How Computers Work – Free E-book


This is a tutorial web book. All 152 pages of the large paperback book with 96 diagrams are on 38 web pages here.

Even if you know nothing about electronics, you have come to the right place.

If you are wondering how microprocessors work, you have come to the right place. A microprocessor is a small processor.

How Computers Work

If you already know something about electronics, don’t be put off by the fact that the book starts out very simple and uses relays instead of transistors. You will get through the first chapter quickly. See web page 24, below, for just how complex it gets.

If you have a very fast connection (DSL or cable modem), then you can click the following link to see an easier to read (PDF) version of the book. It is 783 kilobytes, so it will take a while.

PDF Version

Full information here:

How Computers Work

Posted in: Hardware Hacking


Latest Posts:


SecLists - Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place.
DeepSound - Audio Steganography Tool DeepSound – Audio Steganography Tool
DeepSound is an audio steganography tool and audio converter that hides secret data into audio files, the application also enables you to extract from files.
2019 High Severity Vulnerabilities What are the MOST Critical Web Vulnerabilities in 2019?
So what is wild on the web this year? Need to know about the most critical web vulnerabilities in 2019 to protect your organization?
GoBuster - Directory/File & DNS Busting Tool in Go GoBuster – Directory/File & DNS Busting Tool in Go
GoBuster is a tool used to brute-force URIs (directories and files) in web sites and DNS subdomains (inc. wildcards) - a directory/file & DNS busting tool.
BDFProxy - Patch Binaries via MITM - BackdoorFactory + mitmProxy BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy
BDFProxy allows you to patch binaries via MiTM with The Backdoor Factory combined with mitmproxy enabling on the fly patching of binary downloads
Domained - Multi Tool Subdomain Enumeration Domained – Multi Tool Subdomain Enumeration
Domained is a multi tool subdomain enumeration tool that uses several subdomain enumeration tools and wordlists to create a unique list of subdomains.


3 Responses to How Computers Work – Free E-book

  1. upedra September 27, 2006 at 7:12 am #

    please send the ebook

  2. Corkscrew February 25, 2008 at 1:23 am #

    Nice book. Thanks to the author and darknet. I ve understand it all now. And like you say “even my dog can understand it”
    When i read it I was amazed by the things that all this metal in my case can do !

  3. eM3rC February 25, 2008 at 4:01 am #

    Wow this is truly a good book for beginners! I will have to send this to my friends who are not so computer literate. Thanks to Darknet and the author of this book!