlich Missbrauch melden Rezensionen auf Deutsch übersetzen Kevin Jennings 5,0 von 5 Sternen Your potential employer saw your browsing history. You should have read this book before applying! Rezension aus den Vereinigten Staaten vom 7. April 2017 Verifizierter Kauf Where do I begin? I've been a computer geek my entire life. Well, since 1982, anyway. My dad bought me a Commodore 64 computer back then. I can't hardly remember a single day that has passed since then that I haven't had a computer in front of me at some point during the day. Heh, I don't know if that's a good thing or a bad thing! Anyway, as a developer and security enthusiast, I've always been interested in the hacking scene. Back then, when Kevin Mitnick and Kevin Poulson were in the news because of their "activities", I was glued to the t.v. I wanted to know everything they did! See, the thing is, I was like them. I craved knowledge. I wanted to explore that hidden and forbidden world of the byte and the baud that consisted of inter-connected mainframes and central stations via phone lines. I dialed into a lot of "boards" (BBSes) and got "forbidden knowledge" of what they used to call "phreaking" (phone hacking) from text files uploaded by phreakers. I thought it was just fun and games and never really did anything with the so-called "power" that I had gleaned from those text files. Fast forward to today, things are a lot worse, security-wise, with regards to computer security and threats to your private information. Especially since our daily lives are now entertwined with this ubiquitous thing called the internet. Every interaction we perform in our browsers, or internet-enabled applications, leaves information and trails that can be used against us. Our phones, even our automobiles, can be used to track us via GPS. Our credit card purchases can be used to build profiles of us that can be bought and sold to third party customers. Recently, the current U.S. Republican administration repealed a bill that would've prevented ISPs from selling your browsing information to private parties. Nothing you do online is private anymore. Nothing. This isn't like information that Facebook and Google collect on you. The ISP information is every single page that you go to in your browser. Think about this, for a moment: You have a medical condition. It's being treated and no one but your closest family knows about it. Like almost everyone with your condition, you browse online about it and have joined online support groups. Your child also suffers from a condition. They are autistic. Like almost any concerned parent, you look online to learn more about you child's condition and, too, to share your experiences and learn from others in similar situations. Recently, you've applied for a new job through a recruiter. They assure you that you're a perfect fit based on your resume and your phone screening interview with them. They want to pass your resume on to the company now, which you give your consent to do so. Now, the company that will be doing the hiring does something that, in the past, they couldn't have done: They buy your browsing history from your local ISP. They don't need your consent for this. Your browsing data is considered the ISPs property now and can be sold as a commodity that is tied directly to you. Your prospective employer can now see that, based on your browsing history, that you have a medical condition and a child with autism. Which, more than likely, means you will probably miss a lot of work. So, they do what any good business will do: They pass on your resume. You don't even get a chance to interview with them. Your resume gets deep-sixed based soley off your browsing history and nothing else. Now, with that nightmare scenario fresh in your head, I want you to understand that when I say this book can help you to avoid such a situation, I really mean it. From encrypting your email, to setting up a VPN, to using the anonymous Tor Onion browser and other security methods, this book can help someone that doesn't know anything about internet security by showing them how to secure their private information, their browsing habits, their email, and all online activity. Seriously, in this day and age, it's almost a sin not to be aware of at least the basic dangers out there in "cyberspace". With this book, you can be very sure that if you follow the steps provided, you'll be very secure from most of those threats. Lese weiter 179 Personen fanden diese Informationen hilfreich Nützlich Missbrauch melden Rezensionen auf Deutsch übersetzen T 5,0 von 5 Sternen Kevin Mitnick. Rezension aus den Vereinigten Staaten vom 22. November 2022 Verifizierter Kauf It's Kevin. Enough said. Lese weiter Eine Person fand diese Informationen hilfreich Nützlich Missbrauch melden Rezensionen auf Deutsch übersetzen amateur biker 4,0 von 5 Sternen Like any book it's a bit dated Rezension aus den Vereinigten Staaten vom 9. März 2022 Verifizierter Kauf Published in 2017 tech has changed a bit. Several of the links and recommendations are stale. I'm still reading. One that they list is ccleaner... which is now known to have security issues. If one has a bit of tech knowledge this is an OK book. Just remember to do a little research before running any link/software/extension. It would be BEST to read the entire book taking notes before delving into some of the suggestions. Lese weiter 19 Personen fanden diese Informationen hilfreich Nützlich Missbrauch melden Rezensionen auf