28.05.2023 Views

The-art-of-invisibility-_-the-world’s-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-Bi

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter Thirteen: Things Your Boss Doesn’t Want You to Know

1.

http://www.wsj.com/articles/SB10001424052702303672404579151440

488919138.

2. http://theweek.com/articles/564263/rise-workplace-spyying.

3. https://olin.wustl.edu/docs/Facultyy/Pierce_Cleaning_House.pdf.

4. http://harpers.org/archive/2015/03/the-spyy-who-fired-me/.

5. https://room362.com/post/2016/snagging-creds-from-locked-machines/.

6. Normallyy document metadata is hidden from view. You can see the

metadata included with yyour document byy clicking File>Info, then

viewing the properties on the right side of the window.

7. If yyou use Document Inspector, first make a copyy of yyour document,

because changes made cannot be undone. In the copyy of yyour original

document, click the “File” tab, then click “Info.” Under “Prepare for

Sharing,” click “Check for Issues,” then click “Inspect Document.” In

the Document Inspector dialog box, select the check boxes for the

content that yyou want to be inspected. Click “Inspect.” Review the

results of the inspection in the Document Inspector dialog box. Click

“Remove All” next to the inspection results for the tyypes of hidden

content that yyou want to remove from yyour document.

8. http://www.infosecurityy-magazine.com/news/printer-related-securityybreaches-affect-63-of/.

9. http://www.wired.com/2014/08/gyyroscope-listening-hack/.

10. http://ossmann.blogspot.com/2013/01/funtenna.html.

11. http://cs229.stanford.edu/proj2013/Chavez-ReconstructingNon-

IntrusivelyyCollectedKeyystrokeDataUsingCellphoneSensors.pdf.

12. http://www.cc.gatech.edu/~trayynor/papers/trayynor-ccs11.pdf.

13. http://samyy.pl/keyysweeper/.

14. http://www.wired.com/2015/10/stingrayy-government-spyy-tools-canrecord-calls-new-documents-confirm/.

15. http://phyys.org/news/2013-07-femtocell-hackers-isec-smartphonecontent.html.

16. http://arstechnica.com/information-technologyy/2015/04/this-machine-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!