www.amazon.com Open in urlscan Pro
2600:9000:2490:1400:7:49a5:5fd2:8621  Public Scan

Submitted URL: https://a.co/d/b0vbriV
Effective URL: https://www.amazon.com/dp/0316380504?ref_=cm_sw_r_mwn_dp_PTQFDY9BCQPV9QZZ3SPK
Submission: On February 19 via manual from US — Scanned from DE

Form analysis 5 forms found in the DOM

Name: site-searchGET /s/ref=nb_sb_noss

<form id="nav-search-bar-form" accept-charset="utf-8" action="/s/ref=nb_sb_noss" class="nav-searchbar nav-progressive-attribute" method="GET" name="site-search" role="search">
  <div id="nav-search-bar-internationalization-key" class="nav-progressive-content">
    <input type="hidden" name="__mk_de_DE" value="ÅMÅŽÕÑ">
  </div>
  <div class="nav-left">
    <div id="nav-search-dropdown-card">
      <div class="nav-search-scope nav-sprite">
        <div class="nav-search-facade" data-value="search-alias=aps">
          <span id="nav-search-label-id" class="nav-search-label nav-progressive-content" style="width: auto;">Bücher</span>
          <i class="nav-icon"></i>
        </div>
        <label id="searchDropdownDescription" for="searchDropdownBox" class="nav-progressive-attribute" style="display:none">Wähle die Kategorie aus, in der du suchen möchtest.</label>
        <select aria-describedby="searchDropdownDescription" class="nav-search-dropdown searchSelect nav-progressive-attrubute nav-progressive-search-dropdown" data-nav-digest="1SD8NwQshDByAo2UzADo2J0Dtdw=" data-nav-selected="3"
          id="searchDropdownBox" name="url" style="display: block; top: 2.5px;" tabindex="0" title="Suchen in">
          <option value="search-alias=aps">Alle Kategorien</option>
          <option value="search-alias=automotive-intl-ship">Automobil</option>
          <option value="search-alias=baby-products-intl-ship">Baby</option>
          <option selected="selected" current="parent" value="search-alias=stripbooks-intl-ship">Bücher</option>
          <option value="search-alias=computers-intl-ship">Computer</option>
          <option value="search-alias=fashion-womens-intl-ship">Damenmode</option>
          <option value="search-alias=electronics-intl-ship">Elektronik</option>
          <option value="search-alias=movies-tv-intl-ship">Filme und Fernsehen</option>
          <option value="search-alias=luggage-intl-ship">Gepäck</option>
          <option value="search-alias=hpc-intl-ship">Gesundheit &amp; Haushalt</option>
          <option value="search-alias=pets-intl-ship">Haustierbedarf</option>
          <option value="search-alias=kitchen-intl-ship">Heim und Küche</option>
          <option value="search-alias=fashion-mens-intl-ship">Herrenmode</option>
          <option value="search-alias=industrial-intl-ship">Industriell und Wissenschaftlich</option>
          <option value="search-alias=digital-text">Kindle-Shop</option>
          <option value="search-alias=arts-crafts-intl-ship">Kunst und Handwerk</option>
          <option value="search-alias=fashion-boys-intl-ship">Mode für Jungen</option>
          <option value="search-alias=fashion-girls-intl-ship">Mode für Mädchen</option>
          <option value="search-alias=music-intl-ship">Musik, CDs &amp; Vinyl</option>
          <option value="search-alias=digital-music">Musik-Downloads</option>
          <option value="search-alias=instant-video">Prime Video</option>
          <option value="search-alias=deals-intl-ship">Sales &amp; Angebote</option>
          <option value="search-alias=beauty-intl-ship">Schönheit &amp; Körperpflege</option>
          <option value="search-alias=software-intl-ship">Software</option>
          <option value="search-alias=toys-and-games-intl-ship">Spielzeug und Spiele</option>
          <option value="search-alias=sporting-intl-ship">Sport und Freizeit</option>
          <option value="search-alias=videogames-intl-ship">Videospiele</option>
          <option value="search-alias=tools-intl-ship">Werkzeug &amp; Heimwerken</option>
        </select>
      </div>
    </div>
  </div>
  <div class="nav-fill">
    <div class="nav-search-field ">
      <label for="twotabsearchtextbox" style="display: none;">Suche Amazon</label>
      <input type="text" id="twotabsearchtextbox" value="" name="field-keywords" autocomplete="off" placeholder="Suche Amazon" class="nav-input nav-progressive-attribute" dir="auto" tabindex="0" aria-label="Suche Amazon" spellcheck="false">
    </div>
    <div id="nav-iss-attach"></div>
  </div>
  <div class="nav-right">
    <div class="nav-search-submit nav-sprite">
      <span id="nav-search-submit-text" class="nav-search-submit-text nav-sprite nav-progressive-attribute" aria-label="Los">
        <input id="nav-search-submit-button" type="submit" class="nav-input nav-progressive-attribute" value="Los" tabindex="0">
      </span>
    </div>
  </div>
</form>

