Oracle Consulting Oracle Training Oracle Support Development
Home
Catalog
Oracle Books
SQL Server Books
IT Books
Job Interview Books
eBooks
Rampant Horse Books
911 Series
Pedagogue Books

Oracle Software
image
Write for Rampant
Publish with Rampant
Rampant News
Rampant Authors
Rampant Staff
 Phone
 800-766-1884
Oracle News
Oracle Forum
Oracle Tips
Articles by our Authors
Press Releases
SQL Server Books
image
image

Oracle 11g Books

Oracle tuning

Oracle training

Oracle support

Remote Oracle

STATSPACK Viewer

Privacy Policy

  

 

  Web Stalkers
Protect yourself from Internet Criminals & Psychopaths

Stephen Andert, Donald K. Burleson

Retail Price $27.95 /  £17.95

Key Features About the Authors Table of Contents
Index Reader Comments Errata
     

- Order now and get 30% off!

Only $19.95
  

ISBN 0-9745993-9-5 Library of Congress Number: 2004115996
352 pages - Perfect bind - 9x7  PD 305
Shelving: Current Affairs, Adult Non-Fiction 911 Series # 1


More than ever before, crazy psychopaths, criminals and unsavory stalkers are destroying innocent people's lives. With remarkable ease, Web stalkers can invade your privacy, steal your identity and threaten your safety and well-being.

With advice from practicing psychologists, this book is the accumulated of more than a decade of research and observations and shows you how to protect your anonymity, hide your personal information and protect you safety and reputation.

This indispensable book focuses on the actual techniques used by web stalkers and show how evil and malicious stalkers attack. Best of all, you see the effective prevention and intervention secrets and the methods used to bring these people to justice.

Don't be their next victim.

 
Key Features

* See what stalkers can find out about your credit and court history.

* Understand the techniques used by stalkers to intimidate you.

* Use proven techniques to protect your anonymity on the web.

* How to report the web stalker to police agencies.

About the Authors:

  
Stephen Andert    

Stephen Andert is a database administrator for many years and has been working with Oracle for 5 years. He has been working with various different relational databases for over 12 years. He has been a technical reviewer for several Oracle books from O'Reilly & Associates, authored an article on SQL*Loader tuning and has presented at local and international Oracle user group events. 

Stephen is an Oracle8 and Oracle8i Oracle Certified Professional and is currently serving on the Board of AZORA, the Arizona Oracle User Group (www.azora.org).

 

 


Donald Burleson

Donald K. Burleson is one of the world’s top Oracle Database experts with more than 25 years of full-time DBA experience.  He specializes in creating database architectures for very large online databases and he has worked with some of the world’s most powerful and complex systems.  

A former Adjunct Professor, Don Burleson has written more than 30 books, published more than 100 articles in National Magazines, and serves as Editor-in-Chief of Rampant TechPress. Don is a popular lecturer and teacher and is a frequent speaker at Oracle OpenWorld and other international database conferences.

 

Free Oracle Tips

HTML Text

Table of Contents: 

Chapter 1 - The Illusion of Anonymity
 Privacy on the Web?
Background Investigations
Real-world case: The Shaeffer Murder
Disclosure of Private Information
Disclosure by Proxy
Web Site Responsibility for Data Privacy
Finding Criminal History
A Wealth of Civil Information
Sources of Personal Information
All about Anyone: Just a Mouse-Click Away
Finding Private Medical Information
Tracing E-mail
Using WHOIS & FINGER
Usenet Searches
Government Tools to Reveal Personal Details
Corporate Anti-Privacy Tools
Protecting Web Privacy
Sanitizing an Online Profile
The Search for Self
Analyze Passwords
Forget Logins
Safely Purchasing Online
Comparison Shopping
All about Cookies
Privacy Enhancements
Vulnerability Analysis
Methods to Maintain Privacy
Dumping a Computer
 
