Copyright Finns Inte V3.0

Total Page:16

File Type:pdf, Size:1020Kb

Copyright Finns Inte V3.0 Copyright finns inte V3.0 Linus Walleij 1999-12-31 23:59 2 Innehåll 1 COPYRIGHT FINNS INTE 7 2 HACKARE! 11 3 HACKARKULTURENS GRÄSRÖTTER 15 4 UNDERJORDISKA HACKARE 19 5 SUBKULTURERNAS SUBKULTUR 41 6 BLIPP-BLOPP KULTUREN 51 7 RAVE, TECHNO OCH ACID 57 8 CYBERPUNK 67 9 EN ELEKTRONISK INTRESSEORGANISATION 85 10 DATABROTT: TERMINALSLAVAR, PLASTKORTSBEDRAGARE OCH CENSUR 93 11 ARTIFICIELL INTELLIGENS 107 12 VIRTUELL VERKLIGHET (VIRTUAL REALITY) 115 13 NÄTATTITYD, TEKNOKRATI OCH DEMOKRATI 121 14 KVINNLIGA HACKARE? 135 15 CYBERNETISKT SAMHÄLLE 139 16 FRAMTIDEN 151 17 EN CYBERNETISK UTOPI 157 18 Appendix: White Night vs Otto Sync 169 3 4 INNEHÅLL Omsvep Jag skulle kunna börja den här texten med att skriva: "Jag har valt att kalla förordet till denna bok för Omsvep med härledning till det mer lämpade engelska ’Preface’, alltså något som kommer utanför det egentliga objektets yta, jfr t ex engelskans ’Surface’ av ’Surrounding’ (omgivande) och ’Face’ (Ansikte, Yta). Jag finner denna nyskapande terminologi mödan värd med anledning av bla bla bla..." Allt sådant kallprat är bara en etikett man sätter på sina litterära verk för att tydligt visa för akademiska läsare att man tillhör den bildade världen, det vetenskapliga samhället. Jag har det tvivelaktiga nöjet att ännu vara relativt ung och oförstörd, och därför ser jag mig befriad från plikten att behöva tråka ut er stackars läsare med sådant dravel, trots att jag faktiskt kan konstruera riktigt knepiga resonemang när jag känner för det. Den akademiska formen är bara ett av de formspråk jag använder i den här boken. Jag skall börja med att tala om vad det kostade mig att skapa den här boken: massor. Massor med tid, och i realiteten massor med pengar. Jag klagar inte. Jag har haft gott om både tid och pengar. En stor del av boken skrevs som en etapp av mina studier medan jag ännu studerade på folkhögskola, och är därför mer eller mindre finansierad med de skattemedel i form av studiebidrag som jag uppbar under denna studietid. I någon mån skulle man på så vis kunna påstå att denna bok tillhör samhället. Frågan är om samhället skulle vilja kännas vid den. Jag har valt att ta konsekvensen av mina egna resonemang. Jag har i boken dömt ut copyright som ett urmo- digt och dumt påhitt, mest avsett att fixera samhällets maktbalans i sitt nuvarande läge. Alltså saknar denna bok copyright. Det finns en del argument för att förse boken med copyright. Låt mig behandla dem ett och ett: Du kan inte tjäna något på den här boken. Sant. Och falskt. Jag har redan tjänat en jäkla massa på den här boken. Andligt. I branchen kallar vi det intellektuellt kapital. Jag har fått en del nya vänner. I branchen kallar vi det humankapital. Åt helvete med detta jävla kapital, förresten. Jag har så att jag klarar mig ändå. Författande är inte mitt leverbröd. I varje fall inte än. Jag säger inte att det är fel att tjäna pengar på att skriva böcker, jag säger att det vore fel av mig att tjäna pengar på den här boken. Du har ingen koll på hur boken sprids. Jag har ingen jävla önskan att kontrollera hur den här boken sprids. Det framgår av den del av undertiteln som jag lite provocerande har lånat från Nietzsche: en bok för ingen och för alla. Att sedan börja tala om copyright vore inkonsekvent. All information borde förresten vara fri. Någon skulle kunna förvanska texten och påstå att hon/han själv skrivit den. Än sen. Var poet är en tjuv, var konstnär är en kannibal, som det så vackert heter. (Jag vet tyvärr inte vem som har sagt det.) En bra bok stjäl alla ifrån, bara så att det inte märks. Om någon stjäl något från denna bok så att det märks demonsterar han/hon bara sin uppenbart begränsade kreativitet. Om någon stjäl utan