Internet Ghost: Media Comments on the Autobiography of mitnick, the World's Number One Hacker.

Kevin Mitnick, because of his legendary experience, has long been famous in the world. It is no exaggeration to say that his story has influenced several generations and made more people understand and join the world of "black and white" offensive and defensive confrontation on the Internet. His proud stunt "social engineering" has aroused widespread concern, and there are even many admirers. They are addicted to "social engineering" and despise traditional technology research, so they are "technical uselessness". In fact, this is a misinterpretation of Kevin Mitnick. In his autobiography Ghost Online, you will find that he is obsessed with traditional technology and knows all kinds of operating systems and network structures like the back of his hand. Here you will see the truly neglected side of mitnick.

-Yu Chuang Senior Security Researcher Super Black.

What is a hacker? What is hacker spirit? No, no, those greedy people who hack your website and plant viruses are not real hackers. Look at the book Ghost Online, the autobiography of the world's number one hacker (to be exact, the number one hacker who has been caught). This book is full of surprises and fun. Find the answer yourself.

-Ma Jie, CEO of Safety Bao

This book is simply a vivid autobiography of the Monkey King. With skillful social engineering means, rich Trojan tools, strange decoding skills, strong curiosity and rare adventurous spirit, the Monkey King has made great achievements in the virtual world. The hero, Monkey King mitnick, walks in and out of the confidential computer systems of many world-class companies at will, as if there were really seventy-two changes, walking around in clouds. He hacked into the information systems of powerful institutions such as the FBI, and managed to escape by "shrinking the land", which made the FBI lose face in front of his "three life-saving hairs". He has a keen eye and seems to be able to see through all the passwords. Even in the hands of the Tathagata, the American government, he spilled a few bubbles of urine, which made many gods feel at a loss. Finally, God moved the artifact of "Fa", supplemented by exaggerated loss estimation, and put this Po Hou at the foot of Wuzhishan, which made him suffer from five years in prison; Moreover, after he was released from prison, he was ordered to escort Tang Priest to learn from the West, and the publication of his autobiography was banned for ten years, which made him go through difficulties and obstacles. Now, this unruly thief has finally made a positive result, turned over a new leaf and became a Buddha. He is exerting the power of his golden cudgel, and with his iron body, he is tapping potential loopholes for various information systems for the benefit of mankind!

—— Yang Yixian, director of the Information Security Center of Beijing University of Posts and Telecommunications and head of the leading team.

This book introduces the legendary experience of Kevin Mitnick, the world's top hacker. With superb technology, he used social engineering, Trojan horse and other knowledge to invade the computer systems of many large companies and even the US government. As the title of the book says, he is unstoppable like a ghost, passing through the wall. Technology is innocent, but it is the people who abuse it who are guilty. Having done so many illegal things, Kevin Mitnick has not escaped the punishment of the law. He re-examined himself and finally got on the right track, using his technical advantages to explain information security and give lectures to solve doubts, and completed the transformation from network cowboy to network preacher.

Thanks to the translation of Zhuge Jianwei and others, more people know about mitnick and a real hacker story.

—— Xu Yunfeng, Dean of Network Security College of Chinese People's Public Security University.

The legendary story of mitnick can be summarized by these labels: curiosity, exploration, ability, freedom, fraud, confrontation, evasion, punishment, responsibility and rebirth. Online ghost is more than just a wonderful story. We can know all kinds of retarded loopholes in the early telephone and network systems, see all kinds of problems in a highly trusted society, get a glimpse of the technical means and action ability of government agencies, and finally unify the conflicts between thinking ability and responsibility, interests and morality, so as to truly feel the double-edged sword characteristics of technology. The story is simple and interesting to read, but accurate and easy to understand to translate. The most hateful thing is that the author and translator have prepared more than 100 puzzles, which makes me want to play all night after reading the book at one breath!

—— Xiao Zihang, Senior Research Fellow of An Tian Laboratory

When I first learned technology, Kevin's story subverted my way of thinking. After that, I will definitely re-examine all technical research from Kevin's point of view.

Please don't let me write a book review of Ghost on the Internet. You can't imagine my passion for my idol Kevin Mitnick. It is difficult for me to write an objective content review calmly.

Cyber Ghost is the best translated book I have ever seen.

—— Zhou Tuo, Alibaba's security technology expert (the prodigal son).

I like to know the experience of the awesome person I admire, but this experience must have his thinking, because I will feel it in his thinking, which is very cool. This is the autobiography of the number one hacker. Mitnick is a legend. I read his autobiography greedily, entered his mind and thought about my current hacking skills. I think he and I have reached a tacit understanding in thinking. I am deeply attracted by this autobiography, thanks to mitnick and the translator.

-Cosine, the head of security research in Yu Chuang, and the author of The Secret of Web Front-end Hacking Technology.

Solid professional skills, fluent language translation and respectable work enthusiasm are three essential elements of an excellent translation, and Zhuge Jianwei has all these elements, so this is an excellent translation.

—— Yvonne Wang, CEO of Beijing Chenfeng Technology Co., Ltd., author of "0day Security: Software Vulnerability Analysis Technology".

This book not only restores all kinds of social engineering skills and phreak technology in 1980s, but also tells the story of Kevin Mitnick's life and escape in detail, including some famous hacker attacks in that year. At the same time, the beginning of each chapter provides a ciphertext for readers to crack, which also adds a bright spot to this book. If you are curious about social engineering, hackers or Kevin himself, I believe this book will not let you down!

—— riusksk (Brother Quan), Tencent Security Emergency Response Center

Mitnick, many people are interested in hackers by reading his legend and enter this hall. Ghost Online shows mitnick's legendary life well, attracting more readers from China to interpret the mysterious hacker group, and readers can also learn the omnipotent skill of social engineering from it.

—— instruder, member of Hanhai source code audit laboratory.