Chapter 2 - Understanding Web Personalities
Introduction
The Problem of Text-Only Communication
Safety in a Text-only World
The World’s First Emoticon
Web Stalkers
Intelligence and Formal Education
Assessing IQ on the Web
Assessing Personality on the Web
The Wannabe
The Rottweiler
The Baby
The Luddite
The Scientist
The Charger
The Empath
The Zealot
Personality Conflicts on the Web
 
Chapter 3 - Web Weirdos
The Land of Fruits and Nuts
Social Incompetents and Neurotics
The Pseudo Stalker
Types of Web Weirdos
The Narcissist
The Doper
The Delusional
The Bi-Polar
Deviants on the Web
Sexual Deviants on the Web
Web Addicts
Web Gambling Addicts
Web Pornography Addicts
Looking for Love on the web
Ensuring Safety from Cyber-nuts
 
Chapter 4 - Web Stalkers
Introduction
What Is Web Stalking?
Technology Enables Web Stalking
The Credible Threat Doctrine
Real World Case: Web Harassment
Arresting the Web Stalker
After Arresting the Web Stalker
Types of Web Stalkers
The Insane Among the Sane
Obsessive Personalities and Web Stalking
Love Obsession Stalking
Erotomaniacs and Web Stalking
Vengeance and Terrorism Stalking
Predatory Web Stalking
Legal Issues on Web Stalking
Recognizing a Stalker
Demographics of Web Stalkers
The Scope of Web Stalking
The Motivations of Web Stalkers
The Web Stalking Progression
E-mail Harassment and Web Stalking
What an Individual Can Do
Preventing Web Stalking
Do Not Threaten the Web Stalker
Always Stay Anonymous on the Web
Do Not Reveal Personal Demographics
Do Not Accidentally Reveal Personal Identity
Report the Web Stalker
 
Chapter 5 - All About Cybercrime
 
Introduction
Internet Scams
Real-World Case: Nigerian Scam
Hackers on the Web
Outside-In Hacker Attacks
Web Privacy Legislation
The Problem of the Wireless Web
Cyber Law and Harassment
Threats over the Web
Internet Harassment
Intentional Infliction of Emotional Distress
Unsolicited E-mail Crimes
Libel and Defamation on the Web
Libel and the Internet
Malice and Libel
Website Liability for Cyber-Libel
The Judgment-Proof Libeler
Challenging the Defamers
Jurisdiction and Internet Law
Web Stalkers
Significant Contact and Personal Jurisdiction
Fairness and Substantial Justice with Jurisdiction
Real-World Case: Web Deception
Real-World Case: Cyber-libel and Tortuous Interference
Invasion of Privacy
Identity Crimes
Tortuous Interference
Web Conspiracies
Criminal Conspiracies on the Web
Conspiracies Against One’s Civil Rights
Illegal Websites and Cybercrime
Website Laws
Obscenity on the Web
Child Pornography
Sexual Addiction and the Internet
Cyber Attacks and Terrorism
Preventing Cyber attacks
Reporting Web Crimes to Law Enforcement
Victims’ Rights and Cybercrimes
Local, Regional or International Crimes
IC3 and Cybercrime
Enforcement of Internet Crime Statutes
Penalties for Cyber Criminals
Cybercrooks and Security Assessment Tools
 

Chapter 6 - Cyber Theft
 Introduction
Web Page Hijacking
Copyrights and Cyberspace
Music and the Web
Software Licensing and the Internet
E-Books
Plagiarism and the Web Revolution
The Semantics of Plagiarism
The Epidemic of Web Content Theft
Detecting Plagiarism
A Question of Honor
Punishment for Plagiarists: Real World Case
Laws Against Plagiarism
Cybersquatting
Deceptive Domain Names: Real World Case -
 