POST /gp/product/handle-buy-box/ref=dp_start-bbf_1_glance

<form method="post" id="addToCart" action="/gp/product/handle-buy-box/ref=dp_start-bbf_1_glance" class="a-content" autocomplete="off">
  <input type="hidden" name="CSRF" value="g1NfnhK0fy69GSti0ML8t0Y0M4ViBYbOTIhOo+eP2gfNAAAADAAAAABj8YhFcmF3AAAAABVX8CwXqz4nuL9RKX///w=="> <input type="hidden" id="anti-csrftoken-a2z" name="anti-csrftoken-a2z"
    value="g9eUEz45qbuXtqnFrnvh9jdQPiaYepktdHAHFtPWPuweAAAADAAAAABj8YhEcmF3AAAAABVX8CwXqz4nuL9RKf///w==">
  <input type="hidden" id="offerListingID" name="offerListingID" value="">
  <input type="hidden" id="session-id" name="session-id" value="140-9266407-4237822">
  <input type="hidden" id="ASIN" name="ASIN" value="0316380504">
  <input type="hidden" id="isMerchantExclusive" name="isMerchantExclusive" value="0">
  <input type="hidden" id="merchantID" name="merchantID" value="">
  <input type="hidden" id="isAddon" name="isAddon" value="0">
  <input type="hidden" id="nodeID" name="nodeID" value="">
  <input type="hidden" id="sellingCustomerID" name="sellingCustomerID" value="">
  <input type="hidden" id="qid" name="qid" value="">
  <input type="hidden" id="sr" name="sr" value="">
  <input type="hidden" id="storeID" name="storeID" value="">
  <input type="hidden" id="tagActionCode" name="tagActionCode" value="">
  <input type="hidden" id="viewID" name="viewID" value="glance">
  <input type="hidden" id="rebateId" name="rebateId" value="">
  <input type="hidden" id="ctaDeviceType" name="ctaDeviceType" value="desktop">
  <input type="hidden" id="ctaPageType" name="ctaPageType" value="detail">
  <input type="hidden" id="usePrimeHandler" name="usePrimeHandler" value="0">
  <input type="hidden" id="rsid" name="rsid" value="140-9266407-4237822">
  <input type="hidden" id="sourceCustomerOrgListID" name="sourceCustomerOrgListID" value="">
  <input type="hidden" id="sourceCustomerOrgListItemID" name="sourceCustomerOrgListItemID" value="">
  <input type="hidden" name="wlPopCommand" value="">
  <div id="usedOnlyBuybox" class="a-section a-spacing-medium">
    <div class="a-row a-spacing-medium">
      <div class="a-box">
        <div class="a-box-inner">
          <div class="a-section a-spacing-none a-padding-none">
            <div id="usedBuySection" class="rbbHeader dp-accordion-row">
              <div class="a-row a-grid-vertical-align a-grid-center" style="height:41px;">
                <div class="a-column a-span12 a-text-left"> <span class="a-text-bold">Gebraucht kaufen</span> <span class="a-size-base a-color-price offer-price a-text-normal">35,75&nbsp;$</span> </div>
              </div>
              <div class="a-row"> <span class="a-size-base a-color-price offer-price a-text-normal"></span> </div>
            </div>
            <div id="usedbuyBox" class="rbbContent dp-accordion-inner" spacingtop="small">
              <input type="hidden" id="usedMerchantID" name="usedMerchantID" value="AAHKUF7HYJZYO">
              <input type="hidden" id="usedOfferListingID" name="usedOfferListingID"
                value="CCxPhMxcQ9OLGnUY2e7zrrwnFnyl6V%2BDc%2FXjIJzBQjbv4Z26gi0Uy1FcbsCWMaxHMpmSxm2Xc%2BL9VKS0gJaYnFMSmmrLO0inEZPhRkGiQvVPSNo%2BYUGVt8xfTiTQyTX%2B3h%2BfyMA3Ps1XR6OhRWu%2FhDDmX8LR9La0ZHlHggVvYSL3fzBzMOs%2Blw%3D%3D">
              <input type="hidden" id="usedSellingCustomerID" name="usedSellingCustomerID" value="">
              <input type="hidden" name="items[0.base][asin]" value="0316380504">
              <input type="hidden" name="clientName" value="OffersX_OfferDisplay_DetailPage">
              <input type="hidden" name="items[0.base][offerListingId]"
                value="CCxPhMxcQ9OLGnUY2e7zrrwnFnyl6V%2BDc%2FXjIJzBQjbv4Z26gi0Uy1FcbsCWMaxHMpmSxm2Xc%2BL9VKS0gJaYnFMSmmrLO0inEZPhRkGiQvVPSNo%2BYUGVt8xfTiTQyTX%2B3h%2BfyMA3Ps1XR6OhRWu%2FhDDmX8LR9La0ZHlHggVvYSL3fzBzMOs%2Blw%3D%3D">
              <div id="usedDeliveryBlockContainer" class="a-row">
                <div id="deliveryBlock_feature_div" class="a-section a-spacing-none">
                  <div id="deliveryBlockMessage" class="a-section">
                    <div id="mir-layout-DELIVERY_BLOCK">
                      <div class="a-spacing-base" id="mir-layout-DELIVERY_BLOCK-slot-PRIMARY_DELIVERY_MESSAGE_LARGE"><span data-csa-c-type="element" data-csa-c-content-id="DEXUnifiedCXPDM" data-csa-c-delivery-price="" data-csa-c-value-proposition=""
                          data-csa-c-delivery-type="Lieferung" data-csa-c-delivery-time="16. - 23. März" data-csa-c-delivery-destination="" data-csa-c-delivery-condition="" data-csa-c-pickup-location="" data-csa-c-distance=""
                          data-csa-c-delivery-cutoff="" data-csa-c-mir-view="CONSOLIDATED_CX" data-csa-c-mir-type="DELIVERY" data-csa-c-mir-sub-type="" data-csa-c-mir-variant="DEFAULT" data-csa-c-delivery-benefit-program-id="paid_shipping"
                          data-csa-c-id="u3mb4-p727ua-c28nx6-8vvfdv"> Lieferung <span class="a-text-bold">16. - 23. März</span> </span></div>
                      <div class="a-spacing-base" id="mir-layout-DELIVERY_BLOCK-slot-SECONDARY_DELIVERY_MESSAGE_LARGE"><span data-csa-c-type="element" data-csa-c-content-id="DEXUnifiedCXSDM" data-csa-c-delivery-price="schnellste"
                          data-csa-c-value-proposition="" data-csa-c-delivery-type="Lieferung" data-csa-c-delivery-time="13. - 15. März" data-csa-c-delivery-destination="" data-csa-c-delivery-condition="" data-csa-c-pickup-location=""
                          data-csa-c-distance="" data-csa-c-delivery-cutoff="" data-csa-c-mir-view="CONSOLIDATED_CX" data-csa-c-mir-type="DELIVERY" data-csa-c-mir-sub-type="" data-csa-c-mir-variant="DEFAULT" data-csa-c-delivery-benefit-program-id=""
                          data-csa-c-id="zcomax-q5pa0t-xafej7-nnuxon"> Oder schnellste Lieferung <span class="a-text-bold">13. - 15. März</span> </span></div>
                    </div>
                  </div>
                </div>
                <div id="cipInsideDeliveryBlock_feature_div" class="a-section a-spacing-none">
                  <hza:getweblabtreatment var="auiOptimizationWeblab" treatment="OFFERSX_OD_JSP_AUI_OPTIMIZATION_564780" trigger="false">
                    <span class="a-declarative" data-action="dpContextualIngressPt" data-csa-c-type="widget" data-csa-c-func-deps="aui-da-dpContextualIngressPt" data-dpcontextualingresspt="{}" data-csa-c-id="4qtyzt-wfhahs-3533fm-82xww5"> <a class="a-link-normal" href="#">    <div class="a-row a-spacing-small"> <div class="a-column a-span12 a-text-left"> <div id="contextualIngressPt">
                                <div id="contextualIngressPtPin"></div>
                                <span id="contextualIngressPtLabel" class="cip-a-size-small">
                                    <div id="contextualIngressPtLabel_deliveryShortLine"><span>Liefern nach&nbsp;</span><span>Deutschland</span></div>
                                </span>
                            </div>
                        </div> </div>   </a> </span>
                  </hza:getweblabtreatment>
                </div>
              </div>
              <div class="a-section a-spacing-base">
                <div class="a-row"> <strong> Gebraucht: Gut </strong>
                  <span class="a-size-base"> <span class="a-color-tertiary"> | </span><a id="usedItemConditionInfoLink" class="a-link-normal a-declarative" href="#">Details</a> </span>
                </div>
                <div class="a-row"> Verkauft von <a id="sellerProfileTriggerId" data-is-ubb="true" class="a-link-normal" href="/-/de/gp/help/seller/at-a-glance.html?ie=UTF8&amp;seller=AAHKUF7HYJZYO&amp;isAmazonFulfilled=1">In D-Mand</a> </div>
                <div class="a-row"> <a id="SSOFpopoverLink_ubb" class="a-link-normal a-declarative" href="/-/de/gp/help/customer/display.html?ie=UTF8&amp;ref=dp_ubb_fulfillment&amp;nodeId=106096011">Versand durch Amazon</a> </div>
              </div>
              <div class="a-popover-preload" id="a-popover-usedItemConditionDetailsPopover">
                <div class="a-section a-spacing-micro"> <span class="a-size-mini"> <strong>Zustand:</strong> Gebraucht: Gut </span> </div>
                <div class="a-section a-spacing-micro"> <span class="a-size-mini"> <strong>Kommentar:</strong> No highlighting/underlining. Minor wear. </span> </div>
              </div>
              <div class="a-popover-preload" id="a-popover-SSOFpopoverLink_ubb-content">
                <p>Beim Versand durch Amazon nutzen Verkaufspartner die Logistik der Amazon-Versandzentren: Amazon verpackt und verschickt die Artikel und übernimmt den Kundenservice. <b>Deine Vorteile:</b> <em>(1) Lieferung ab 29 EUR Bestellwert
                    (Bücher, Bekleidung und Schuhe generell versandkostenfrei, auch zusammen mit Media-Produkten). (2) Kombinieren und sparen - bestelle bei Amazon.de oder Verkaufspartnern, die den Versand durch Amazon nutzen, wird deine Bestellung
                    zu einer Lieferung zusammengefasst. (3) Alle Artikel sind mit Amazon Prime für noch schnellere Lieferung bestellbar.</em></p>
                <p>Wenn Sie Verkäufer sind, kann Versand durch Amazon Ihnen dabei helfen, Ihre Umsätze zu steigern. <a href="https://services.amazon.de/programme/versand-durch-amazon/merkmale-und-vorteile.html">Weitere Informationen zum Programm</a>
                </p>
              </div>
              <script type="text/javascript">
                P.when("A", "jQuery", "a-popover", "ready").execute(function(A, $, popover) {
                  "use strict";
                  var title = "Was bedeutet Versand durch Amazon?";
                  var triggerId = "#SSOFpopoverLink_ubb";
                  var contentId = "SSOFpopoverLink_ubb-content";
                  var options = {
                    "header": title,
                    "name": contentId,
                    "activate": "onclick",
                    "width": 430,
                    "position": "triggerBottom"
                  };
                  var $trigger = $(triggerId);
                  var instance = popover.create($trigger, options);
                });
              </script>
              <div class="a-section a-spacing-small">
                <div class="a-section a-spacing-none a-text-left">
                  <div class="a-row"> <span class="a-size-mini a-color-tertiary"> Zugriffscodes und Beilagen sind bei gebrauchten Artikeln nicht garantiert. </span> </div>
                </div>
              </div>
              <script type="a-state" data-a-state="{&quot;key&quot;:&quot;atc-page-state&quot;}">{"shouldUseNatcUsed":true}</script>
              <div class="a-button-stack"> <span class="a-declarative" data-action="dp-pre-atc-declarative" data-csa-c-type="widget" data-csa-c-func-deps="aui-da-dp-pre-atc-declarative" data-dp-pre-atc-declarative="{}" id="atc-declarative"
                  data-csa-c-id="4q32mo-6jcog8-ohl9oi-t3bqkv"> <span id="submit.add-to-cart-ubb" class="a-button a-spacing-small a-button-primary a-button-icon natc-enabled"><span class="a-button-inner"><i class="a-icon a-icon-cart"></i><input
                        id="add-to-cart-button-ubb" name="submit.add-to-cart-ubb" title="In den Einkaufswagen" data-hover="<b> auswählen__dims__</b> auf der linken Seite<br> zum Hinzufügen zum Einkaufswagen" data-ref="" class="a-button-input"
                        type="submit" value="In den Einkaufswagen" aria-labelledby="submit.add-to-cart-ubb-announce" formaction="/cart/add-to-cart/ref=dp_start-ubbf_1_glance"><span id="submit.add-to-cart-ubb-announce" class="a-button-text"
                        aria-hidden="true">In den Einkaufswagen</span></span></span> </span> </div>
              <div class="a-section a-spacing-none a-text-center">
                <div class="a-row">
                  <div class="a-button-stack"> </div>
                </div>
              </div>
            </div>
          </div>
        </div>
      </div>
    </div>
    <div class="a-box a-spacing-top-base">
      <div class="a-box-inner">
        <script>
          function atwlEarlyClick(e) {
            e.preventDefault();
            if (window.atwlLoaded) {
              return; //if JS is loaded then we can ignore the early click case
            }
            var ADD_TO_LIST_FROM_DETAIL_PAGE_VENDOR_ID = "website.wishlist.detail.add.earlyclick";
            var paramMap = {
              "asin": "0316380504",
              "vendorId": ADD_TO_LIST_FROM_DETAIL_PAGE_VENDOR_ID,
              "isAjax": "false"
            }
            var url = "/hz/wishlist/additemtolist?ie=UTF8";
            for (var param in paramMap) {
              url += "&" + param + "=" + paramMap[param];
            }
            var xhr = new XMLHttpRequest();
            xhr.open("POST", url, false);
            xhr.setRequestHeader("anti-csrftoken-a2z", "gxAtVpCKffZYVqtyIJ/3kg79gm+TxE8v8/eIA2W6sMVgAAAAAQAAAABj8YhEcmF3AAAAAHuL9oHQYR32uqP6iUf9gA==");
            xhr.onload = function() {
              window.location = xhr.responseURL; //Needed to force a redirect; not supported on IE!
            }
            xhr.send();
          }
        </script>
        <div id="wishlistButtonStack" class="a-button-stack">
          <script>
            'use strict';
            P.when('A').execute(function(A) {
              A.declarative('atwlDropdownClickDeclarative', 'click', function(e) {
                window.wlArrowEv = e;
                e.$event.preventDefault();
                (function() {
                  if (window.P && window.atwlLoaded) {
                    window.P.when('A').execute(function(A) {
                      A.trigger('wl-drop-down', window.wlArrowEv);
                    })
                    return;
                  }
                  window.atwlEc = true;
                  var b = document.getElementById('add-to-wishlist-button-group');
                  var s = document.getElementById('atwl-dd-spinner-holder');
                  if (!(s && b)) {
                    return;
                  }
                  s.classList.remove('a-hidden');
                  s.style.position = 'absolute';
                  s.style.width = b.clientWidth + 'px';
                  s.style.zIndex = 1;
                  return;
                })();
                return false;
              });
            });
          </script>
          <div id="add-to-wishlist-button-group" data-csa-c-func-deps="aui-da-a-button-group" data-csa-c-type="widget" data-csa-interaction-events="click" data-hover="<!-- If PartialItemStateWeblab is true then, showing different Add-to-wish-list tool-tip message which is consistent with Add-to-Cart tool tip message.  -->
       Auf die Liste? Bitte wähle aus dem Sortiment links." class="a-button-group a-declarative a-spacing-none" data-action="a-button-group" role="radiogroup" data-csa-c-id="oerx9u-zengcg-eur7b9-tc25rs"> <span id="wishListMainButton"
              class="a-button a-button-groupfirst a-spacing-none a-button-base a-declarative" role="radio" data-action="add-wishlist-declarative" aria-posinset="1" aria-setsize="1"><span class="a-button-inner"><a href="https://www.amazon.com/-/de/ap/signin?openid.return_to=https%3A%2F%2Fwww.amazon.com%2Fgp%2Faw%2Fd%2F0316380504&amp;openid.identity=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&amp;openid.assoc_handle=usflex&amp;openid.mode=checkid_setup&amp;openid.claimed_id=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&amp;openid.ns=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0&amp;" name="submit.add-to-registry.wishlist.unrecognized" title="Auf die Liste" data-hover="<!-- If PartialItemStateWeblab is true then, showing different Add-to-wish-list tool-tip message which is consistent with Add-to-Cart tool tip message.  -->
       Auf die Liste? Bitte wähle aus dem Sortiment links." class="a-button-text a-text-left"> Auf die Liste </a></span></span> </div>
          <div id="atwl-inline-spinner" class="a-section a-hidden">
            <div class="a-spinner-wrapper"><span class="a-spinner a-spinner-medium"></span></div>
          </div>
          <div id="atwl-inline" class="a-section a-spacing-none a-hidden">
            <div class="a-row a-text-ellipsis">
              <div id="atwl-inline-sucess-msg" class="a-box a-alert-inline a-alert-inline-success" aria-live="polite" aria-atomic="true">
                <div class="a-box-inner a-alert-container"><i class="a-icon a-icon-alert"></i>
                  <div class="a-alert-content"> <span class="a-size-base" role="alert"> Hinzugefügt zu </span> </div>
                </div>
              </div> <a id="atwl-inline-link" class="a-link-normal" href="/-/de/gp/registry/wishlist/"> <span id="atwl-inline-link-text" class="a-size-base" role="alert"> </span> </a>
            </div>
          </div>
          <div id="atwl-inline-error" class="a-section a-hidden">
            <div class="a-box a-alert-inline a-alert-inline-error" role="alert">
              <div class="a-box-inner a-alert-container"><i class="a-icon a-icon-alert"></i>
                <div class="a-alert-content"> <span id="atwl-inline-error-msg" class="a-size-base" role="alert"> Hinzufügen war nicht erfolgreich. Bitte versuche es erneut. </span> </div>
              </div>
            </div>
          </div>
          <div id="atwl-dd-spinner-holder" class="a-section a-hidden">
            <div class="a-row a-dropdown">
              <div class="a-section a-popover-wrapper">
                <div class="a-section a-text-center a-popover-inner">
                  <div class="a-box a-popover-loading">
                    <div class="a-box-inner"> </div>
                  </div>
                </div>
              </div>
            </div>
          </div>
          <div id="atwl-dd-error-holder" class="a-section a-hidden">
            <div class="a-section a-dropdown">
              <div class="a-section a-popover-wrapper">
                <div class="a-section a-spacing-base a-padding-base a-text-left a-popover-inner">
                  <h3 class="a-color-error"> Es ist ein Fehler aufgetreten. </h3> <span> Es gab einen Fehler beim Abrufen deines Wunschzettels. Versuche es noch einmal. </span>
                </div>
              </div>
            </div>
          </div>
          <div id="atwl-dd-unavail-holder" class="a-section a-hidden">
            <div class="a-section a-dropdown">
              <div class="a-section a-popover-wrapper">
                <div class="a-section a-spacing-base a-padding-base a-text-left a-popover-inner">
                  <h3 class="a-color-error"> Es ist ein Fehler aufgetreten. </h3> <span> Liste nicht verfügbar. </span>
                </div>
              </div>
            </div>
          </div>
          <script type="a-state" data-a-state="{&quot;key&quot;:&quot;atwl&quot;}">
            {"showInlineLink":false,"hzPopover":true,"wishlistButtonId":"add-to-wishlist-button","dropDownHtml":"","inlineJsFix":true,"wishlistButtonSubmitId":"add-to-wishlist-button-submit","maxAjaxFailureCount":"3","asin":"0316380504"}</script>
        </div>
        <script type="a-state" data-a-state="{&quot;key&quot;:&quot;popoverState&quot;}">{"formId":"addToCart","showWishListDropDown":false,"wishlistPopoverWidth":232,"isAddToWishListDropDownAuiEnabled":true,"showPopover":false}</script>
        <script>
          'use strict';
          window.P.now('atwl-ready').execute(function(atwlModule) {
            var isRegistered = (typeof atwlModule !== 'undefined');
            if (!isRegistered) {
              window.P.register('atwl-ready');
            }
          });
        </script>
        <div class="aok-hidden" data-amazon-lists-csrf-token="gxAtVpCKffZYVqtyIJ/3kg79gm+TxE8v8/eIA2W6sMVgAAAAAQAAAABj8YhEcmF3AAAAAHuL9oHQYR32uqP6iUf9gA=="></div>
        <script type="text/javascript">
          (function(f) {
            var _np = (window.P._namespace("list-CF-register-js"));
            if (_np.guardFatal) {
              _np.guardFatal(f)(_np);
            } else {
              f(_np);
            }
          }(function(P) {
            "use strict";
            window.P.now('atwl-cf').execute(function(module) {
              var isRegistered = (typeof module !== 'undefined');
              if (!isRegistered) {
                window.P.register('atwl-cf');
              }
            });
          }));
        </script>
        <style type="text/css">
          .registry-button-width {
            width: 100%;
            margin-left: ;
            margin-right: ;
          }

