Troy Powell

20%
Flag icon
We all know how this story ends. Things changed. More specifically, single-user personal computers with no security started being connected to the Internet, and the network designers assumed that these computers had the same level of multiuser security that the old mainframes did. Then, everything about use of the Internet changed. Its speed changed. Its scale changed. Its scope changed. Its centrality changed. Hacks that weren’t even worth thinking about back then suddenly became critical. The threat model changed. And that meant any cost-benefit analysis changed.
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back
Rate this book
Clear rating
Open Preview