att det märks, märker inte jag det heller, och då lider jag knappast av det. Någon skulle kunna förvanska texten och sprida den för att skada dig. En sådan människa bryr sig nog inte om copyright eller inte. Copyright skulle i detta fall bara tillföra en möjlighet att straffa en människa som gjorde något sådant. Jag skulle ändå inte orka driva några processer: det vore slöseri med tid. För övrigt måste vi försöka lita på varandra i det här samhället någon jäkla gång. När du har läst så här långt inser du säkert att jag ger dig fria händer. Spridningen av denna bok är också ditt ansvar, och klangen av dess budskap ringer redan i ditt öra. Lägg den på disketter och ge till dina vänner. Lägg den på CD-ROM skivor och skicka med på omslaget till tidningar. Tryck ut den på papper om du känner för det. Tryck ut den, häfta in den, och använd den som kurslitteratur om informationssamhället. Tryck ut hundra exemplar på papper och ge bort till dina kompisar, men glöm inte bort att om du gör fler än 50 kopior för offentligt bruk måste 5 6 INNEHÅLL du skicka 7 pliktexemplar till bland annat riksarkivet, ty så lyder lagen om pliktexemplar av offentliga dokument. (Själv skulle jag bli överlycklig om denna bok dök upp i forskningsarkiven.) Tryck upp den och sälj den om det roar dig. Lyckas du tjäna pengar på den gör du åtminstone mig förvånad. Allt i det här samhället går ändå ut på att utnyttja andra. En av de industrier som likt kannibaler utnyttjar människor, är dessvärre förlagsindustrin. Måtte detta vara en nagel i ögat på dem. Till sist skall jag varna för att denna bok definitivt är färgad av mina egna åsikter och värderingar. Jag är en utta- lad individualist, och har heller inget emot att bli kallad socialist. I skärningspunkten mellan dessa två värderingar finns en ideologi som inte är särkilt vida känd, men som kallas syndikalism eller (vänster-) anarkism. I princip anser jag att all privat egendom är stöld,1 men jag är inte så jävla dum att jag inte inser att ett samhälle utan privat egendom är en utopi. Mina åsikter om yttrande- och tryckfrihet är ungefär de samma som hyses av Sveriges mest nyliberala organisationer. Jag har inget emot små och medelstora företag, men enorma transkontinentala koncerner är för mig farligare maktfaktorer än folkvalda regeringar, och som sådana måste de underkastas samma granskning som den folkvalda makten. Nu kan du läsa boken utan omsvep. 1Privat materiell egendom är stöld. "Intellektuell egendom" är något värre, möjligen väpnat rån. Censur är våldtäkt. Kapitel 1 COPYRIGHT FINNS INTE V3.0 En bok om information och makt För alla och för ingen DEUS EX MACHINA CARCERES EX NOVUM Den här boken om strömningar inom Litteratur, Teknologi, Musik, Film, Juridik och Ideologi skrevs efter att jag insett att om inte jag gjorde det så skulle någon annan göra det, men också för att göra klart för alla Sveriges trevliga hackare var de har sitt historiska och ideologiska arv. Slutligen finns det en lätt populärvetenskaplig ton i det hela, för att göra det någotsånär lättbegripligt. Några frågor du bör veta svaret på innan du börjar läsa denna bok: Varför skall jag läsa det här? Svar: För att du skall förstå nya begrepp i informationssamhället, den nya ungdomskulturen och samhällsde- batten, men också för att du skall ha en chans att bilda dig en egen uppfattning genom att konfronteras med mina och andras åsikter. Boken är centrerad kring kulturella fenomen eftersom de tydligast visar vart ett samhälle är på väg. Vårt samhälle på gränsen till informationssamhället kallas ibland det postindustriella samhället. Jag skall inte sticka under stolen med att jag också vill få dig att ifrågasätta det samhället. Vad är en Dator? Svar: En dator är ett föremål som följer de fysiska lagarna, precis som en människa. Precis som