          .add-to-baby-button-spacing-bottom {
            margin-bottom: 0;
          }
        </style>
      </div>
    </div>
  </div>
  <script type="text/javascript">
    P.when("accordionBuyBoxJS").execute(function(buyBoxJS) {
      buyBoxJS.initialize();
    });
  </script>
  <input data-addnewaddress="add-new" id="cartAddressNew" name="dropdown-selection" type="hidden" value="add-new" class="nav-progressive-attribute"><input data-addnewaddress="add-new" id="cartAddressUsed" name="dropdown-selection-ubb" type="hidden"
    value="add-new" class="nav-progressive-attribute">
</form>

GET

<form method="get" action="" autocomplete="off" class="aok-hidden all-offers-display-params"> <input type="hidden" name="" value="true" id="all-offers-display-reload-param"> <input type="hidden" name="" id="all-offers-display-params"
    data-asin="0316380504" data-m="" data-qid="" data-smid="" data-sourcecustomerorglistid="" data-sourcecustomerorglistitemid="" data-sr=""> </form>

POST

<form method="post" action="" class="_shopping-cx-feedback-widget_style_radio-feedback-form__2dveN">
  <fieldset>
    <h1 id="radioHeading" class="a-size-large a-spacing-double-large a-text-center feedbackRadioHeading a-text-bold">Wie bewertest du heute deine Erfahrung beim Kauf von Büchern auf Amazon?</h1>
  </fieldset>
  <table class="a-normal _shopping-cx-feedback-widget_style_radio-feedback-table__3PsBH">
    <tbody>
      <tr class="_shopping-cx-feedback-widget_style_form-horizontal-radiobutton-input-row__1t5DJ">
        <td class="_shopping-cx-feedback-widget_style_form-table-column__3c_E1">
          <div data-a-input-name="shoppingCXRadio" class="a-radio a-radio-fancy feedbackRadioButton"><label for="radio1"><input type="radio" id="radio1" name="shoppingCXRadio" value="1" autocomplete="off"><i class="a-icon a-icon-radio"></i><span
                class="a-label a-radio-label"><span aria-hidden="false" hidden="">Sehr schlecht</span></span></label></div>
        </td>
        <td class="_shopping-cx-feedback-widget_style_form-table-column__3c_E1">
          <div data-a-input-name="shoppingCXRadio" class="a-radio a-radio-fancy feedbackRadioButton"><label for="radio2"><input type="radio" id="radio2" name="shoppingCXRadio" value="2" autocomplete="off"><i class="a-icon a-icon-radio"></i><span
                class="a-label a-radio-label"><span aria-hidden="false" hidden="">Schlecht</span></span></label></div>
        </td>
        <td class="_shopping-cx-feedback-widget_style_form-table-column__3c_E1">
          <div data-a-input-name="shoppingCXRadio" class="a-radio a-radio-fancy feedbackRadioButton"><label for="radio3"><input type="radio" id="radio3" name="shoppingCXRadio" value="3" autocomplete="off"><i class="a-icon a-icon-radio"></i><span
                class="a-label a-radio-label"><span aria-hidden="false" hidden="">Weder noch</span></span></label></div>
        </td>
        <td class="_shopping-cx-feedback-widget_style_form-table-column__3c_E1">
          <div data-a-input-name="shoppingCXRadio" class="a-radio a-radio-fancy feedbackRadioButton"><label for="radio4"><input type="radio" id="radio4" name="shoppingCXRadio" value="4" autocomplete="off"><i class="a-icon a-icon-radio"></i><span
                class="a-label a-radio-label"><span aria-hidden="false" hidden="">Gut</span></span></label></div>
        </td>
        <td class="_shopping-cx-feedback-widget_style_form-table-column__3c_E1">
          <div data-a-input-name="shoppingCXRadio" class="a-radio a-radio-fancy feedbackRadioButton"><label for="radio5"><input type="radio" id="radio5" name="shoppingCXRadio" value="5" autocomplete="off"><i class="a-icon a-icon-radio"></i><span
                class="a-label a-radio-label"><span aria-hidden="false" hidden="">Großartig</span></span></label></div>
        </td>
      </tr>
      <tr class="_shopping-cx-feedback-widget_style_form-horizontal-radiobutton-label-row__2mRxc">
        <td class="_shopping-cx-feedback-widget_style_form-table-column__3c_E1">
          <div class="_shopping-cx-feedback-widget_style_feedback-radio-label__JZ92s"><span aria-hidden="true" class="a-size-base">Sehr schlecht</span></div>
        </td>
        <td></td>
        <td class="_shopping-cx-feedback-widget_style_form-table-column__3c_E1">
          <div class="_shopping-cx-feedback-widget_style_feedback-radio-label__JZ92s"><span aria-hidden="true" class="a-size-base">Weder noch</span></div>
        </td>
        <td></td>
        <td class="_shopping-cx-feedback-widget_style_form-table-column__3c_E1">
          <div class="_shopping-cx-feedback-widget_style_feedback-radio-label__JZ92s"><span aria-hidden="true" class="a-size-base">Großartig</span></div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Name: ue_backdetect get

<form name="ue_backdetect" action="get"><input type="hidden" name="ue_back" value="2"></form>

Text Content

Zum Hauptinhalt wechseln

.us
Liefern nach Deutschland

Bücher
Wähle die Kategorie aus, in der du suchen möchtest. Alle Kategorien Automobil
Baby Bücher Computer Damenmode Elektronik Filme und Fernsehen Gepäck Gesundheit
& Haushalt Haustierbedarf Heim und Küche Herrenmode Industriell und
Wissenschaftlich Kindle-Shop Kunst und Handwerk Mode für Jungen Mode für Mädchen
Musik, CDs & Vinyl Musik-Downloads Prime Video Sales & Angebote Schönheit &
Körperpflege Software Spielzeug und Spiele Sport und Freizeit Videospiele
Werkzeug & Heimwerken
Suche Amazon


DE
Hallo, anmelden
Konto und Listen Warenrücksendungen und Bestellungen
0
Einkaufswagen

Anmelden
Neuer Kunde? Starte hier.
Meine Listen
Neue Liste anlegen Liste finden AmazonSmile Charity Lists
Mein Konto
Konto Bestellungen Empfehlungen Browserverlauf Watchlist Gekaufte und geliehene
Videos Kindle Unlimited Inhalte und Geräte Spar-Abo-Artikel Mitgliedschaften und
Abonnements Musikbibliothek













Anmelden
Neuer Kunde? Starte hier.