Deutsch übersetzen -------------------------------------------------------------------------------- Alle Rezensionen anzeigen SPITZENREZENSIONEN AUS ANDEREN LÄNDERN Alle Rezensionen ins Deutsche übersetzen Irina 5,0 von 5 Sternen Great read, lots of useful knowledge Rezension aus dem Vereinigten Königreich vom 2. Februar 2020 Verifizierter Kauf It's a great book by a great author! Really enjoy reading it. If you want to become paranoid or want to do some ~innocent things~ without being caught - definitely recommend it! I'm trying to learn about offsec to eventually do the course and the exam, and this book gives me a good sense of what sort of things I should be looking for as a wanna-be security specialist. Lese weiter 2 Personen fanden diese Informationen hilfreich Missbrauch melden Rezensionen auf Deutsch übersetzen .rhosts 5,0 von 5 Sternen Protect your privacy! Rezension aus dem Vereinigten Königreich vom 22. Mai 2017 Verifizierter Kauf Tips and tricks to minimise your online footprint from the master hacker himself, Kevin Mitnick. The book is full of information detailing exactly *what* data can be collected about you, together with *how* you can minimise the amount collected - perhaps even disappear completely! This book is excellent, as Kevin's books usually are. Lese weiter 8 Personen fanden diese Informationen hilfreich Missbrauch melden Rezensionen auf Deutsch übersetzen Coldnight 4,0 von 5 Sternen Well, I thought that I knew it all. Rezension aus dem Vereinigten Königreich vom 27. Februar 2022 Verifizierter Kauf If you want to protect yourself from being spied on every second of your life then do read this book; I thought that I knew all that was to be known but clearly I didn't, smile. However, is it possible these days to be totally anonymous - I think not. Lese weiter Eine Person fand diese Informationen hilfreich Missbrauch melden Rezensionen auf Deutsch übersetzen Monty 4,0 von 5 Sternen The Art of Invisibility ~ Stay safe online Rezension aus dem Vereinigten Königreich vom 21. Januar 2022 Verifizierter Kauf It's good, worth a read especially if you don't know much about internet security. Lese weiter Missbrauch melden Rezensionen auf Deutsch übersetzen C.Gallagher 5,0 von 5 Sternen Another great title from Kevin Rezension aus dem Vereinigten Königreich vom 16. Mai 2017 Verifizierter Kauf Another great book from Kevin. Some excellent opsec tips are given, depending on your experience you may find a totally new concept that you never had known about, or a good guide to brush up on your current opsec. Lese weiter 3 Personen fanden diese Informationen hilfreich Missbrauch melden Rezensionen auf Deutsch übersetzen -------------------------------------------------------------------------------- Alle Rezensionen anzeigen Deine zuletzt angesehenen Artikel und besonderen Empfehlungen › Browserverlauf anzeigen oder bearbeiten Nachdem du Produktseiten oder Suchergebnisse angesehen hast, findest du hier eine einfache Möglichkeit, diese Seiten wiederzufinden. Deine zuletzt angesehenen Artikel und besonderen Empfehlungen › Browserverlauf anzeigen oder bearbeiten Nachdem du Produktseiten oder Suchergebnisse angesehen hast, findest du hier eine einfache Möglichkeit, diese Seiten wiederzufinden. Zurück zum Seitenanfang Über Amazon * Karriere bei Amazon * Blog * Über Amazon * Investor Relations * Amazon Geräte * Amazon Science Geld verdienen mit Amazon * Auf Amazon verkaufen * Verkaufen bei Amazon Business * Deine Apps auf Amazon verkaufen * Partnerprogramm * Bewerbe deine Produkte * Dein Buch mit uns veröffentlichen * Hosten eines Amazon Hubs * ›Mehr anzeigen Amazon-Zahlungsarten * "Einkaufen mit Punkten" * Mein Guthaben aufladen * Amazon Währungsumrechner Wir helfen dir * Amazon und COVID-19 * Mein Konto * Meine Bestellungen * Versandgebühren und -richtlinien * Rückgabe & Ersatz * Meine Inhalte und Geräte verwalten * Amazon Assistant * Hilfe Deutsch $USD - U.S. Dollar Vereinigte Staaten von Amerika Amazon Music Streame Millionen von Songs Amazon Advertising Kunden finden, gewinnen und binden Amazon Drive Cloud-Speicherplatz von Amazon 6pm Schnäppchen erhaschen von Fashion-Marken AbeBooks Bücher, Kunst & Sammelobjekte ACX Hörbuch-Veröffentlichung leicht gemacht Verkaufen bei Amazon Starten eines Verkäuferkontos Amazon Business Alles für Ihr Unternehmen AmazonGlobal Bestellungen international versenden Home-Services Ausgewählte Experten Zufriedenheitsgarantie Amazon Ignite Verkaufe dein Original Digital Educational Ressourcen Amazon Web Services Cloud Computing Dienste von Amazon Audible Hörbücher herunterladen Book Depository Bücher mit kostenfreier Lieferung weltweit Box Office Mojo Film suchen Box Office Daten ComiXology Tausende von Digitale Comics DPReview Digital Fotografie Stoff Nähen, Patchwork & Stricken Goodreads Buchrezensionen & -empfehlungen IMDb Filme, TV & Stars IMDbPro Info Entertainment Geschäftliches Kindle Direct Publishing Dein E-Book veröffentlichen Prime Video Direct Videovertrieb leicht gemacht Shopbop Designer Modemarken Woot! Angebote und Spaß Zappos Schuhe & Bekleidung Ring Smart-Home-Sicherheitssysteme Eero WiFi 4K-Videostreaming in jedem Raum Blink Intelligente Sicherheit für jedes Zuhause Neighbors App Kriminalitäts- und sicherheitsbezogene Warnungen in Echtzeit Abonnieren mit Amazon Entdecken & testen Abonnementservices PillPack Pharmazie vereinfacht * Unsere AGB * Datenschutzerklärung * Deine Auswahl zum Datenschutz bei Anzeigen © 1996-2023, Amazon.com, Inc. oder Tochtergesellschaften