HOME



picture info

2600 The Hacker Quarterly
''2600: The Hacker Quarterly'' is an American seasonal publication of technical information and articles, many of which are written and submitted by the readership, on a variety of subjects including hacking, telephone switching systems, Internet protocols and services, as well as general news concerning the computer underground. With origins in the phone phreaking community and late 20th-century counterculture, ''2600'' and its associated conference transitioned to coverage of modern hacker culture, and the magazine has become a platform for speaking out against increased digital surveillance and advocacy of personal and digital freedoms. Publication history The magazine's name comes from the phreaker discovery in the 1960s that the transmission of a 2600 hertz tone – which could be produced perfectly with a plastic toy whistle given away free with Cap'n Crunch cereal, discovered by friends of John Draper – over a long-distance trunk connection gained access to ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Computer
A computer is a machine that can be Computer programming, programmed to automatically Execution (computing), carry out sequences of arithmetic or logical operations (''computation''). Modern digital electronic computers can perform generic sets of operations known as Computer program, ''programs'', which enable computers to perform a wide range of tasks. The term computer system may refer to a nominally complete computer that includes the Computer hardware, hardware, operating system, software, and peripheral equipment needed and used for full operation; or to a group of computers that are linked and function together, such as a computer network or computer cluster. A broad range of Programmable logic controller, industrial and Consumer electronics, consumer products use computers as control systems, including simple special-purpose devices like microwave ovens and remote controls, and factory devices like industrial robots. Computers are at the core of general-purpose devices ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Cap'n Crunch
Cap'n Crunch is a corn and oat breakfast cereal manufactured since 1963 by Quaker Oats Company, a subsidiary of PepsiCo since 2001. Since the original product introduction, marketed simply as ''Cap'n Crunch'', Quaker Oats has introduced numerous flavors and seasonal variations, some for a limited time—and currently offers a Cap'n Crunch product line. The original Cap'n Crunch cereal was developed to recall a recipe of brown sugar and butter over rice. It was one of the first cereals to use an oil coating to deliver its flavoring, which required an innovative baking process. Product history Pamela Low, a flavorist at Arthur D. Little, developed the original Cap'n Crunch flavor in 1963—recalling a recipe of a mixture of brown sugar and butter her grandmother Luella Low served over rice at her home in Derry, New Hampshire. Low created the flavor coating for Cap'n Crunch, describing it as giving the cereal a quality she called "want-more-ishness". After her death in ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Grey Hat
A grey hat (greyhat or gray hat) is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent typical of a black hat hacker. The term came into use in the late 1990s, and was derived from the concepts of " white hat" and "black hat" hackers. When a white hat hacker discovers a vulnerability, they will exploit it only with permission and not divulge its existence until it has been fixed, whereas the black hat will illegally exploit it and/or tell others how to do so. The grey hat will neither illegally exploit it, nor tell others how to do so. A further difference among these types of hacker lies in their methods of discovering vulnerabilities. The white hat breaks into systems and networks at the request of their employer or with explicit permission for the purpose of determining how secure it is against hackers, whereas the black hat will break into any system or network in order ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Hacker (computer Security)
A security hacker or security researcher is someone who explores methods for breaching or bypassing defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, sabotage, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers. Longstanding controversy surrounds the meaning of the term "hacker". In this controversy, computer programmers reclaim the term ''hacker'', arguing that it refers simply to someone with an advanced understanding of computers and computer networks, and that ''cracker'' is the more appropriate term for those who break into computers, whether computer criminals ( black hats) or computer security experts ( white hats). A 2014 article noted that "the black-hat meaning still prevails among the general public". The subculture that has evolved around hackers is often referred to as the "co ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Loaded Term
Loaded language is rhetoric used to influence an audience by using words and phrases with strong connotations. This type of language is very often made vague to more effectively invoke an emotional response and/or exploit stereotypes. Loaded words and phrases have significant emotional implications and involve strongly positive or negative reactions beyond their literal meaning. Definition Loaded terms, also known as emotive or ethical words, were clearly described by Charles Stevenson. He noticed that there are words that do not merely describe a possible state of affairs. "Terrorist" is not used only to refer to a person who commits specific actions with a specific intent. Words such as "torture" or "freedom" carry with them something more than a simple description of a concept or an action. They have a "magnetic" effect, an imperative force, a tendency to influence the interlocutor's decisions. They are strictly bound to moral values leading to value judgements and potentiall ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Nineteen Eighty-Four
''Nineteen Eighty-Four'' (also published as ''1984'') is a dystopian novel and cautionary tale by the English writer George Orwell. It was published on 8 June 1949 by Secker & Warburg as Orwell's ninth and final completed book. Thematically, it centres on the consequences of totalitarianism, mass surveillance and repressive regimentation of people and behaviours within society. Orwell, a democratic socialist and an anti-Stalinist, modelled Britain under authoritarian socialism in the novel on the Soviet Union in the era of Stalinism and the practices of censorship and propaganda in Nazi Germany. More broadly, the book examines the role of truth and facts within societies and the ways in which they can be manipulated. The story takes place in an imagined future. The current year is uncertain, but believed to be 1984. Much of the world is in perpetual war. Great Britain, now known as Airstrip One, has become a province of the totalitarian superstate Oceania, which is led b ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