Alle

INTERNATIONALE EINKÄUFE BENACHRICHTIGUNG FÜR ÜBERGANG


Wir liefern international
Wir zeigen Ihnen Artikel, die nach DE geliefert werden. Um Artikel anzuzeigen,
die in ein anderes Land geliefert werden, ändern Sie bitte Ihre Versandadresse.
FORTFAHREN DIE ADRESSE ÄNDERN
Angebote des Tages Kundenservice Wunschlisten Geschenkkarten Verkaufen bei
Amazon Kundensupport bei Behinderungen
Angebote in der Elektronik einkaufen

Bücher Erweiterte Suche Neuerscheinungen Bestseller und mehr Amazon Buchclubs
Kinderbücher Lehrbücher Lehrbücher leihen des Monats

Amazon.com: The Art of Invisibility: The World's Most Famous Hacker Teaches You
How to Be Safe in the Age of Big Brother and Big Data: 9780316380508: Mitnick,
Kevin, Vamosi, Robert, Hypponen, Mikko: Bücher
 * Bücher
 * ›
 * Computer & Internet
 * ›
 * Netzwerke

Gebraucht kaufen 35,75 $

Lieferung 16. - 23. März
Oder schnellste Lieferung 13. - 15. März
Liefern nach Deutschland
Gebraucht: Gut | Details
Verkauft von In D-Mand
Versand durch Amazon
Zustand: Gebraucht: Gut
Kommentar: No highlighting/underlining. Minor wear.

Beim Versand durch Amazon nutzen Verkaufspartner die Logistik der
Amazon-Versandzentren: Amazon verpackt und verschickt die Artikel und übernimmt
den Kundenservice. Deine Vorteile: (1) Lieferung ab 29 EUR Bestellwert (Bücher,
Bekleidung und Schuhe generell versandkostenfrei, auch zusammen mit
Media-Produkten). (2) Kombinieren und sparen - bestelle bei Amazon.de oder
Verkaufspartnern, die den Versand durch Amazon nutzen, wird deine Bestellung zu
einer Lieferung zusammengefasst. (3) Alle Artikel sind mit Amazon Prime für noch
schnellere Lieferung bestellbar.

Wenn Sie Verkäufer sind, kann Versand durch Amazon Ihnen dabei helfen, Ihre
Umsätze zu steigern. Weitere Informationen zum Programm

Zugriffscodes und Beilagen sind bei gebrauchten Artikeln nicht garantiert.
In den Einkaufswagen

Auf die Liste

Hinzugefügt zu
Hinzufügen war nicht erfolgreich. Bitte versuche es erneut.



ES IST EIN FEHLER AUFGETRETEN.

Es gab einen Fehler beim Abrufen deines Wunschzettels. Versuche es noch einmal.


ES IST EIN FEHLER AUFGETRETEN.

Liste nicht verfügbar.








Möchtest du verkaufen?
Bei Amazon verkaufen


Zum Buchclub hinzufügen

Deine Buchclubs werden geladen.
Beim Laden deiner Buchclubs ist ein Problem aufgetreten. Bitte versuche es noch
einmal.
Nicht in einem Club? Weitere Informationen


Mitglied werden oder Buchclubs erstellen


Wählt gemeinsam Bücher aus


Verfolge deine Bücher.
Bringe deinen Club zu Amazon Buchclubs, gründe einen neuen Buchclub und lade
Freunde ein oder finde kostenlos einen Club, der zu dir passt.
Amazon Book Clubs erkunden

Gesponsert




Lade die kostenlose Kindle-App herunter und lese deine Kindle-Bücher sofort auf
deinem Smartphone, Tablet oder Computer – kein Kindle-Gerät erforderlich.
Weitere Informationen

Mit Kindle für Web kannst du sofort in deinem Browser lesen.

--------------------------------------------------------------------------------

Scanne den folgenden Code mit deiner Mobiltelefonkamera und lade die Kindle-App
herunter.



Zur Rückseite klappen Zur Vorderseite klappen
Hörprobe Wird gespielt... Angehalten   Du hörst eine Hörprobe des Audible
Hörbuch-Downloads.
Mehr erfahren

Alle 2 Bilder anzeigen



--------------------------------------------------------------------------------


DEM AUTOR FOLGEN

Kevin D. Mitnick
Folgen
Ein Fehler ist aufgetreten. Wiederhole die Anfrage später noch einmal.

OK


THE ART OF INVISIBILITY: THE WORLD'S MOST FAMOUS HACKER TEACHES YOU HOW TO BE
SAFE IN THE AGE OF BIG BROTHER AND BIG DATA GEBUNDENE AUSGABE – 14. FEBRUAR 2017

von Kevin Mitnick (Author), Robert Vamosi Mikko Hypponen (Foreword) & 0 mehr
4,5 von 5 Sternen 1.964 Sternebewertungen


Von der Redaktion empfohlen Beste Sachbücher






--------------------------------------------------------------------------------


Alle Formate und Editionen anzeigen



Sorry, there was a problem loading this page. Try again.

Preis

Neu ab Gebraucht ab



Kindle
"Bitte wiederholen"
11,99 $

— —





Audible Hörbuch, Ungekürzte Ausgabe
"Bitte wiederholen"
0,00 $

Gratis im Audible-Probemonat





Gebundenes Buch
"Bitte wiederholen"
35,75 $

73,95 $ 12,00 $





Taschenbuch
"Bitte wiederholen"
—

13,30 $ 6,92 $





Taschenbuch
"Bitte wiederholen"
11,83 $

— 11,83 $





Audio-CD, Hörbuch, CD, Ungekürzte Ausgabe
"Bitte wiederholen"
22,75 $

22,50 $ —



 * Kindle
   11,99 $ Lies mit kostenfreien App
 * Hörbuch
   0,00 $ Gratis im Audible-Probemonat
 * Gebundenes Buch
   35,75 $
   
   23 Gebraucht ab 12,00 $ 7 Neu ab 73,95 $
 * Taschenbuch
   ab 6,92 $
   
   39 Gebraucht ab 6,92 $ 30 Neu ab 13,30 $
 * Taschenbuch
   11,83 $
   
   3 Gebraucht ab 11,83 $
 * Audio-CD
   22,75 $
   
   2 Neu ab 22,50 $







Optimiert für Kindle
Ein hochwertiges digitales Leseerlebnis.
Entdecke unser optimiertes digitales Leseerlebnis
Jedes Buch in Optimiert für Kindle bietet ein großartiges Leseerlebnis zu einem
günstigeren Preis als das gebundene Buch.


Blättere durch das Buch und springe mit PageFlip immer wieder dorthin zurück, wo
du aufgehört hast.

Vergrößere Bilder mit hoher Qualität, um sie genauer zu betrachten.

Profitiere von weiteren Funktionen, die nur in digitaler Form möglich sind: Nimm
deine Bibliothek überallhin mit, lies mit der Kindle App auf all deinen Geräten,
passe die Schriftart an, erstelle gemeinsam nutzbare Notizen und Markierungen,
und vieles mehr.

Entdecke dank der Wikipedia-Integration zusätzliche Details zu den Ereignissen,
Personen und Orten in deinem Buch.

Entdecke die Kindle eBook-Version dieses Buchs
Lade die kostenlose Kindle App herunter:
Entdecke dieses Buch als Kindle eBook und genieße ein optimiertes digitales
Leseerlebnis. Erfahre mehr über unsere Auswahl an Büchern Optimiert für Kindle,
die in vielen Kategorien verfügbar sind.
Kindle eBook anzeigen











Real-world advice on how to be invisible online from "the FBI's most wanted
hacker" (Wired).

Be online without leaving a trace. Your every step online is being tracked and
stored, and your identity literally stolen. Big companies and big governments
want to know and exploit what you do, and privacy is a luxury few can afford or
understand.

In this explosive yet practical book, Kevin Mitnick uses true-life stories to
show exactly what is happening without your knowledge, teaching you "the art of
invisibility" -- online and real-world tactics to protect you and your family,
using easy step-by-step instructions.

Reading this book, you will learn everything from password protection and smart
Wi-Fi usage to advanced techniques designed to maximize your anonymity. Kevin
Mitnick knows exactly how vulnerabilities can be exploited and just what to do
to prevent that from happening.

The world's most famous -- and formerly the US government's most wanted --
computer hacker, he has hacked into some of the country's most powerful and
seemingly impenetrable agencies and companies, and at one point was on a
three-year run from the FBI. Now Mitnick is reformed and widely regarded as the
expert on the subject of computer security. Invisibility isn't just for
superheroes; privacy is a power you deserve and need in the age of Big Brother
and Big Data.

"Who better than Mitnick -- internationally wanted hacker turned Fortune 500
security consultant -- to teach you how to keep your data safe?" --Esquire
arsene_lupin

Mehr lesen



--------------------------------------------------------------------------------

Previous page
 1. Seitenzahl der Print-Ausgabe
    
    320 Seiten
 2. Sprache
    
    Englisch
 3. Herausgeber
    
    Little, Brown and Company
 4. Erscheinungstermin
    
    14. Februar 2017
 5. Abmessungen
    
    16.13 x 3.18 x 24.26 cm
 6. ISBN-10
    
    0316380504
 7. ISBN-13
    
    978-0316380508
 8. Alle Details anzeigen

Next page















KUNDEN, DIE DIESEN ARTIKEL ANGESEHEN HABEN, HABEN AUCH ANGESEHEN

Seite 1 von 7 Zum AnfangSeite 1 von 7
Previous page
 1. Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
    Kevin Mitnick
    4,6 von 5 Sternen 2.695
    Taschenbuch
    82 Angebote ab 4,92 $
 2. Social Engineering: The Science of Human Hacking
    Christopher Hadnagy
    4,7 von 5 Sternen 846
    Taschenbuch
    20,49$20,49$
    10,27 $ Versand
 3. Hacking: The Art of Exploitation, 2. Auflage
    Jon Erickson
    4,7 von 5 Sternen 1.294
    Taschenbuch
    Bestseller Nr. 1
      in Web-Verschlüsselung
    77 Angebote ab 11,60 $
 4. Extreme Privacy: What It Takes to Disappear
    Michael Bazzell
    4,8 von 5 Sternen 198
    Taschenbuch
    40,73$40,73$
    14,32 $ Versand
 5. The Art of Deception: Controlling the Human Element of Security (English
    Version)
    Kevin D. Mitnick
    4,7 von 5 Sternen 867
    Taschenbuch
    116 Angebote ab 2,31 $
 6. Permanent Record
    Edward Snowden
    4,7 von 5 Sternen 12.650
    Taschenbuch
    69 Angebote ab 8,98 $
 7. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers,
    Intruders and Deceivers
    Kevin D. Mitnick
    4,6 von 5 Sternen 486
    Gebundene Ausgabe
    29,81$29,81$
    Erhalte es bis Montag, 6. März
    11,07 $ Versand
    Nur noch 1 vorrätig – bestellen Sie bald.