en människa är den varken ond, tråkig, snäll, krånglig eller särskilt intelligent. Den blir vad du gör den till. Precis som en människa i ett samhälle. Skillnaden mellan en människa och en dator är att datorn har en chans att absolut säkert veta vem som skapat den, och att den i princip kan se ut precis hur som helst. År 1995 tror de flesta att en dator ser ut som en fyrkantig låda. Dator är ett konstigt ord som många säger fel på. Fysikern Hannes Alfvén föreslog att man skulle kalla det en data, flera dator, men tekniska nomenklaturcentralen bästämde att man skulle säga en dator, flera datorer istället. Kanske gjorde man detta för att undvika att förväxla ordet med data i betydelsen information. Kanske gjorde man det bara för att data lät för feminint och man ville att datorn skulle vara en han. Gud vet. Branchen skilde en gång på mikrodatorer, minidatorer, stordatorer och superdatorer, där det är tänkt att den ena skall vara häftigare än den andra.1 Numera är gränserna för vad som är vad så flytande att de här beteckningarna är en smula föråldrade. En mikrodator är exempelvis en PC eller liknande hemdator. De andra sorterna har en normal människa knappt sett. Vad är ett Datanätverk? Svar: Ett datanätverk är två eller flera självständiga datorer som man kopplat ihop med kabel. Man brukar skilja på LAN (Local Area Network) där man kopplar ihop alla datorer i en byggnad eller som mest ett helt kvarter, MAN (Metropolian Area Network) med datorer i en hel stad sammanlänkade och WAN (Wide Area Network) som 1En del talar om "high end" och "low end" datorer. "High end" är de största, medan "low end" är den sort som sitter i mikrovågsugnar. 7 8 KAPITEL 1. COPYRIGHT FINNS INTE kopplar ihop datorer över riktigt stora avstånd. Störst av alla är Internet som kopplar ihop datorer av alla typer och över hela världen med varandra.
Recommended publications
  • AUTOMATIC TIGER by Kit Reed
    Including Venture S~ienee Fi~tion Automatic Tiger KIT REED 4 Sacheverell AVRAM DAVIDSON 17 Survival of the Fittest JACK SHARKEY 23 The Prodigals (verse) JEAN BRIDGE 31 Scien~e: Forget It! ISAAC ASIMOV 32 Lord Arthur Savile's Crime ( not~elet) OSCAR WILDE 42 Pure Water From Salt THEODORE L. THOMAS 70 Incident in the IND HARRY HARRISON 72 Books A VRAM DAVIDSON 79 Humanoid Sacrifice ( nOtJelet) J. T. MCINTOSH 84 The Conventional Approach ROBERT BLOCH 105 The Lost Leonardo J. G._ BALLARD 112 F&SF MMketpla~e 129 COtler by Mel Hunter Joseph W. Ferman, PUBLISHER Avram Davidson, EXECUTIVE EDITOR ]saac Asimov, SCIENCE EDITOR Edtvard L. Ferman, MANAGING EDITOR Ted White, ASSISTANT EDITOR The MagaziKe of Fanta.r:y and Science Ficlion, Volwme 26, No. ], Whole No. 154, Mar. 1964. Pwblished monthly by Mercwry Press, Inc., at 40~ a copy. Annual subscription $4.50; $5.00 in Canada and the Pan American Union; $5.50 '"all other countries. Publi· catioN office, 10 Ferry Street, Concord, N. H. Editorial and general mail slrortld be sent to 347 East 5Jrd St., New York 22, N.Y. Serond Class postage paid at Concord, N.H. Printed i11 U. S. A. © 1964 by Mercury Press, Inc. All nghts, including translations into other lang11ages, reserved. Submissio11s must be accompanied by stamped, self-addressed. ellt!elopes ,· the Publisher ass11mes "" ruponsibility for return of tcnsolicited manuscripts. Kit ( Mrs.]oseph) Reed i8 the author of the soon to be published novel, AT WAR WITH CHILDREN (Fa"ar Straus). Her first novel, MOTHER ISN'T DEAD SHES ONLY SLEEPING (Houghton M itfl.in), somewhat parallels her first F&SF story, THE WAIT ( April1958), which surprised and delighted our· many my­ riads of readers with its description of a good young girl and her hypochondriac mother caught up in the curious ways and sexual mores of a small town which was definitely not Middletown, Connecticut.