Chapter 7 - Internet Scams
 Deception at Work
The Horrors of Internet Fraud
Inside the World of the Web Scammer
All about eCommerce
The Risks of eCommerce
The Upside of eCommerce
Intelligent eCommerce
All about eBay
Shilling Scams
The Cut-and-run scam
Buyer fraud
Real-world case: Online sales fraud
Web Charity Scams
Evaluating Charities on the Web
The Auto Donation scam
All about Online Banking
Real-world case: PayPal Scam
Web Sales Scams
The Nigerian 419 Scams
Real-World case: The Nigerian Scam Murder
Get Rich Quick Scams
Help Me Steal Scams
The Overpayment Scam
Phishing Scams
Mouse Trapping
Hoaxes
Real World Case: Internet Consumer Scams
The DBLearning Site Scam
Web Resources for Scam Victims
Using the Wayback Machine
 
Chpater 8 - Identity Theft
Identity Theft
Physical Identity Theft
Lost ID Cards
Dumpster Diving
Web Stalkers
Social Engineering Techniques for Identity Theft
Phony ATMs and Identity Theft
Computer-Assisted Identity Theft
Virtual Identity Theft
Network Sniffing Tools
E-mail Scams for Identity Theft
Web Searches for Identity Theft
Fake Websites and Identity Theft
Phishing for Identity
War-Driving and Identity Theft
Preventing Identity Theft
Recognizing Identity Theft
Recovering a Stolen Identity
Legal Protection Against Identity Theft
 
Chapter 9 - Self Protection on the Web
Online Security Measures
The Appeal of Wireless
Risks of Wireless Communications
Encryption
Rewards of Wireless Communications
What is a Firewall?
Types of Firewalls
Hardware Firewalls
Software Firewalls
Recommendations for Firewall Safety
 
Chapter 10 - Protecting Children on the Web
Real-World Case - The Death of Christina
Danger of Online Relationships
The Dangers of Chat Rooms
Games Children Play
Psychological Effects of Computer Games
Appropriate Use of Search Engines
Protecting Kids with Monitoring and Filtering Software
Using ISP Filters
Knowing When a Child Is at Risk
Conclusion
 
Chapter 11 - Internet Spies
Spying and Marketing, Who is in Their Sights
Discovering the Secrets of Spyware
The Downside of Spyware
The Spyware in the Middle
Detecting Spyware
Free Can be Better
Removing Spyware
Spyware and the Law
Privacy Breeches on the PC
Discovering the Secrets of Adware
The Downside of Adware
Protection from Web Spies
 
Chapter 12 - Virus Attacks  
Exposure to Viruses
What Is a Virus?
When Worms Attack
When the Trojan Horse Rolls Through the Gate
Viruses and Personal Safety
Viruses: Who’s Behind Them
Virus Prevention Software
Software Best Practices
Remedies for Virus Attacks
 
Chapter 13 - Spam, Spam, Spam, Spam 
Spam is in the Eye of the Beholder
Why Does Spam Exist?
Fighting Spam
Spamboy
Reasons to Ignore Spam
Safely Peeking at Spam
Tools to Avoid Spam
An Alternative View of Spammers
Learning More about Spam
A Case Study in Spam
 