Next page













REZENSIONEN DER REDAKTION


REVIEW

Praise for The Art of Invisibility

"How would it feel to find out that your neighbor and friend has secretly
observed you in your own home for years? The place that should be most private
to you was not, and the intruder's devices themselves weren't something you'd
ever have thought to look for. This kind of behavior is the opposite of giving
normal people freedom and security, of valuing and respecting them as
humans--and it's happening more and more. The answer to peeping eyes and cyber
theft is to move society toward greater cyber-security and it all starts with
essential education about being private and invisible in our daily lives.
Kevin's book is the must read in this new world."―Steve Wozniak, cofounder,
Apple Inc.

"The FBI's most-wanted hacker."―Wired

"Who better than Mitnick -- internationally wanted hacker turned Fortune 500
security consultant -- to teach you how to keep your data safe from spear
phishing, computer worms, and Fancy Bears?"―Esquire

"Offers a sobering reminder of how our raw data -- from email, cars, home Wi-Fi
networks and so on -- makes us vulnerable."―Amy Webb, New York Times Book Review

"Mitnick's new book aims to help everyone -- from the everyday internet users to
the hardcore paranoid -- do a better job of keeping personal information
private."―Laura Hautala, CNET

Praise for The Art of Deception

"The most famous computer hacker in the world. A tour de force."―Publishers
Weekly

"The world's most famous computer hacker and cybercult hero...has written a
blueprint for system security based on his own experiences. Required reading for
IT professionals, this book is highly recommended for public, academic, and
corporate libraries."―Library Journal

Praise for Ghost in the Wires

"Intriguing, insightful and extremely educational into the mind of one who truly
mastered the art of social engineering with the use of a computer and modern day
technologies. I strongly believe that one can learn a great deal about
protecting themselves once they understand how another one perpetrates the
crime."―Frank W. Abagnale, author of Catch Me if You Can


ABOUT THE AUTHOR

Kevin Mitnick has been the subject of countless profiles published and broadcast
throughout the world. Mitnick's leading penetration-testing team is highly
respected and sought after for its security services by the world's top
corporations and governments. The company he founded, Mitnick Security
Consulting LLC, has clients that include dozens from the Fortune 500 and many
nations across the globe. Mitnick is the bestselling author of The Art of
Invisibility, Ghost in the Wires, The Art of Intrusion, and The Art of
Deception. He lives in Las Vegas and travels the world as the top keynote
speaker on cybersecurity.


--------------------------------------------------------------------------------


PRODUKTINFORMATION

 * Herausgeber ‏ : ‎ Little, Brown and Company (14. Februar 2017)
 * Sprache ‏ : ‎ Englisch
 * Gebundene Ausgabe ‏ : ‎ 320 Seiten
 * ISBN-10 ‏ : ‎ 0316380504
 * ISBN-13 ‏ : ‎ 978-0316380508
 * Artikelgewicht ‏ : ‎ 530 g
 * Abmessungen ‏ : ‎ 16.13 x 3.18 x 24.26 cm

 * Amazon Bestseller-Rang: Nr. 279,872 in Bücher (Siehe Top 100 in Bücher)
    * Nr. 146 in Online-Datenschutz & Sicherheit
    * Nr. 202 in Hacking
    * Nr. 473 in Internet & Telekommunikation

 * Kundenrezensionen:
   4,5 von 5 Sternen 1.964 Sternebewertungen




Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.


VIDEOS

Hilf anderen, mehr über dieses Produkt zu erfahren, indem du ein Video
hochlädst!
Ihr Video hochladen



--------------------------------------------------------------------------------


INFORMATIONEN ZUM AUTOR

Folge Autoren, um Neuigkeiten zu Veröffentlichungen und verbesserte Empfehlungen
zu erhalten.
Folgen


KEVIN D. MITNICK

Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Hello


Mehr lesenWeniger lesen


--------------------------------------------------------------------------------

Gesponsert


--------------------------------------------------------------------------------


WIE BEWERTEST DU HEUTE DEINE ERFAHRUNG BEIM KAUF VON BÜCHERN AUF AMAZON?

Sehr schlecht
Schlecht
Weder noch
Gut
Großartig
Sehr schlecht
Weder noch
Großartig


VIELEN DANK FÜR IHR FEEDBACK.

--------------------------------------------------------------------------------


KUNDENREZENSIONEN

4,5 von 5 Sternen
4,5 von 5
1.964 globale Bewertungen

5 Sterne

72% 4 Sterne

17% 3 Sterne

7% 2 Sterne

2% 1 Stern

2%

So funktionieren Kundenrezensionen und -bewertungen

Kundenbewertungen, einschließlich Produkt-Sternebewertungen, helfen Kunden, mehr
über das Produkt zu erfahren und zu entscheiden, ob es das richtige Produkt für
sie ist.

Um die Gesamtbewertung der Sterne und die prozentuale Aufschlüsselung nach
Sternen zu berechnen, verwenden wir keinen einfachen Durchschnitt. Stattdessen
berücksichtigt unser System beispielsweise, wie aktuell eine Bewertung ist und
ob der Prüfer den Artikel bei Amazon gekauft hat. Es wurden auch Bewertungen
analysiert, um die Vertrauenswürdigkeit zu überprüfen.

Erfahre mehr darüber, wie Kundenbewertungen bei Amazon funktionieren.

--------------------------------------------------------------------------------

--------------------------------------------------------------------------------

Gesponsert


REZENSIONEN FILTERN NACH

 * Deutsch
 * Englisch

--------------------------------------------------------------------------------

 * Spitzenrezensionen Neueste zuerst Spitzenrezensionen


SPITZENBEWERTUNGEN AUS USA



Alle Rezensionen ins Deutsche übersetzen

DERZEIT TRITT EIN PROBLEM BEIM FILTERN DER REZENSIONEN AUF. BITTE VERSUCHE ES
SPÄTER ERNEUT.



Zachariah B. Brown
5,0 von 5 Sternen This need for vigilance reminds the anonymous participant to
not log into any sites or applications with one's real identity and that it is
best to turn off one's wireless router before you boot ...
Rezension aus den Vereinigten Staaten vom 15. Februar 2018
Verifizierter Kauf
We obviously live in an age of increasing digital surveillance, informed by the
prevalence of ipads, iphones, laptop computers, and desktop computers. There is
even increasing discussion of the 'internet of things' where microwaves,
thermostats, and televisions can become nodes on a larger network. And people
can have legitimate needs to create an anonymous identity, such as in a legal
dispute with a former partner or a disagreement with a corporate chain of
command, and this need for a separate identity has to be matched with a
willingness to rigorously defend it from potential disclosure. There are
resources available to help with this endeavor, such as with VMWare Fusion to
create a virtual machine on which Tails is used as the operating system and Tor
is used as the browser. There is also the option to use a chromebook for all
online banking, in addition to another workstation for routine, day-to-day
usage. This need for vigilance reminds the anonymous participant to not log into
any sites or applications with one's real identity and that it is best to turn
off one's wireless router before booting the anonymous laptop at the residence.
The secondary laptop can be purchased with gift cards while exercising extreme
caution due to surveillance cameras; there is also the option to hire a randomly
chosen person to make the purchase of non-refillable gift cards (such a
candidate can also be used to go into a Verizon, AT and T, or T-Mobile store to
purchase a personal hotspot for $200, in exchange for $100 cash compensation).
There is also the guidance in the book to change the MAC address of your machine
each time public wi-fi is accessed so that the system unit is not identifiable.

An important point to remember is that when the personal hotspot is turned on,
the device registers with the closest cell tower. Furthermore, anonymity is
supported by remembering to never turn on one's personal phone or laptop in the
same place where turning on the anonymous laptop, burner phone, or anonymous
hotspot takes place. As mentioned above, the Tor browser must always be used to
create and access all online accounts associated with this anonymous identity.
Protonmail.com, Tutanota.com, and fastmail.com are resources available that
support anonymity. Funding to support an anonymous identity will have to be run
through an anonymity mechanism: such as to convert prepaid giftcards into
Bitcoin and then running the Bitcoin through a laundering service. Supporting
this endeavor, the Tor browser can be used to set up an initial bitcoin wallet
at paxful.com. And tumblers are a specific form of online laundering service
where Bitcoin is taken from a variety of sources and then mixed together so that
the result retains value and carries traces of many owners, thus diminishing
further the possibility of identification. In addition to using the resources
specified thus far, this endeavor makes advantageous the use of a VPN, and to
make certain to closely review a VPN provider's terms of service and privacy
policies. This complete 'invisibility' setup can cost from $200 up to $500;
while while this requires a certain investment of capital, the pursuer of
comprehensive privacy can them move onward.

With this set up in place, an important point to remember is that electronic
devices can measure the nanosecond differences in the way each person presses
keys on keyboards. This can lead to a 'keystroke profile' and to counter this,
KeyBoard Privacy is an available plugin for the Chrome browser. Moving along
after acknowledging this keyboard-related issue, the Deep web includes
subscription-only sites and corporate intranet sites, whereas the Dark Web is
where the Silk Road exists along with the ability to hire an assassin and
acquire child pornography. Already mentioned a number of times, Tor (or the
Onion router) was created by the US Naval Research Lab, and is vital for the
implementation of these privacy steps while traveling. In this context, a number
of pointers are important: 1. Clean up any sensitive data before you travel and
perform a full backup. 2.Leave the data there [on the computer] but encrypt it
with a strong key; do not keep the passphrase with you. 3.Upload the encrypted
data to a cloud service, then download and upload as needed. 4.Use a free
product such as VeraCrypt to create a hidden encrypted file folder on your hard
drive. 5.Whenever entering your password into your devices, cover oneself and
one's computer with a jacket. 6.Seal one's laptop and other devices in a FedEx
or other Tyvek envelope and sign it.