George Orwell
Eric Arthur Blair (25 June 1903 – 21 January 1950) was an English novelist, poet, essayist, journalist, and critic who wrote under the pen name of George Orwell. His work is characterised by lucid prose, social criticism, opposition to all totalitarianism (both authoritarian communism and fascism), and support of democratic socialism. Orwell is best known for his allegorical novella ''Animal Farm'' (1945) and the Utopian and dystopian fiction, dystopian novel ''Nineteen Eighty-Four'' (1949), although his works also encompass literary criticism, poetry, fiction and polemical journalism. His non-fiction works, including ''The Road to Wigan Pier'' (1937), documenting his experience of working-class life in the industrial north of England, and ''Homage to Catalonia'' (1938), an account of his experiences soldiering for the Republican faction (Spanish Civil War), Republican faction of the Spanish Civil War (1936–1939), are as critically respected as George Orwell bibliograph ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Pen Name
A pen name or nom-de-plume is a pseudonym (or, in some cases, a variant form of a real name) adopted by an author and printed on the title page or by-line of their works in place of their real name. A pen name may be used to make the author's name more distinctive, to disguise the author's gender, to distance the author from their other works, to protect the author from retribution for their writings, to merge multiple persons into a single identifiable author, or for any of several reasons related to the marketing or aesthetic presentation of the work. The author's real identity may be known only to the publisher or may become common knowledge. In some cases, such as those of Elena Ferrante and Torsten Krol, a pen name may preserve an author's long-term anonymity. Etymology ''Pen name'' is formed by joining pen with name. Its earliest use in English is in the 1860s, in the writings of Bayard Taylor. The French-language phrase is used as a synonym for "pen name" ( means 'pen') ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

AT&T Breakup
The Bell System held a virtual monopoly over telephony infrastructure in the United States since the early 20th century until January 8, 1982. This divestiture of the Bell Operating Companies was initiated in 1974 when the United States Department of Justice filed '' United States v. AT&T'', an antitrust lawsuit against AT&T. At the time, AT&T had substantial control over the United States' communications infrastructure. Not only was it the sole telephone provider throughout most of the country, its subsidiary Western Electric produced much of its equipment. Relinquishing ownership of Western Electric was one of the Justice Department’s primary demands. AT&T Corporation proposed in a consent decree to relinquish control of the Bell Operating Companies, which had provided local telephone service in the United States. AT&T would continue to be a provider of long-distance service, while the now-independent Regional Bell Operating Companies (RBOCs), nicknamed the "Baby Bells", wou ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Bantam Books
Bantam Books is an American publishing house owned entirely by parent company Random House, a subsidiary of Penguin Random House; it is an imprint of the Random House Publishing Group. It was formed in 1945 by Walter B. Pitkin Jr., Sidney B. Kramer, and Ian and Betty Ballantine, with funding from Grosset & Dunlap and Curtis Publishing Company. It has since been purchased several times by companies including National General, Carl Lindner's American Financial and, most recently, Bertelsmann, which in 1986 purchased what had grown to become the Bantam Doubleday Dell publishing group. Bertelsmann purchased Random House in 1998, and in 1999 merged the Bantam and Dell imprints (amongst other mergers within the sprawling publishing house) to become the Bantam Dell publishing imprint. In 2010, the Bantam Dell division was consolidated with Ballantine Books (founded in 1952 by Bantam co-founders Ian and Betty Ballantine) to form the Ballantine Bantam Dell group within Random Hous ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


The Hacker Crackdown
''The Hacker Crackdown: Law and Disorder on the Electronic Frontier'' is a work of nonfiction by Bruce Sterling first published in 1992. The book discusses watershed events in the hacker subculture in the early 1990s. The most notable topic covered is Operation Sundevil and the events surrounding the 1987–1990 war on the Legion of Doom network: the raid on Steve Jackson Games, the trial of "Knight Lightning" (one of the original journalists of ''Phrack''), and the subsequent formation of the Electronic Frontier Foundation. The book also profiles the likes of " Emmanuel Goldstein" (publisher of '' 2600: The Hacker Quarterly''), the former assistant attorney general of Arizona Gail Thackeray, FLETC instructor Carlton Fitzpatrick, Mitch Kapor, and John Perry Barlow. In 1994, Sterling released the book for the Internet with a new afterword. Critical reception Cory Doctorow, who voiced an unabridged podcast of the book, said it "inspired me politically, artistically and socially ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Bulletin Board System
A bulletin board system (BBS), also called a computer bulletin board service (CBBS), is a computer server running list of BBS software, software that allows users to connect to the system using a terminal program. Once logged in, the user performs functions such as uploading and downloading software and data, reading news and bulletins, and exchanging messages with other users through public Internet forum, message boards and sometimes via direct synchronous conferencing, chatting. In the early 1980s, message networks such as FidoNet were developed to provide services such as M+NetMail, NetMail, which is similar to internet-based email. Many BBSes also offered BBS door, online games in which users could compete with each other. BBSes with multiple phone lines often provided chat rooms, allowing users to interact with each other. Bulletin board systems were in many ways a precursor to the modern form of the World Wide Web, social networking service, social networks, and other aspe ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]