• $19.99

Publisher Description

Kevin Mitnick, the world’s most wanted computer hacker, managed to hack into some of the country’s most powerful—and seemingly impenetrable—agencies and companies. By conning employees into giving him private information and maneuvering through layers of security, he gained access to data that no one else could.

The suspenseful heart of the book unfolds as Mitnick disappears on a three-year run from the FBI. He creates fake identities, finds jobs at a law firm and hospital, and keeps tabs on his myriad pursuers—all while continuing to hack into computer systems and phone company switches that were considered flawless.

A modern, technology-driven adventure story, Ghost in the Wires is a dramatic account of the joy of outsmarting security programs, the satisfaction of code cracking, and the thrill of unbelievable escape.

GENRE
Biographies & Memoirs
NARRATOR
RP
Ray Porter
LENGTH
14:02
hr min
RELEASED
2011
August 15
PUBLISHER
Blackstone Audio
LANGUAGE
EN
English
SIZE
443.6
MB

Customer Reviews

jeffpalmer ,

Public Service Announcement

Consider this a Public Service Announcement. Do not drive or operate heavy machinery while listening to this.

You'll be entranced, and fully engrossed. I drive approximately 1 hour each direction to/from work, and have started listening to audiobooks on the trek. Twice now, I've caught myself imagining the world in which Kevin and Luis (sp?) exist, and realized I wasn't paying as much attention to the road as I probably should have been.

The authors writing style is intriguing. Possibly even teasing. The narrator is a natural. At first, I was wondering if Kevin Mitnick himself narrated the book. The energy, passion, and desire with which the passages are read, are spot on. The narrator seems to genuinely understand the unix environment, or does an excellent job of faking it while reading.

Additionally, this book does an excellent job of showing that the social aspect of information gathering can be *more* important, than the technical aspects of finding bugs (or configuration errors) and exploiting them. After an intruder has an account, all bets are off. The first step is to teach your users safe computing practices.

Scot98647744 ,

Wow

This was a great time machine just close your eyes and your there. Lots of info and filled in all the gaps, I was wondering about.

Whlplr ,

Fantastic!

Anybody, from a non-technical person looking for a thriller to read to a highly technical person will love this book. Mitnick gives details about his hacks and explains them in lay men's terms, all while telling an awesome story.

Listeners Also Bought