    [Show full text]
  • Cyclopaedia 15 – Alternate History Overview
    Cyclopaedia 15 – Alternate History By T.R. Knight (InnRoads Ministries * Article Series) Overview dimensions, or technological changes to explore these historical changes. Steampunk, Alternate History brings up many thoughts dieselpunk, and time/dimensional travel and feelings. To historical purists, this genre stories are good examples of this subcategory of fiction can look like historical revisionism. of Alternate History. Alternate History rides a Speculative fiction fans view these as “What fine line between Historical Fiction and If” scenarios that challenge us to think Science Fiction at this point. outside historical norms to how the world could be different today. Within the science Whatever type of Alternate History you fiction genre, alternate history can take on enjoy, each challenges your preconceived many sub-genres such as time travel, understandings and feelings for a time period alternate timelines, steampunk, and in history, perhaps offering you new dieselpunk. All agree that Alternate History perspectives on the people and events speculates to altered outcomes of key events involved. in history. These minor or major alterations Most common types of have ripple effects, creating different social, political, cultural, and/or scientific levels in Alternate History? the world. Alternate History has so many sub-genres Alternate History takes some queues from associated with it. Each one has its own Science Fiction as a genre. Just like Science unique alteration of history, many of which Fiction, Alternate History can be organized are considered genres or themes unto into two sub-categories that are “Hard” and themselves. “Soft” like Science Fiction. 80s Cold War invasion of United “Hard” Alternate History could be viewed as States stories and themes that stay as true to actual Axis victory in World War II history as possible with just one or two single Confederate victory in American changes that change the outcome, such as Civil War the Confederate Army winning the Civil War Dieselpunk or the Axis winning World War 2.
    [Show full text]
  • Hacks, Cracks, and Crime: an Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Missouri, St. Louis University of Missouri, St. Louis IRL @ UMSL Dissertations UMSL Graduate Works 11-22-2005 Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St. Louis, [email protected] Follow this and additional works at: https://irl.umsl.edu/dissertation Part of the Criminology and Criminal Justice Commons Recommended Citation Holt, Thomas Jeffrey, "Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers" (2005). Dissertations. 616. https://irl.umsl.edu/dissertation/616 This Dissertation is brought to you for free and open access by the UMSL Graduate Works at IRL @ UMSL. It has been accepted for inclusion in Dissertations by an authorized administrator of IRL @ UMSL. For more information, please contact [email protected]. Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers by THOMAS J. HOLT M.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2003 B.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2000 A DISSERTATION Submitted to the Graduate School of the UNIVERSITY OF MISSOURI- ST. LOUIS In partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSOPHY in Criminology and Criminal Justice August, 2005 Advisory Committee Jody Miller, Ph. D. Chairperson Scott H. Decker, Ph. D. G. David Curry, Ph. D. Vicki Sauter, Ph. D. Copyright 2005 by Thomas Jeffrey Holt All Rights Reserved Holt, Thomas, 2005, UMSL, p.