Furthermore, this book also describes that there are Automated Targeting Systems
(ATS) that create an automatic dossier about a traveller when commuting
internationally. And when deleting data on a computer it is important to
remember that deletion changes to the MBR entry for a file (the index used to
find parts of the file on the hard drive); the file (or some of its parts)
remains on the hard drive until the new data is written over that part; it is
very difficult to 'wipe' a solid state drive. Related to this, an important
point is that '...if you plug your iphone into another person's computer and
'trust' it, a trusted relationship is created between the computer and the iOS
device which allows the computer to access photos, videos, SMS messages, call
logs, and WhatsApp messages..' For iTunes backups, it is good to set a password
for encrypted files. If an end-user needs to share files, and he or she is using
an Apple product, there is the option to use 'Airdrop;' if a phone needs to be
charged, the lightning cable plugged into the system or an electrical outlet,
not into someone else's computer.

When going through any security checkpoint, it is important to make sure one's
laptop and electronic devices are the last on the conveyor belt. Along with
this, to encrypt an entire drive, there are different options available:
Symantec's PGP Whole Disk Encryption, Windows WinMagic, and OSX File Vault 2. An
important point to consider, along with drive encryption, is that Tails is an OS
that can be booted up on any modern-day computer to avoid leaving any
forensically recoverable data on the hard drive, preferably one that can be
write-protected. Tails can be downloaded onto a DVD or USB stick, and the BIOS
firmware or the EFI initial boot sequence can be set for either DVD or USB so as
to boot the Tails distribution. And while the utility provides a useful
advantage, there are potential issues with Bitlocker: it uses a pseudorandom
number generator called Dual_EC_DRBG which might contain a NSA backdoor, it is
privately owned, and the key must be shared with Microsoft unless purchased for
$250.

While travelling, there is also the need to be aware of the possibility of an
Evil Maid Attack, which involves a powered-down laptop whose hard drive is
encrypted. Someone enters the room and inserts a USB stick containing a
malicious bootloader. The target laptop must then be booted off the USB to
install the malicious bootloader that steals the user's passphrase, and the maid
can re-enter almost any hotel room the next day and type in a secret key
combination that extracts the key combination. Providing additional perspective
there are a number of steps that can be taken to use the Internet privately
while travelling: 1.purchase prepaid gift cards anonymously. In the EU, you can
purchase prepaid credit cards anonymously at viabus<dot>com. 2. Use open wi-fi
after changing our MAC address. 3.Find an email provider that allows the
traveller to sign up without SMS validation or he/she can sign up for a skype-in
number using Tor and a prepaid giftcard. With Skype-in, you can receive voice
calls to verify one's identity. Make sure to be out of camera view. Use Tor to
mask the physical location when signing up. 4.Using a newly anonymous email
address, sign up at a site such as paxful.com, again using Tor, to sign up for a
bitcoin wallet, and buy a supply of bitcoin. Pay for them using the prepaid gift
cards. 5.Set up a second anonymous email address and new secondary bitcoin
wallet after closing and establishing a new Tor circuit to prevent any
association with the first email account and wallet. 6.Use a bitcoin laundering
service such as bitlaunder.com to make it hard to trace the currency's origin.
Have the laundered bitcoin sent to the second bitcoin address. 7.Sign up for a
VPN service using the laundered bitcoin that does not log traffic or IP
connections. A subscriber can usually find out what is logged by reviewing the
VPN provider's privacy policy. 8.Have a cutout [temporary hired hand] obtain a
burner portable hotspot device on one's behalf. Give the cutout cash to purchase
it. 9.To access the Internet, use the burner hotspot device away from home,
work, and other cell services. 10.Once powered on, connect to VPN through the
burner hotspot device. 11.Use Tor to browse the internet.

Much more common than travelling is the reality of corporate work life. There is
tracking software on Corporate Owned, Personally Enabled (COPE) smartphones and
service trucks with GPS to surveil employees. Some companies monitor employee's
outlook calendar entries, email headers, and I.M. logs, ostensibly used to help
companies figure out how their employees are spending their time. Anything
passing through a corporate network belongs to the company - it is not the
employee's. And when at work an employee must remember to always lock his or her
computer screen. If concerned about privacy, one needs to not do anything
personal while at work. Keep a strict firewall between one's worklife and home
life. Never use company wi-fi, turn off SSID broadcast if using a portable
hotspot. There is the need to keep personal business out of the company computer
systems, especially when searching for health-related topics or looking for a
new job. There is also a technology called KeySweeper, which is a disquised USB
charger that wirelessly and passively looks for, decrypts, logs, and reports
back (over GSM) all keystrokes from any MS wireless keyboard in the vicinity,
thus increasing the possibility of workplace surveillance.

Impacted by resources used frequently at the workplace, Google Drive has
introduced a new information rights management (IRM) feature; in addition to the
documents, spreadsheets, and presentations created within Google docs, Google
Drive now accepts PDF and other file formats as well. Useful features include
the ability to disable the download, print, and copy capabilities for commenters
and viewers. An employee can also prevent anyone from adding additional people
to a shared file. Of course these management features are only available to file
owners. That means if someone has invited an employee to share a file that
person has to set the privacy restriction. Similar to this, SpiderOak is a
service provider that offers the full benefits of cloud storage and sync
capability along with 100% data privacy; this resource protects sensitive data
through 2-factor password authentication and 256-bit AES encryption so that
files and passwords stay private. Another concern to keep in mind is that in
2013 Google started what is called hotwording, which is a feature that allows an
end-user to give a simple command that activates the listening mode in Chrome.

Moving on, Shodan is a publicly available web search engine that exposes
nontraditional devices configured to connect to the Internet; this resource not
only displays from IOT devices at home but also from internal municipal
utilities networks and industrial control systems that have been misconfigured
to connect their sensors to the public network. Similar to this expanding
network of remote inspection, a skilled technician can reverse engineer the
protocol controlling a vehicle by intercepting and analyzing the GSM or CDMA
traffic from a car's onboard computer to the automaker's systems. GodView is an
administrative tool which is used by Uber to track the location of its thousands
of contract drivers as well as their customers. If one rides a bus, train, or
ferry to work, he or she is no longer invisible among the masses. Transit
systems are experimenting with using mobile apps and near field communications
(NFC) to tag riders as they get on and get off public transportation. NFC is a
short-distance radio signal that often requires physical contact. Payment
systems such as Apple Pay, Android Pay, and Samsung Pay all use NFC to make
fumbling for quarters a thing of the past. According to Tesla's privacy policy,
the company may collect the VINs, speed information, odometer readings, battery
usage information, battery charging history, information about electrical system
functions, software version information, infotainment system data, and safety
related data [all of which is touched on in the ownership paperwork, and
frequently given only cursory inspection, while providing the vendor with
plausible deniability with many concerns].

Continuing with the topic of motoring, in one altercation with another motorist,
the author describes: 'I grabbed my cell phone, called the DMV, and impersonated
law enforcement. I got the DMV to run his plates, then they gave me his name,
address, and SSN. Then I called AirTouch Cellular impersonating an AirTouch
employee, and had them do a search on his SSN for any cellular accounts.' The
author then gave the motorist a phonecall, communicating a terse reprimand. As
an example from history, in 1888 that kind of constant exposure was still a
shocking and disconcerting novelty. The Hartford Courant sounded an alarm: 'The
sedate citizen can't indulge in any hilariousness without incuring the risk of
being caught in the act and having his photograph passed around among his
sunday-school children. And the young fellow who wishes to spoon with his best
girl while sailing down the river must keep himself constantly sheltered.'

On a different note with usage of corporate resources, exchangeable image file
(EIF) data in a digital image contains, among other things, the date and time
when the picture was snapped, the make and model of the camera, and, if you have
geolocation activated on the device taking the photo, the longitude and latitude
of the place where you took the image. 'Some repressive governments ... have
taken photos of protestors at large anti-government rallies and then put the
images on the Web. This is not using image recognition software so much as it is
crowdsourcing the identification process.' One can also perform what is called a
reverse image search in google by clicking on the tiny camera within the google
seach window and uploading any photo from your hard drive. In a few minutes the
investigator will see any copies of that image findable online. In theory, if it
one's own photo, he or she should know all the sites that came up in the
results. Consistent with remaining vigilant while on business travel, if a
dating site is in use and is being accessed from someone else's computer, or
from a public kiosk computer, always remember to log out to make sure that no
personally identifiable information is cached, or accessible to other kiosk
users.

Impacting the usage of mobile devices and according to Apple, its various
products will automatically connect to networks in this order of preference:
1.the private network the device most recently joined. 2.another private
network. 3.a hotspot network. If one has something sensitive to do away from the
house, it is better to use the cell connection on your mobile device; he or she
can also tether to a mobile device using USB, bluetooth, or wi-fi (preferably
with WPA2 security). IPSec automatically includes PFS (perfect forward security)
but not all services actually bother to configure it. VPNs are more expensive
than proxies; if one's particular VPN vendor keeps logs, read the privacy policy
to make sure that the service does not retain traffic or connection logs - even
encrypted - and that it doesn't make the data easy to share. Again a factor
while travelling, GoGo and other in-air services throttle UDP packets to prevent
skype or other voice-call apps; most VPNs use UDP by default. UDP is preferable
for ease and speed of connection, without guaranteeing delivery of the data
payload.

To remedy this concern, TorGuard and ExpressVPN are connection services that use
TCP; one can also install a VPN on a mobile phone. Email providers such as
google, yahoo, and MS retain login records for more than a year, and these
reveal the particular IP addresses a consumer has logged in from. When one
connects to a wireless network, the MAC address on a computer is automatically
recorded by the wireless networking equipment. A best practice is to never trust
a public PC terminal. Even if one is using a telephone-based dial-up modem or a
cable-based ASM (any-source multicast) router (available from Cisco and Belkin,
among others), these devices have had their share of software and configuration
issues. It is best to always download the latest firmware and to update the
router configuration settings. If an end-user does not have the instructions for
the router in question, there's an online list of URLs that tells the
investigator what to type into the browser window so as to connect directly to
the router on a residential network.

Helping to understand better the need for VPNs, there is a hacker tool called
Aircrack-NG that can reveal the authorized MAC address of a currently connected
user and then an attacker can then the MAC address to connect to the wireles
router. Also an important consideration with residential wireless security, WPS
(Wireless protected setup) is vulnerable to the attack method called Pixie Dust,
which is an offline attack that affects only a few chip makers, including
Ralink, Realtek, and Broadcom, and it works by helping hackers gain access to
the password on wireless routers. Therefore, it is a good idea to turn off WPS.
There is also theft-tracking software: when someone using the software reports
that his or her school system-issued laptop has been stolen, the school system
administration department can log on to a website and see images from the stolen
laptop's webcam as well as hear sounds from the microphone. Furthermore, whether
from a corporate, educational, or private residential network, it is a good idea
to avoid clicking on email attachments unless opening them in Google Quick View
or Google Docs. AdBlockPlus is an effective ad-removal plugin that complements
smooth email access in all these contexts and helps to minimize the possibility
of malware infection.

