Å·±¦ÓéÀÖ

Daemon (Daemon, #1)

Questions About Daemon (Daemon, #1)

by Daniel Suarez (Å·±¦ÓéÀÖ Author)

Reader Q&A

To ask other readers questions about Daemon, please sign up.

Answered Questions (5)

Rebecca Erickson NOT AGE APPROPRIATE. I know this is old but just in case someone else is also interested in this question: this book has a very slowly described gang-…m´Ç°ù±ðNOT AGE APPROPRIATE. I know this is old but just in case someone else is also interested in this question: this book has a very slowly described gang-rape of a minor after being drugged scene (from the pov of the rapist who is very positive about it) on the first few chapters that is absolutely disturbing and I wouldn't recommend for anyone to read, let alone young people.(less)
Mark Petry Interesting coincidence, I just finished Brad Thor's Act of War. Then a friend of mine, when I asked to recommend a book, suggested Daemon. I'm 100 pa…m´Ç°ù±ðInteresting coincidence, I just finished Brad Thor's Act of War. Then a friend of mine, when I asked to recommend a book, suggested Daemon. I'm 100 pages in and I do like it. I wasn't that impressed with Act of War either. I write suspense thrillers so I'll pick up books in that genre, not sure why I bother with Thor. I've read four of his books, and I can honestly say as I go through my read books on Å·±¦ÓéÀÖ, I can't remember anything about any of the four.(less)
Sean Duggan In my opinion, there's also a strong tie-in to Ion Storm / iD Software as well with the eccentric creators, cutting-edge techniques, and general overs…m´Ç°ù±ðIn my opinion, there's also a strong tie-in to Ion Storm / iD Software as well with the eccentric creators, cutting-edge techniques, and general overspending on developers.(less)
Very Happy Best answer:

A JPEG file contains only data, but if that data is constructed in a specific way to leverage a programming vulnerability in libraries whi…m´Ç°ù±ð
Best answer:

A JPEG file contains only data, but if that data is constructed in a specific way to leverage a programming vulnerability in libraries which read the data, virus-like behavior can be created.

The virus would only be effective if the JPEG was opened using the flawed library.

Such a problem was discovered in 2004 within the Microsoft JPEG library within Windows XP, it was quickly patched though.

from:
(less)
Mikael I think the two books are pretty different. If you liked Freedom I think you will also like Daemon although it's a very different story. I enjoyed the…m´Ç°ù±ðI think the two books are pretty different. If you liked Freedom I think you will also like Daemon although it's a very different story. I enjoyed them both very much.(less)

Unanswered Questions (1)

This question contains spoilers... (view spoiler)

About Å·±¦ÓéÀÖ Q&A

Ask and answer questions about books!

You can pose questions to the Å·±¦ÓéÀÖ community with Reader Q&A, or ask your favorite author a question with Ask the Author.

See Featured Authors Answering Questions