About Stephen Andert
About Don Burleson

Index Topics:
A
ACPA
Active Server Pages
ADA
Ad-Aware
Adware
aggravated identity theft
Agoraphobia
American Psychological Association
Americans with Disabilities Act
Anonymizer Inc.
Anticybersquatting Consumer Protection Act
antivirus program
Archie Bunkers
Artificial Intelligence
Ask Jeeves
B
background investigations
Bayesian Statistics
BBB Wise Giving Alliance
Bestiality
Better Business Bureau
blogs
Brick-and-Mortar
brute-force attack
Buffer Overflow Attacks
bugs
bulk e-mail
buyer fraud
C
CAN-SPAM Act of
Carl Rogers
Carnivore
Catatonic Schizophrenia
caveat emptor
Chamber of Commerce
Charities
charity fraud
Chat rooms
Child Molesters
child pornography
Civil Rights
Civil Rights Act
Code Red worm
Comet Cursor
Communications Decency Act
Computer Crimes Unit
Computer Fraud and Abuse Act
computer games
Conspiracies
Consumer Reports
Controlling the Assault of Non-Solicited Pornography and Marketing Act of
cookie
Cookie Monster
Coolminer
credible threat
credit card cramming
credit card fraud
credit fixer
credit reports
cut-and-run scam
Cyber Patrol
Cyber Snoop
Cybercrime
Cyberlaw
cyber-libel
CyberSitter
cybersquatting
Cyberstalking
cyber-terrorism
D
demographics
Denial of Service Attack
dictionary attack
Digital Millennium Copyright Act
Dinks
Disclosure of embarrassing facts
Do Not Call
domestic violence
DragonWare Suite
Dumpster diving
E
e-books
e-Commerce
Electronic books
Electronic Privacy Information Center
Emoticon
emoticons
Emotional Support Animals
encrypted
Encryption
EPIC
Equifax
e-tailers
Experian
F
Fair Credit Reporting Act
fake web site
false light
False publicity
FBI
FDIC
Federal Bureau of Investigation
Federal Deposit Insurance Corporation
Fighting Words
File Transfer Protocol
FINGER
firewalls
First Amendment
forum shopping
Fraud
freeware
FTP
G
gender-blurring
Genealogy
GLBA
Google
Google Groups
Gramm Leach Bliley Act
 
H
Harassment
Health Insurance Portability and Accountability Act of
Hebephrenic Schizophrenia
HIPAA
honeypot
Honor Code
https
I
IANA
IC
ICDRI
identity theft
Identity Theft Penalty Enhancement Act of
Identity Theft Protector™
ILOVEYOU
impersonation
Information Technology Act
Injection Threats
Instant Messenger
Integrity Online
Intentional Infliction of Emotional Distress
International Center for Disability Resources on the Internet
Internet Addiction
Internet Assigned Numbers Authority
Internet auction fraud
Internet Crime Complaint Center
Internet dating
Internet Fraud Complaint Center
Internet impersonation
Internet pornography
Internet search engines
Internet Service Providers
Internet Spyware Prevention Act
InterNIC
Interpol
Intrusion on solitude
IP address
IQ
I-SPY
L
Lanham Act
libel
Limited Purpose Public Figure
love-obsessed stalker
M
MailBlocks
Malicious Intent
Man-in-the Middle Attacks
Massachusetts Institute of Technology
Matador
McAfee Inc.
Medical records
Melissa virus
MindGuard
minimum contacts
Minnesota Multiphasic Personality Inventory
MIT
MMPI
modified attack
monitoring software
MOSAIC Threat Assessment Systems
mouse trap
multilevel marketing
Mutilators
N
name servers
National Center for Victims of Crime
National Credit Union Association
National Credit Union Share Insurance Fund
National Federation for the Blind
National Institute of Justice
National Violence Against Women Survey
NCUA
NCUSIF
NCVC
Necrophiliacs
need creation
Net Nanny
netizen
Network sniffing
Network Solutions
newsgroups
NFB
Nigerian scam
No Password Disabling
Norton Internet Security
O
Obscenity
Obsessive Compulsive
on-line banking
opt-in spam
P
Packeteer
pagejacker
pagejacking
Paranoid Schizophrenia
password
Pathological Internet Usage
pattern of behavior
PAXWAY
PDA
pedophile
Personal Digital Assistant
phishing
PHP Hypertext Protocol
PIU
plagiarism
Point-Of-Sale
political terror stalker
pornography
POS
predatory stalker
Proland Software
Protection of Children from Sexual Predators Act of
psychological abuse
public records
pyramid schemes
 