Providing important perspective on when and when not to access certain online
resources, 70% of health sites' URLs contain information exposing specific
conditions, treatments, and diseases. While it is important to have HTTPS
Everywhere enabled in the browser while accessing such material, any person
using a browser needs to remember that it encrypts contents of sites but not the
URL. In order to know better about how to be anonymous while online,
Panopticlick<dot>com is a site built by the Electronic Frontier Foundation that
will determine just how common or unique a browser configuration is compared to
others. Marketers, criminal hackers, and governments are all trying to get
information that a private end-user may not want to give. Addressing this
concern, NoScript is a Firefox plugin that effectively blocks just about
everything considered harmful to the typical residential computer (the
equivalent for Chrome is called ScriptBlock). With such a resource implemented,
there should be no flashing ads on the google home page, otherwise the
computer/browser may be compromised. For both Firefox and Chrome, Ghostery is a
utility that identifies all the web traffic trackers that sites use to follow an
individual end-user's activity. Having multiple online personality profiles
dilutes the privacy impact of having only one identifiable address, and thus the
serious pursuer of anonymity must be firmly aware of hardware, software, and
circumstantial challenges.

To add further perspective with web browser security, magic cookies provide
third parties with information about account and specific preferences; they are
proxies for the data that lives on the back end of the website. OAuth is an
authentication protocol that allows a site to trust an end-user even if one does
not enter a password, and thus is important to be aware of. Facebook Disconnect
for Chrome is used to block facebook services on third party sites. 'Given what
Facebook knows about its 1.65 billion subscribers, the company has been fairly
benevolent - so far. It has a ton of data, but it, like Google, has chosen not
to act on all of it.' 'The best way to remove a toolbar is to uninstall it the
way you would uninstall any program on your traditional PC. But some of the most
persistent and parasitic toolbars may require you to download a removal tool,
and often the process of uninstalling can leave behind enough information to
allow advertising agents related to the toolbar to reinstall it.' 'A geolocation
discrepancy like this often flags an attempt to purchase as possible abuse. [in
reference to online transactions made via Tor].'

Moving deeper on the issue of website security, Content Delivery Networks (CDNs)
cache pages for their clients to deliver them faster, no matter where one is in
the world. '...Every website should have a certificate, a third party guarantee
that when you connect the website is not fraudulent.' An 'extended verification
certificate' is the most stringent level of certificate verification.
HTTP://BENWERD<dot>COM/LAB/GEO.PHP is a test site that will tell the end-user
whether the browser is reporting the location to other resources on the
Internet. CTRL-SHIFT-I can be used to open the developer tools, and thus the
informed end-user can work on countering this type of surveillance. Mentioned
above, HTTPS Everywhere is the best way to prevent Javascript injections from
monitoring one's activity via the browser. Google Dashboard gives any person
full control should he or she ever want to remove synced information from your
account, in addition to the steps enumerated above. Even if one is not logged
into MS, Yahoo, or Google accounts, the IP address is still tied to each search
engine request. One way to avoid this one-to-one match is to use the
google-proxy Startpage.com or the search engine DuckDuckGo [which is typically
used in tandem with the Tor browser].

As an aside, an important piece of meta-data is that open-source and nonprofit
organizations provide perhaps the most secure software and services because
there are literally thousands of eyes pouring over the code and flagging
anything that looks suspicious or vulnerable. Apps such as AIM, Blackberry
Messenger, and Skype all store messages without encrypting them. That means the
service provider can read the content (if it's stored in the cloud) and use it
for advertising. AIM keeps an archive of all messages sent through its service;
it also saves the message content, keeping records of the messages in the cloud
in case the end-user ever wants to access a chat history from any device
different from the one where the last session took place. Off the Record (OTR)
messaging is a higher standard of end-to-end encryption protocol used for text
messages and can be found in a number of products: ChatSecure, Signal,
Cryptocat, and Tor Messenger and thus directly supports a project of anonymous
internet usage.

To clarify an important point with the usage of mobile devices, the IMSI
(International Mobile Subscriber Identity) is a unique number assigned to a
phone's SIM card; the first part of that number uniquely identifies the mobile
network operator and the remaining part identifies the mobile phone. With mobile
devices in general, the 2G network offered two standards: Global System for
Mobile Communications (GSM) and Code Division Multiple Access (CDMA). That
technology also introduced short message service (SMS), unstructured
supplementary service data (USSD), and other simple communication protocols that
are still in use. While in a live environment, an important piece of information
is that Signalling System Protocol keeps mobile calls connected when driving
along a freeway and switching from cell tower to cell tower; this handles the
process for call establishment, billing, routing, and information exchange
functions. VoIP uses the same coaxial cable that brings streaming video and
high-speed internet into your home. '...Whenever you write an email, no matter
how inconsequential, and even if you delete it from your inbox, remember that
there's an excellent chance that a copy of those words and images will be
scanned and will live on.'

As countermeasures for this risk, PGP, OpenPGP, and GPG (GNU Privacy Guard) are
interoperational methods of email encryption. '...When you receive an
unsolicited phone call from your bank asking for your SSN or account info you
should always hang up and call the bank yourself.' Public algorithms have been
vetted for weakness (as discussed above with opensource software). When one
encrypts a message - an email, text, or phone call - it is highly adviseable to
use end-to-end encryption. That means the message stays unreadable until it
reaches its intended recipients; only sender and receiver have the key to
decode; a researcher can do a google search for 'End-to-End Encryption Voice
Call. [to circle back to the brief discussion above about VoIP]' On the same
note, MailVelope is a PGP plug-in that handles the public and private encryption
keys. Metadata is information in the to and from fields, IP address of involved
servers, and the subject line. These pieces of information are not typically
encrypted. Therefore, third parties will still be able to see the metadata of an
encrypted message unless this concern is specifically addressed.

Moving on with the topic of telephony, Call Detail Records (CDRs) show the time
a call was made, number dialed, length of the call, and number of times a
particular number was called; this information can be used in tandem with social
engineering (which is a 'hacking technique that uses manipulation, deception,
and influence to get a human target to comply with a request'). An app developed
at Dartmouth College matches patterns of stress, depression, and loneliness in
user data, and thus very intimate details can be divulged in an unsecured
discussion. To be truly invisible and counter such a concern, a few things are
essential: removal of true IP address, obfuscation of hardware and software, and
defense of anonymity. Instead of hosting one's own proxy, he or she can use a
service known as an 'anonymous remailer' which will mask your email's IP address
for the sender. These services can be identified with a search engine and change
the email addresses of the sender before sending the message to its intended
recipient. And an anonymous remailer can be used in tandem with Tor, which was
designed to be used by people living in harsh regimes as a way to avoid
censorship of popular media and services and to prevent anyone from tracking
what search terms they use. There are several weaknesses with Tor: no control
over the exit nodes, which may be under the control of government or law
enforcement, a user can still be profiled and possibly identified, and Tor is
very slow [due to the additional, robust security precautions]. A very basic
rule is that one has to keep anonymous accounts completely separate from
anything that could relate back to a true identity (and the Tor browser
certainly helps with this). To communicate in secrecy, one will need to create
new email accounts using Tor so that the IP address setting up the account is
not associated with a real identity in any way.

Moving on, there are email services that don't require verification, and if one
does not need to worry about authorities, Skype numbers work well for google
account registration and similar stuff; after using Tor to randomize the IP
address, and after creating a gmail account that has nothing to do with one's
real phone number, google sends the phone number a verification code or a voice
call. An end-user needs to be aware of all the ways that someone can identify
him or her even if undertaking some (but not all) of the precautions described;
an explorer needs to perform due dilligence every time anonymous accountsare
used. As emphasized above, end-to-end encryption is very important.

Reflecting the impressive breadth of this book, Elcomsoft Phone Password Breaker
(EPPB) is discussed as a utility that is intended to enable law enforcement to
access iCloud accounts. Similar to this, iBrute is a password-hacking mechanism
specifically designed for acquiring iCloud credentials. Choosing a hard-to-guess
password will not prevent hacking tools like oclHashcat, which leverages GPUs
for high-speed cracking. Similarly, John the Ripper is an open source password
guessing program; it is able to permute the password letters using rule sets
that are extremely effective. With that said, obfuscation is a powerful factor,
as being one of hundreds of millions of participants in the world-wide online
community, and also the time-intensive nature of cracking well-put-together
passwords.

On this very same note, one also have the option to forego the creation of a
password and automate the process with a digital password manager; he or she can
use a digital locked vault and allow one-click access when needed; password
managers use one master password for access; if the master password is lost then
all passwords are lost. Very similar to password selection, Strong passphrases
of at least twenty characters are the best and it is best to never use the same
password/passphrase for two different accounts; PasswordSafe and KeePass are
open-source password managers that only store

Lese weiter
41 Personen fanden diese Informationen hilfreich
Nützlich
Missbrauch melden
Rezensionen auf Deutsch übersetzen
Jonathan Laboy
5,0 von 5 Sternen Great book to understand your internet fingerprint and more.
Rezension aus den Vereinigten Staaten vom 6. Februar 2023
Verifizierter Kauf
This book helps understand the fingerprints left in every click or connection.
The knowledge that provides about invisibility is excellent. I gave it 5 stars
because it definitely achieved the purpose of the book although it gives more
stories and examples than needed. Recommended for Security Researchers, Hackers
(Blue Team, Red Team, Purple Team), Reporters, Lawyers and even Judges.

Lese weiter
Nützlich
Missbrauch melden
Rezensionen auf Deutsch übersetzen
Shane Dyer
5,0 von 5 Sternen It’s An Art
Rezension aus den Vereinigten Staaten vom 1. Januar 2023
Verifizierter Kauf
I really never put thought of how much information we give out without even the
inking twice about why we are online. This book is a very good book to read
especially if you are a parent with kids that are on the internet. We have been
online for years now versus our children, it would probably take us adults the
rest of our time on earth to try and get what information we can about us, so
let’s get our kids in the habit of not just putting their information online

Lese weiter
Nützlich
Missbrauch melden
Rezensionen auf Deutsch übersetzen
Kevin Jennings
5,0 von 5 Sternen Your potential employer saw your browsing history. You should
have read this book before applying!
Rezension aus den Vereinigten Staaten vom 7. April 2017
Verifizierter Kauf
Where do I begin? I've been a computer geek my entire life. Well, since 1982,
anyway. My dad bought me a Commodore 64 computer back then. I can't hardly
remember a single day that has passed since then that I haven't had a computer
in front of me at some point during the day. Heh, I don't know if that's a good
thing or a bad thing!