    [Show full text]
  • Paradise Lost , Book III, Line 18
    _Paradise Lost_, book III, line 18 %%%%%%%%%%%%%%%%%%%%%%%% ++++++++++Hacker's Encyclopedia++++++++ ===========by Logik Bomb (FOA)======== <http://www.xmission.com/~ryder/hack.html> ---------------(1997- Revised Second Edition)-------- ##################V2.5################## %%%%%%%%%%%%%%%%%%%%%%%% "[W]atch where you go once you have entered here, and to whom you turn! Do not be misled by that wide and easy passage!" And my Guide [said] to him: "That is not your concern; it is his fate to enter every door. This has been willed where what is willed must be, and is not yours to question. Say no more." -Dante Alighieri _The Inferno_, 1321 Translated by John Ciardi Acknowledgments ---------------------------- Dedicated to all those who disseminate information, forbidden or otherwise. Also, I should note that a few of these entries are taken from "A Complete List of Hacker Slang and Other Things," Version 1C, by Casual, Bloodwing and Crusader; this doc started out as an unofficial update. However, I've updated, altered, expanded, re-written and otherwise torn apart the original document, so I'd be surprised if you could find any vestiges of the original file left. I think the list is very informative; it came out in 1990, though, which makes it somewhat outdated. I also got a lot of information from the works listed in my bibliography, (it's at the end, after all the quotes) as well as many miscellaneous back issues of such e-zines as _Cheap Truth _, _40Hex_, the _LOD/H Technical Journals_ and _Phrack Magazine_; and print magazines such as _Internet Underground_, _Macworld_, _Mondo 2000_, _Newsweek_, _2600: The Hacker Quarterly_, _U.S. News & World Report_, _Time_, and _Wired_; in addition to various people I've consulted.
    [Show full text]
  • Tangled Web : Tales of Digital Crime from the Shadows of Cyberspace
    TANGLED WEB Tales of Digital Crime from the Shadows of Cyberspace RICHARD POWER A Division of Macmillan USA 201 West 103rd Street, Indianapolis, Indiana 46290 Tangled Web: Tales of Digital Crime Associate Publisher from the Shadows of Cyberspace Tracy Dunkelberger Copyright 2000 by Que Corporation Acquisitions Editor All rights reserved. No part of this book shall be reproduced, stored in a Kathryn Purdum retrieval system, or transmitted by any means, electronic, mechanical, pho- Development Editor tocopying, recording, or otherwise, without written permission from the Hugh Vandivier publisher. No patent liability is assumed with respect to the use of the infor- mation contained herein. Although every precaution has been taken in the Managing Editor preparation of this book, the publisher and author assume no responsibility Thomas Hayes for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein. Project Editor International Standard Book Number: 0-7897-2443-x Tonya Simpson Library of Congress Catalog Card Number: 00-106209 Copy Editor Printed in the United States of America Michael Dietsch First Printing: September 2000 Indexer 02 01 00 4 3 2 Erika Millen Trademarks Proofreader Benjamin Berg All terms mentioned in this book that are known to be trademarks or ser- vice marks have been appropriately capitalized. Que Corporation cannot Team Coordinator attest to the accuracy of this information. Use of a term in this book should Vicki Harding not be regarded as affecting the validity of any trademark or service mark. Design Manager Warning and Disclaimer Sandra Schroeder Every effort has been made to make this book as complete and as accurate Cover Designer as possible, but no warranty or fitness is implied.
    [Show full text]
  • Dictionary of Health Information Technology and Security
    DICTIONARY OF HEALTH INFORMATION TECHNOLOGY AND SECURITY Dr. David Edward Marcinko, MBA , CFP© Certifi ed Medical Planner© Editor-in-Chief Hope Rachel Hetico, RN, MSHA, CPHQ Certifi ed Medical Planner© Managing Editor NEW YORK 33021009_FM1.indd021009_FM1.indd i 003/17/20073/17/2007 116:48:506:48:50 Copyright © 2007 Springer Publishing Company, LLC All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmit- ted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of Springer Publishing Company, LLC. Springer Publishing Company, LLC 11 West 42nd Street New York, NY 10036 www.springerpub.com Acquisitions Editor: Sheri W. Sussman Production Editor: Carol Cain Cover design: Mimi Flow Composition: Apex Publishing, LLC 07 08 09 10/ 5 4 3 2 1 Library of Congress Cataloging-in-Publication Data Dictionary of health information technology and security / David Edward Marcinko, editor-in-chief, Hope Rachel Hetico, managing editor. p. ; cm. Includes bibliographical references. ISBN-13: 978-0-8261-4995-4 (alk. paper) ISBN-10: 0-8261-4995-2 (alk. paper) 1. Medical informatics—Dictionaries. 2. Medicine—Information technology—Dictionaries. 3. Medical informatics—Security measures— Dictionaries. I. Marcinko, David E. (David Edward) II. Hetico, Hope R. [DNLM: 1. Informatics—Dictionary—English. 2. Medical Informatics— Dictionary—English. 3. Computer Communication Networks—Dictionary— English. 4. Computer Security—Dictionary—English. W 13 D557165 2007] R858.D53 2007 610.3—dc22 2007005879 Printed in the United States of America by RR Donnelley. 33021009_FM1.indd021009_FM1.indd iiii 003/17/20073/17/2007 116:48:516:48:51 Th e Dictionary of Health Information Technology and Security is dedicated to Edward Anthony Marcinko Sr., and Edward Anthony Marcinko Jr., of Fell’s Point, Maryland.
