Worm: The First Digital World War (English Edition) et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus
3 neufs partir de EUR 27,01
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir cette image

Worm: The First Digital World War (Anglais) CD audio – Livre audio, 16 octobre 2012

Voir les 16 formats et éditions Masquer les autres formats et éditions
Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
CD audio, Livre audio, 16 octobre 2012
EUR 27,01

Descriptions du produit

Book by Bowden Mark

Détails sur le produit

En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre (En savoir plus)
Parcourir et rechercher une autre édition de ce livre.
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait
Rechercher dans ce livre:

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 95 commentaires
120 internautes sur 120 ont trouvé ce commentaire utile 
Should interest newbies and experts alike 28 septembre 2011
Par Chris Lee Mullins - Publié sur Amazon.com
Format: Relié
One of the greatest things about airport bookstores - they often ignore sale dates. I purchased Worm a few days ago without realizing it wasn't supposed to be released yet. Which is good, because it made that flight from Denver to Baltimore tolerable.

First things first. If you are a network newbie, you will be coddled by this book. You don't need to have your MCSE or CISSP to read "Worm". Bowden does a good job of breaking down salient data - what is TCPIP, what is RPC - and creating explanations that make sense. Don't know why Port 445 is so special? Wonder why Windows is so often the target of malware around the world? (the technical explanation, not the political answer) You will after reading this book. It won't win you any medals at the next Cisco shareholders meeting or net you a job in IT, but at least you'll know why Patch Tuesday is important and why malware isn't just a problem with code - it's a social engineering problem, too.

The next best thing about this book is how much it stresses that the Internet is still in it's adolescence. It's a hodgepodge of ancient protocols and new-fangled protocols shoehorned into communicating with one another, and that's a fragile animal. you'll wonder why it doesn't go down more often.

"Worm" is entertaining and informative. Personally, I think it's too short. You'll get a quick bio about a particular researcher, follow them through some problem solving and then, inexplicably, drop them entirely while picking up with another researcher. I think the personalities involved are as important as the science. But those quibbles are trivial.
16 internautes sur 16 ont trouvé ce commentaire utile 
The true story of how hackers almost brought down the Internet -- and still could 5 octobre 2011
Par Mal Warwick - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
It's out there. Waiting. Chances are, you've never heard of it. Nobody knows who controls it, or why. No one knows what it will do. But its destructive capacity is terrifying.

Welcome to the world of cyberwar! And, no, this is NOT science fiction.

"It" is the Conficker Worm, an arcane name (an insider's joke) for the most powerful "malware" -- malicious software -- yet encountered on the Internet. First detected in November 2008, Conficker is a devilishly clever bit of programming that took advantage of a vulnerability in the Windows operating system. Microsoft immediately moved to "patch" the vulnerability, but therein lay the problem: Windows is the most-pirated software of all, so hundreds of milliions of computers were running versions of Windows without the patch -- all of them vulnerable to Conficker (and to hundreds of other malicious programs whose authors now knew how to embed their work in Windows).

Mark Bowden, the very capable author of Blackhawk Down, tells the story in Worm of a group that included many of the world's top computer security experts who privately came together early in 2009 to combat Conficker. At first, they were confined exclusively to the private sector, and their work was informal. Eventually, they managed to gain the attention of senior government officials and -- slowly, reluctantly -- obtain limited official support from the U.S. and Chinese governments. The group, known among themselves as the Conficker Cabal, even managed to get onto the White House agenda late in the game, as Conficker was upgraded once and then again - because the worm represented nothing less than an existential threat to the Internet itself.

I did say the potential was terrifying, didn't I?

Bowden is a superb journalist and a capable writer, as Blackhawk Down made clear. However, Delta Force soldiers pinned down in a firefight in Mogadishu make for great copy. Geeks exchanging emails about technical material don't. Bowden does an excellent job explaining in plain English the nature of Conficker and how it operates, and he does his best to sketch the members of the Cabal in three diimensions, but the result is hardly a page-turner. Still, Worm is a very important book, because it brings to light just how vulnerable is the infrastructure of the world we live in.

And, oh yes, the Cabal managed to fight Conficker to something of a standstill. But they couldn't destroy it, and to date they've never found the hackers who created it. Conficker is still out there.

30 internautes sur 37 ont trouvé ce commentaire utile 
This Will Really Get You Thinking About Computer Security! 30 septembre 2011
Par Loyd E. Eskildson - Publié sur Amazon.com
Format: Relié
Author Bowden does a great job of summarizing malware in general, and the Conficker worm in particular. He begins by explaining that there are three types of malware - Trojans, viruses, and worms. A Trojan is a piece of software that masquerades as one thing to get inside a computer, then attacking. A virus attacks its host computer after entering its operating system - it depends on the operator opening an e-mail attachment or clicking on a lilnk. A worm works like a virus, but doesn't attack once it enters - it's primarily designed to spread, then wait for instructions delivered later.

Some computer malware is intended to damage or destroy one's computer, and victims quickly realize the problem. A computer worm, by contrast, is a packet of computer code designed to infiltrate a computer without attracting attention and then scans for others to invade, spreading exponentially. The Conficker computer worm emerged in November, 2008 and infiltrated 1.5 million of the world's computers in the first month. By January, 2009 it had spread to at least 8 million computers, exploiting flaws in Microsoft Windows that it closed after entering. They constantly check with its unknown creaters at their unknown location for directions. Frustrated cyber-security experts at Microsoft, Symantec, SRI International, etc. have merged forces to try and defeat it - so far they've been unsuccessful. Bowden's 'Worm' tells how hackers, entrepreneurs, and computer security experts are trying to defend the Internet from Conficker - what the author calls 'the first digital world war.'