Anyway, as a developer and security enthusiast, I've always been interested in
the hacking scene. Back then, when Kevin Mitnick and Kevin Poulson were in the
news because of their "activities", I was glued to the t.v. I wanted to know
everything they did! See, the thing is, I was like them. I craved knowledge. I
wanted to explore that hidden and forbidden world of the byte and the baud that
consisted of inter-connected mainframes and central stations via phone lines. I
dialed into a lot of "boards" (BBSes) and got "forbidden knowledge" of what they
used to call "phreaking" (phone hacking) from text files uploaded by phreakers.
I thought it was just fun and games and never really did anything with the
so-called "power" that I had gleaned from those text files.

Fast forward to today, things are a lot worse, security-wise, with regards to
computer security and threats to your private information. Especially since our
daily lives are now entertwined with this ubiquitous thing called the internet.
Every interaction we perform in our browsers, or internet-enabled applications,
leaves information and trails that can be used against us. Our phones, even our
automobiles, can be used to track us via GPS. Our credit card purchases can be
used to build profiles of us that can be bought and sold to third party
customers. Recently, the current U.S. Republican administration repealed a bill
that would've prevented ISPs from selling your browsing information to private
parties. Nothing you do online is private anymore. Nothing. This isn't like
information that Facebook and Google collect on you. The ISP information is
every single page that you go to in your browser. Think about this, for a
moment: You have a medical condition. It's being treated and no one but your
closest family knows about it. Like almost everyone with your condition, you
browse online about it and have joined online support groups. Your child also
suffers from a condition. They are autistic. Like almost any concerned parent,
you look online to learn more about you child's condition and, too, to share
your experiences and learn from others in similar situations. Recently, you've
applied for a new job through a recruiter. They assure you that you're a perfect
fit based on your resume and your phone screening interview with them. They want
to pass your resume on to the company now, which you give your consent to do so.
Now, the company that will be doing the hiring does something that, in the past,
they couldn't have done: They buy your browsing history from your local ISP.
They don't need your consent for this. Your browsing data is considered the ISPs
property now and can be sold as a commodity that is tied directly to you. Your
prospective employer can now see that, based on your browsing history, that you
have a medical condition and a child with autism. Which, more than likely, means
you will probably miss a lot of work. So, they do what any good business will
do: They pass on your resume. You don't even get a chance to interview with
them. Your resume gets deep-sixed based soley off your browsing history and
nothing else.

Now, with that nightmare scenario fresh in your head, I want you to understand
that when I say this book can help you to avoid such a situation, I really mean
it. From encrypting your email, to setting up a VPN, to using the anonymous Tor
Onion browser and other security methods, this book can help someone that
doesn't know anything about internet security by showing them how to secure
their private information, their browsing habits, their email, and all online
activity. Seriously, in this day and age, it's almost a sin not to be aware of
at least the basic dangers out there in "cyberspace". With this book, you can be
very sure that if you follow the steps provided, you'll be very secure from most
of those threats.

Lese weiter
179 Personen fanden diese Informationen hilfreich
Nützlich
Missbrauch melden
Rezensionen auf Deutsch übersetzen
T
5,0 von 5 Sternen Kevin Mitnick.
Rezension aus den Vereinigten Staaten vom 22. November 2022
Verifizierter Kauf
It's Kevin. Enough said.

Lese weiter
Eine Person fand diese Informationen hilfreich
Nützlich
Missbrauch melden
Rezensionen auf Deutsch übersetzen
amateur biker
4,0 von 5 Sternen Like any book it's a bit dated
Rezension aus den Vereinigten Staaten vom 9. März 2022
Verifizierter Kauf
Published in 2017 tech has changed a bit. Several of the links and
recommendations are stale. I'm still reading. One that they list is ccleaner...
which is now known to have security issues. If one has a bit of tech knowledge
this is an OK book. Just remember to do a little research before running any
link/software/extension. It would be BEST to read the entire book taking notes
before delving into some of the suggestions.

Lese weiter
19 Personen fanden diese Informationen hilfreich
Nützlich
Missbrauch melden
Rezensionen auf Deutsch übersetzen

--------------------------------------------------------------------------------

Alle Rezensionen anzeigen



SPITZENREZENSIONEN AUS ANDEREN LÄNDERN


Alle Rezensionen ins Deutsche übersetzen
Irina
5,0 von 5 Sternen Great read, lots of useful knowledge
Rezension aus dem Vereinigten Königreich vom 2. Februar 2020
Verifizierter Kauf
It's a great book by a great author! Really enjoy reading it. If you want to
become paranoid or want to do some ~innocent things~ without being caught -
definitely recommend it!
I'm trying to learn about offsec to eventually do the course and the exam, and
this book gives me a good sense of what sort of things I should be looking for
as a wanna-be security specialist.

Lese weiter
2 Personen fanden diese Informationen hilfreich
Missbrauch melden
Rezensionen auf Deutsch übersetzen
.rhosts
5,0 von 5 Sternen Protect your privacy!
Rezension aus dem Vereinigten Königreich vom 22. Mai 2017
Verifizierter Kauf
Tips and tricks to minimise your online footprint from the master hacker
himself, Kevin Mitnick. The book is full of information detailing exactly *what*
data can be collected about you, together with *how* you can minimise the amount
collected - perhaps even disappear completely! This book is excellent, as
Kevin's books usually are.

Lese weiter
8 Personen fanden diese Informationen hilfreich
Missbrauch melden
Rezensionen auf Deutsch übersetzen
Coldnight
4,0 von 5 Sternen Well, I thought that I knew it all.
Rezension aus dem Vereinigten Königreich vom 27. Februar 2022
Verifizierter Kauf
If you want to protect yourself from being spied on every second of your life
then do read this book; I thought that I knew all that was to be known but
clearly I didn't, smile. However, is it possible these days to be totally
anonymous - I think not.

Lese weiter
Eine Person fand diese Informationen hilfreich
Missbrauch melden
Rezensionen auf Deutsch übersetzen
Monty
4,0 von 5 Sternen The Art of Invisibility ~ Stay safe online
Rezension aus dem Vereinigten Königreich vom 21. Januar 2022
Verifizierter Kauf
It's good, worth a read especially if you don't know much about internet
security.

Lese weiter
Missbrauch melden
Rezensionen auf Deutsch übersetzen
C.Gallagher
5,0 von 5 Sternen Another great title from Kevin
Rezension aus dem Vereinigten Königreich vom 16. Mai 2017
Verifizierter Kauf
Another great book from Kevin. Some excellent opsec tips are given, depending on
your experience you may find a totally new concept that you never had known
about, or a good guide to brush up on your current opsec.

Lese weiter
3 Personen fanden diese Informationen hilfreich
Missbrauch melden
Rezensionen auf Deutsch übersetzen

--------------------------------------------------------------------------------

Alle Rezensionen anzeigen
























Deine zuletzt angesehenen Artikel und besonderen Empfehlungen
›
Browserverlauf anzeigen oder bearbeiten
Nachdem du Produktseiten oder Suchergebnisse angesehen hast, findest du hier
eine einfache Möglichkeit, diese Seiten wiederzufinden.
Deine zuletzt angesehenen Artikel und besonderen Empfehlungen
›
Browserverlauf anzeigen oder bearbeiten
Nachdem du Produktseiten oder Suchergebnisse angesehen hast, findest du hier
eine einfache Möglichkeit, diese Seiten wiederzufinden.

Zurück zum Seitenanfang
Über Amazon
 * Karriere bei Amazon
 * Blog
 * Über Amazon
 * Investor Relations
 * Amazon Geräte
 * Amazon Science


Geld verdienen mit Amazon
 * Auf Amazon verkaufen
 * Verkaufen bei Amazon Business
 * Deine Apps auf Amazon verkaufen
 * Partnerprogramm
 * Bewerbe deine Produkte
 * Dein Buch mit uns veröffentlichen
 * Hosten eines Amazon Hubs
 * ›Mehr anzeigen


Amazon-Zahlungsarten
 * "Einkaufen mit Punkten"
 * Mein Guthaben aufladen
 * Amazon Währungsumrechner


Wir helfen dir
 * Amazon und COVID-19
 * Mein Konto
 * Meine Bestellungen
 * Versandgebühren und -richtlinien
 * Rückgabe & Ersatz
 * Meine Inhalte und Geräte verwalten
 * Amazon Assistant
 * Hilfe



Deutsch $USD - U.S. Dollar Vereinigte Staaten von Amerika

Amazon Music
Streame Millionen
von Songs Amazon Advertising
Kunden finden, gewinnen
und binden Amazon Drive
Cloud-Speicherplatz
von Amazon 6pm
Schnäppchen erhaschen
von Fashion-Marken AbeBooks
Bücher, Kunst
& Sammelobjekte ACX
Hörbuch-Veröffentlichung
leicht gemacht Verkaufen bei Amazon
Starten eines Verkäuferkontos   Amazon Business
Alles für
Ihr Unternehmen AmazonGlobal
Bestellungen
international versenden Home-Services
Ausgewählte Experten
Zufriedenheitsgarantie Amazon Ignite
Verkaufe dein Original
Digital Educational
Ressourcen Amazon Web Services
Cloud Computing Dienste
von Amazon Audible
Hörbücher
herunterladen Book Depository
Bücher mit kostenfreier
Lieferung weltweit   Box Office Mojo
Film suchen
Box Office Daten ComiXology
Tausende von
Digitale Comics DPReview
Digital
Fotografie Stoff
Nähen, Patchwork
& Stricken Goodreads
Buchrezensionen
& -empfehlungen IMDb
Filme, TV
& Stars IMDbPro
Info Entertainment
Geschäftliches   Kindle Direct Publishing
Dein E-Book
veröffentlichen Prime Video Direct
Videovertrieb
leicht gemacht Shopbop
Designer
Modemarken Woot!
Angebote und
Spaß Zappos
Schuhe &
Bekleidung Ring 
Smart-Home-Sicherheitssysteme Eero WiFi
4K-Videostreaming in jedem Raum     Blink
Intelligente Sicherheit
für jedes Zuhause Neighbors App 
Kriminalitäts- und sicherheitsbezogene Warnungen
in Echtzeit Abonnieren mit Amazon
Entdecken & testen
Abonnementservices PillPack
Pharmazie vereinfacht    

 * Unsere AGB
 * Datenschutzerklärung
 * Deine Auswahl zum Datenschutz bei Anzeigen

© 1996-2023, Amazon.com, Inc. oder Tochtergesellschaften