Talk:Hacker: Difference between revisions
Jump to navigation
Jump to search
imported>Eric M Gearhart |
imported>Frank van Geelkerken No edit summary |
||
Line 24: | Line 24: | ||
:Well it looks like it's only chapters 1 & 2. Oh well. Back to Amazon.com. It looks like only around $10 on there anyways. Also yea I have Konsole set to green text on a black background because it makes reading with nano so much easier :) [[User:Eric M Gearhart|Eric M Gearhart]] | :Well it looks like it's only chapters 1 & 2. Oh well. Back to Amazon.com. It looks like only around $10 on there anyways. Also yea I have Konsole set to green text on a black background because it makes reading with nano so much easier :) [[User:Eric M Gearhart|Eric M Gearhart]] | ||
** Eric in case you are interested I have a OCR scanned version of a 300 page book on the rise (and fall?) of the traditional hacker. It describes both the start of hacking as it is known in the US (telephone phreaking amongst others) and as it is known in Europe, with a complete chapter on the notorious CCC (http://www.chaoscomputerclub.de/) who during a certain period had control over '''''all''''' telephone lines in Germany, an were able to break '''''any''''' code thrown at them.<br/>(The German postal service changed all their security codes and settings and made a press release regarding it (because CCC was already VERY publicly known by then, and everyone knew they had hacked into the complete system), and lo and behold in less than 4 minutes after the press release went public CCC sent an addendum to that same press release stating '''''Nice try, but I thought these new codes were unbreakable'''''.<br/>Well if you're interested drop me a line (SPAM dot 5 squiglysign DSE dot NL) I guess you get the gest, and yes that IS a real (alias of my) mailaddress. |
Revision as of 22:23, 15 May 2007
Workgroup category or categories | Computers Workgroup, Law Workgroup [Editors asked to check categories] |
Article status | Stub: no more than a few sentences |
Underlinked article? | Yes |
Basic cleanup done? | Yes |
Checklist last edited by | --Eric M Gearhart 16:25, 9 April 2007 (CDT) |
To learn how to fill out this checklist, please see CZ:The Article Checklist.
Trying to get something going here
I'm trying to get something going on this article... I'm kind of tired and a little burnt out for today though. Maybe I'll revisit it tomorrow. There's a lot to say about "both sides of the coin." I "helped create a better free encyclopedia" enough today lol --Eric M Gearhart 16:47, 9 April 2007 (CDT)
- Eric Raymond's "A Brief History of Hackerdom" is an excellent resource. I believe it will be an invaluable aid in the writing of this article. --Joshua David Williams 14:01, 18 April 2007 (CDT)
- "Hackers: Heroes of the Computer Revolution" tells the MIT side of the story quite well too. I don't have a copy nearby, or I'd be drawing from it for this article :( Maybe I'll order it on eBay (there's not Barnes and Noble in Iraq unfortunately) Eric M Gearhart
- Whoa it's a free ebook on Gutenberg now! Sweet. I will take a look Eric M Gearhart
That's awesome. I'll read it ASAP. I've found that vi and a tty is a great combination for reading eBooks. It's a lot easier on the eyes than reading it in X. That's how I've been reading The Cathedral and the Bazaar. Eric Raymond is an excellent writer. --Joshua David Williams 14:17, 18 April 2007 (CDT)
- Well it looks like it's only chapters 1 & 2. Oh well. Back to Amazon.com. It looks like only around $10 on there anyways. Also yea I have Konsole set to green text on a black background because it makes reading with nano so much easier :) Eric M Gearhart
- Eric in case you are interested I have a OCR scanned version of a 300 page book on the rise (and fall?) of the traditional hacker. It describes both the start of hacking as it is known in the US (telephone phreaking amongst others) and as it is known in Europe, with a complete chapter on the notorious CCC (http://www.chaoscomputerclub.de/) who during a certain period had control over all telephone lines in Germany, an were able to break any code thrown at them.
(The German postal service changed all their security codes and settings and made a press release regarding it (because CCC was already VERY publicly known by then, and everyone knew they had hacked into the complete system), and lo and behold in less than 4 minutes after the press release went public CCC sent an addendum to that same press release stating Nice try, but I thought these new codes were unbreakable.
Well if you're interested drop me a line (SPAM dot 5 squiglysign DSE dot NL) I guess you get the gest, and yes that IS a real (alias of my) mailaddress.
- Eric in case you are interested I have a OCR scanned version of a 300 page book on the rise (and fall?) of the traditional hacker. It describes both the start of hacking as it is known in the US (telephone phreaking amongst others) and as it is known in Europe, with a complete chapter on the notorious CCC (http://www.chaoscomputerclub.de/) who during a certain period had control over all telephone lines in Germany, an were able to break any code thrown at them.
Categories:
- Computers Category Check
- General Category Check
- Law Category Check
- Category Check
- Advanced Articles
- Nonstub Articles
- Internal Articles
- Computers Advanced Articles
- Computers Nonstub Articles
- Computers Internal Articles
- Law Advanced Articles
- Law Nonstub Articles
- Law Internal Articles
- Developed Articles
- Computers Developed Articles
- Law Developed Articles
- Developing Articles
- Computers Developing Articles
- Law Developing Articles
- Stub Articles
- Computers Stub Articles
- Law Stub Articles
- External Articles
- Computers External Articles
- Law External Articles
- Computers Underlinked Articles
- Underlinked Articles
- Law Underlinked Articles
- Computers Cleanup
- General Cleanup
- Law Cleanup
- Cleanup