    [Show full text]
  • Flexible Infections: Computer Viruses, Human Bodies, Nation-States, Evolutionary Capitalism
    Science,Helmreich Technology, / Flexible Infections& Human Values Flexible Infections: Computer Viruses, Human Bodies, Nation-States, Evolutionary Capitalism Stefan Helmreich New York University This article analyzes computer security rhetoric, particularly in the United States, argu- ing that dominant cultural understandings of immunology, sexuality, legality, citizen- ship, and capitalism powerfully shape the way computer viruses are construed and com- bated. Drawing on popular and technical handbooks, articles, and Web sites, as well as on e-mail interviews with security professionals, the author explores how discussions of computer viruses lean on analogies from immunology and in the process often encode popular anxieties about AIDS. Computer security rhetoric about compromised networks also uses language reminiscent of that used to describe the “bodies” of nation-states under military threat from without and within. Such language portrays viruses using images of foreignness, illegality, and otherness. The security response to viruses advo- cates the virtues of the flexible and adaptive response—a rhetoric that depends on evolu- tionary language but also on the ideological idiom of advanced capitalism. As networked computing becomes increasingly essential to the operations of corporations, banks, government, the military, and academia, worries about computer security and about computer viruses are intensifying among the people who manage and use these networks. The end of the 1990s saw the emergence of a small industry dedicated to antivirus protection software, and one can now find on the World Wide Web a great deal of information about how viruses work, how they can be combated, and how computer users might keep up with ever-changing inventories and taxonomies of the latest viruses.
    [Show full text]
  • IBM X-Force Threat Insight Quarterly 2 X-Force Threat Insight Quarterly IBM Security Solutions
    IBM Security Solutions May 2011 IBM X-Force Threat Insight Quarterly 2 X-Force Threat Insight Quarterly IBM Security Solutions Contents About the report 2 About the Report The IBM X-Force® Threat Insight Quarterly is designed to highlight some of the most significant threats and challenges 3 Evolution: From Nuisance to Weapon facing security professionals today. This report is a product of IBM Managed Security Services and the IBM X-Force 8 Prolific and Impacting Issues of Q1 2011 research and development team. Each issue focuses on specific challenges and provides a recap of the most significant recent 16 References online threats. IBM Managed Security Services are designed to help an organization improve its information security, by outsourcing security operations or supplementing your existing security teams. The IBM protection on-demand platform helps deliver Managed Security Services and the expertise, knowledge and infrastructure an organization needs to secure its information assets from Internet attacks. The X-Force team provides the foundation for a preemptive approach to Internet security. The X-Force team is one of the best-known commercial security research groups in the world. This group of security experts researches and evaluates vulnerabilities and security issues, develops assessment and countermeasure technology for IBM security products, and educates the public about emerging Internet threats. We welcome your feedback. Questions or comments regarding the content of this report should be addressed to [email protected]. 3 X-Force Threat Insight Quarterly IBM Security Solutions Evolution: From Nuisance to Weapon One of the more notable examples here is Brain3, a boot sector infector which originated in Pakistan and released in 1986, was Creeper, Wabbit, Animal, Elk Cloner, Brain, Vienna, Lehigh, one of the first examples of malware that infected PC’s running Stoned, Jerusalem.