Q
Qurb
R
rebounders
Reckless Disregard for Truth
Recording Industry Association of America
RIAA
Riverdeep Interactive Learning
Root Kit Attacks
S
Safe Access
Sam Spade
Sarbanes Oxley Act
Scambaiter
server logs
Service Set IDentifier
shill bidders
shill bidding
Shilling
Sigmund Freud
SIIA
simple obsession
Slammer worm
slander
smiley’s
social engineering
Social Security Death Index
social security number
Software & Information Industry Association
software licenses
Sophos Inc
SOX
spam
Spam Arrest
spam filter
SpamBayes
spamboy
SpamEater
SpamInspector
Spy Sweeper
Spybot Search & Destroy
spyware
SSDI
SSID
stalking
Stalking in America
Stalking Resource Center
stranger-danger
Symantic
T
TCP/IP
tcpdump
terror stalker
The Baby
The Charger
The Empath
The Luddite
The Rottweiler
The Wannabe
The Zealot
Tipping the User ID
Tortuous interference
TransUnion
Trend Micro Inc.
Trojan Horse
Trojan Horse Access
troll
U
UCE
Undifferentiated Schizophrenia
Unified Audit Reporting Interface
Un-requested Commercial E-Mail
Urban Princesses
Usenet
V
veiled threat
vengeance stalking
Virus Attacks
Voter registration
W
WM/Assilem.A
war dialing
war-driving
Wayback Machine
Web cramming
Weblogs
whois
WHOIS
Windows Update
wireless network
work-at-home scams
World Wide Scam
worm
Y
Yuppies

Reviews:
"There is an appointed time for everything. And there is a time.", December 6, 2005
 

"Web Stalkers" is a true revelation for anyone seeking to understand the phenomena, detailing how any malefactor can become empowered by conducting false light defamation campaigns and web conspiracies through online forums, blogs and more.

Recently a group of fanatics were targeting individuals whom they felt deserved to be vanquished online and so they set out with invasions of privacy, web conspiracies and false light defamation campaigns disguised as free speech and parody in interactive chat rooms and forums. It took some time but after years of deeply rooted contempt, false light defamation and libel they accomplished their goal.

For the first time the stratagem behind this kind of treachery is exposed. And although justice may never be served, it is all the more relevant that pause be given to recognize how embarrassingly simple it is to seduce the average person into conspiring, committing and justifying unconscionable, shameful and criminal acts.

As much as "Web Stalkers" is vindication for the victims emerging from this new frontier in communications and a guide for the future and prevention, it also serves a double role as a deterrent for would be web conspirators and stalkers who may not be aware that they are also would be criminals as well. Unfortunately for far too many normally average everyday people it is too late... The anonymity and the immediacy of this new form of communication has brought out the worst in them.

At least with a book like "Web Stalkers" there is some closure and vindication for those who have been searching for this information for years. After reading it, the criminal wrongdoing that has always been suspect of being present online but never really clearly defined, is finally revealed. There is no second-guessing any of it anymore.

As for the new age of criminals, "There is an appointed time for everything. And there is a time."

useful warnings, August 11, 2005
 

Andert gives a good, understandable description of the dangers on the Internet. As the Web becomes more heavily used, it attracts attackers or predators, who often look for novice, unwary users. The book explains how people often let down their guards when conversing with strangers on the net. Where this communication might be via email, Instant Messaging or other modalities. It has been observed that the anonymous, remote nature leads some people to confide things that they would not to a stranger they met in person.

Anyway, Andert offers practical suggestions to limit your exposure through such inadvertant actions. You are also warned to beware of giving up too much personal data on some purported web site, or in a response to an email. The data might be sufficient, possibly in conjunction with other facts that could be amassed about you, for someone to forge your electronic identity.

Perhaps, though, Andert could have omitted the "911" from the title. Very US-centric. Other countries don't use this as the emergency phone number. It detracts from the global appeal of this book.

 


Errata and Enhancements

 

Hit Counter

   

 Copyright © 1996 -2016 by Burleson. All rights reserved.


Oracle® is the registered trademark of Oracle Corporation. SQL Server® is the registered trademark of Microsoft Corporation. 
Many of the designations used by computer vendors to distinguish their products are claimed as Trademarks