How Computers Work – Free E-book

Outsmart Malicious Hackers


This is a tutorial web book. All 152 pages of the large paperback book with 96 diagrams are on 38 web pages here.

Even if you know nothing about electronics, you have come to the right place.

If you are wondering how microprocessors work, you have come to the right place. A microprocessor is a small processor.

How Computers Work

If you already know something about electronics, don’t be put off by the fact that the book starts out very simple and uses relays instead of transistors. You will get through the first chapter quickly. See web page 24, below, for just how complex it gets.

If you have a very fast connection (DSL or cable modem), then you can click the following link to see an easier to read (PDF) version of the book. It is 783 kilobytes, so it will take a while.

PDF Version

Full information here:

How Computers Work

Posted in: Hardware Hacking


Latest Posts:


snallygaster - Scan For Secret Files On HTTP Servers snallygaster – Scan For Secret Files On HTTP Servers
snallygaster is a Python-based tool that can help you to scan for secret files on HTTP servers, files that are accessible that shouldn't be public and can pose a s
Portspoof - Spoof All Ports Open & Emulate Valid Services Portspoof – Spoof All Ports Open & Emulate Valid Services
The primary goal of the Portspoof program is to enhance your system security through a set of new camouflage techniques which spoof all ports open and also emulate valid services on every port.
Cambridge Analytica Facebook Data Scandal Cambridge Analytica Facebook Data Scandal
One of the biggest stories of the year so far has been the scandal surrounding Cambridge Analytica that came out after a Channel 4 expose that demonstrated the depths they are willing to go to profile voters, manipulate elections and much more.
GetAltName - Discover Sub-Domains From SSL Certificates GetAltName – Discover Sub-Domains From SSL Certificates
GetAltName it's a little script to discover sub-domains that can extract Subject Alt Names for SSL Certificates directly from HTTPS websites which can provide you with DNS names or virtual servers.
Memcrashed - Memcached DDoS Exploit Tool Memcrashed – Memcached DDoS Exploit Tool
Memcrashed is a Memcached DDoS exploit tool written in Python that allows you to send forged UDP packets to a list of Memcached servers obtained from Shodan.
QualysGuard - Vulnerability Management Tool QualysGuard – Vulnerability Management Tool
QualysGuard is a web-based vulnerability management tool provided by Qualys, Inc, which was the first company to deliver vulnerability management services as a SaaS-based web-service.


3 Responses to How Computers Work – Free E-book

  1. upedra September 27, 2006 at 7:12 am #

    please send the ebook

  2. Corkscrew February 25, 2008 at 1:23 am #

    Nice book. Thanks to the author and darknet. I ve understand it all now. And like you say “even my dog can understand it”
    When i read it I was amazed by the things that all this metal in my case can do !

  3. eM3rC February 25, 2008 at 4:01 am #

    Wow this is truly a good book for beginners! I will have to send this to my friends who are not so computer literate. Thanks to Darknet and the author of this book!