In the 'good old days,' infected computers slowed down because user commands had to compete with viral invaders for processing power. Computers would slow down, and programs would freeze. Worm-linked computers ('botnets') can be used to steal information, assist fraudulent schemes, or launch denial-of-service attacks. So far, Conficker (35 kilobytes of code - less than a 2,000-word document) has done none of those things, and been activated only once to perform a short, simple spamming operation that sold a fake anti-spyware program for two weeks, then stopped.

The Microsoft operating system has over 65,000 ports designed to transmit and receive certain kinds of data. Conficker exploited Port 445, which Microsoft had tried to repair 10/23/2008. Firewalls are security programs that guard these ports, but Port 445 was vulnerable even when protected by a firewall if both print-sharing and file-sharing were enabled. However, many fail to apply new patches promptly, and others run pirated Windows systems which Microsoft doesn't update. Thus, reverse-engineering patches allows attackers to create targeted worms.

Experts trying to disable Conficker have learned that it tries to prevent communication with security providers, it avoided Ukrainian IP addresses, and disabled system restore points that allowed users to reset infected machines to a date prior to infection. To prevent IT-defenders from predicting how the infected computer would try to communicate home by setting the computer's clock ahead and then watching what happened (it generates 250 random-codes/day for each of 8 domains - eg. .com, .edu, .uk, etc.). Conficker-infected computers use system clocks (eg. Google, Yahoo) that can't be set ahead. The 'bad guys' only have to pay $10 to register one address, and wait for botnetted computers to make contact. Unfortunately for computer defenders, that communication used coding techniques employed in the latest standard, MD-6, revised.

Defenders, however, were flooded by 50,000 domain names/day needing investigation. Each requires checking to ensure it belongs to a good guy, and their spread out all over the world. Worse yet, a newer version introduced peer-to-peer communication, meaning that all infected computers no longer needed to call home for instructions, and defenders no longer have any way of telling how many computers are infected.

Another insidious Conficker attribute is that it could also be spread by USB drives - thus, systems not connected to the Internet were also vulnerable.

Most of the world's 'best' malware comes from Eastern Europe, drawing on high levels of technical expertise and organized criminal gangs. That's a very big area within which to search.
17 internautes sur 21 ont trouvé ce commentaire utile 
Disappointed 21 octobre 2011
Par EinLA - Publié sur Amazon.com
Format: Relié
I heard an interview with the author on NPR recently and thought that this would be an interesting read about a subject I am quite ignorant about. At first I enjoyed the narrative drive, it felt like a thriller - and I didn't mind the asides regarding the different personalities being assembled along with some technical details (which were mostly helpful for me). Unfortunately by about page 100 or so, the book was pretty much all asides and the narrative drive - the whodunit aspect - was gone. I found myself bored. Read another 10 or 15 pages or so, and still felt bored. The book felt repetitive and padded. I don't care enough, at this point, to finish it. In terms of style, all of the "X-Men" references and good - "white hat" and evil "black hat" stuff was really belabored, on and on, both mannered and goofy. The menace of the "malefactors" seemed cartoonish. The author discusses several previous malware attacks and reports that they cost millions to billions of dollars, but he doesn't really explain how - lost productivity? Because, as he explains, the computers aren't "broken" per se (i.e they are machines but without any moving parts), there is no destruction of the internet, so these numbers seem vague: "Still, Blaster caused an estimated $500 million in damages to computer networks worldwide." Really?? I don't get it.

I was hoping for something more interesting - but the whole thing was already in the NPR interview! The rest is padding.
5 internautes sur 5 ont trouvé ce commentaire utile 
The Fragile Internet 10 octobre 2011
Par Sheryl L. Battin - Publié sur Amazon.com
Format: Relié Achat vérifié
We have been one command away from catastrophe for a long time now ~ Paul Vixie as quoted in the book.

A worm is a small packet of information, rather like a virus in a human although not like a virus as we use that term in computers, that borrows deep inside your Windows operating system and waits for instructions from somewhere outside of your computer. It isn't there in particular to take out your computer, although it can, but to unite with others to act together to do something like take down the electric grid in the USA or even the internet if that is the intention. You don't have to open an email or go to some website to get it. If you are on the internet, and use Windows, it can find you. Oh yes, it can come through your USB port. It is a bit more complicated than that but that's the basics.

Worm tells the story of the Conficker Worm From the time it first showed its face in what is known as a honeynet through its updating and where it stands today. A honeynet looks like a bunch of computers on the internet but is really just one computer that is watching what is picked up. If you have lots of computers, you are more likely to pick up a virus, worm or trojan. There are people out there who are monitering the internet, some of whom are even being paid to do it. (I have to admit that my cynicism took a bit of a blow learning that there are people out there protecting the internet for free)

What makes this interesting to me, is that it introduces us to the "good" guys in this war. The old idea of a young male hacking into computers for fun? Well, some of those guys grew up to be the White Hats as they refer to themselves. And they do all seem to be men. They find some of the same challenge that had them breaking into computers in pitting their intelligence against the Black Hats who are every bit as intelligent as themselves.

Someone in a review complained that the ending is anticlimatic. Well yes, the worm is still out there. It hasn't done anything except send out spam for a very short time for a fake antivirus program, perhaps to show what it could do if it wanted to. But I think it is a glimpse into the near future. Maybe this worm is so well watched that it will never really do anything but what about other worms? Recently a worm disrupted uranium production in Iran. There are countries that would prefer that Iran not have the bomb. Using the word 'war' in the title probably doesn't help either. Sadly, a war without bombs and dust and places that can be watched on TV doesn't hold many people's attention.

Another reviewer complained about the extensive explainations. I'm a woman in her 60s, about as far away from what people think of when they hear geek. I understood this book. (disclosure: I read Martin Gardner so there is some geek in me)

I found the book interesting. I recommend it.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?