    [Show full text]
  • Introduction
    Introduction Toward a Radical Criminology of Hackers In the expansive Rio Hotel and Casino in Las Vegas, I stood in line for around an hour and a half to pay for my badge for admittance into DEF CON 21, one of the largest hacker conventions in the world. The wad of cash in my hand felt heavier than it should have as I approached the badge vendor. DEF CON is an extravagant affair and attendees pay for it (though, from my own readings, the conference administrators work to keep the costs reduced). The line slowly trickled down the ramp into the hotel con- vention area where the badge booths were arranged. As I laid eyes on the convention, my jaw dropped. It was packed. Attendees were already mov- ing hurriedly throughout the place, engaged in energetic conversations. Black t- shirts— a kind of hacker uniform— were everywhere. Las Vegas- and gambling- themed décor lined the walls and floors. Already, I could see a line forming at the DEF CON merchandise booth. Miles, a hacker I had gotten to know throughout my research, mentioned that if I wanted some of the “swag” or “loot” (the conference merchandise), I should go ahead and get in line, a potential three- to four-hour wait. Seemingly, everyone wanted to purchase merchandise to provide some evidence they were in attendance. Wait too long and the loot runs out. After winding through the serpentine line of conference attendees wait- ing for admittance, I approached the badge vendors and (dearly) departed with almost $200. Stepping into the convention area, I felt that loss in the pit of my stomach.
    [Show full text]
  • David Fenimore* SINGING COWBOYS on THE
    Iperstoria – Testi Letterature Linguaggi www.iperstoria.it Rivista semestrale ISSN 2281-4582 David Fenimore* SINGING COWBOYS ON THE MOON: SCIENCE FICTION RE-OPENS THE WESTERN FRONTIER When I was six, my great-grandmother, a devout and practical woman who had nurtured three generations of engineers, gave me The Big Book of Space. I was so utterly absorbed by this colorful encyclopedia of “space ships, space station, rockets, equipment” and “star maps” (Hurst) that she followed up by giving me another illustrated children’s book, You Will Go To the Moon. Published in 1959 in the immediate wake of the International Geophysical Year and the launch of Sputnik I, this simply written and earnestly didactic story promoted the friendliness, familiarity, and safety of space travel to impressionable and daydreamy Anglo- American boys such as myself. In it, a little brown-haired, blue-eyed boy – dead ringer for six-year-old me – gazes through a telescope at a full moon over the rolling fields of Midwestern farm country. On the next page, his well-dressed parents are escorting our young hero to the launch facility, which spreads out across a laser-flat plain between dry rocky desert ridges. Arriving on the moon, he encounters a similar landscape, described as "different from earth – no water, no lakes, no trees (…) just deep gray dust" (Freeman 50). He climbs a hill in his space suit and looks out over the moon colony, a cluster of shiny metallic pods and domes spreading across the lunar plain under an outer-space sky. Inside, the off-duty "rocket men" are shown relaxing by watching a Western film, the scene on the screen – a frame within a frame – being a mounted cowboy galloping past a desert mesa, his six-guns blazing (52).
    [Show full text]
  • Basics of Ethical Hacking – Manthan M. Desai
    Hacking For Beginners – Manthan Desai 2010 Legal Disclaimer Any proceedings and or activities related to the material contained within this book are exclusively your liability. The misuse and mistreat of the information in this book can consequence in unlawful charges brought against the persons in question. The authors and review analyzers will not be held responsible in the event any unlawful charges brought against any individuals by misusing the information in this book to break the law. This book contains material and resources that can be potentially destructive or dangerous. If you do not fully comprehend something on this book, don‘t study this book. Please refer to the laws and acts of your state/region/ province/zone/territory or country before accessing, using, or in any other way utilizing these resources. These materials and resources are for educational and research purposes only. Do not attempt to violate the law with anything enclosed here within. If this is your intention, then leave now. While using this book and reading various hacking tutorials, you agree to follow the below mentioned terms and conditions: 1. All the information provided in this book is for educational purposes only. The book author is no way responsible for any misuse of the information. 2. "Hacking for Beginners” is just a term that represents the name of the book and is not a book that provides any illegal information. “Hacking for Beginners” is a book related to Computer Security and not a book that promotes hacking/cracking/software piracy. 3. This book is totally meant for providing information on "Computer Security”, "Computer Programming” and other related topics and is no way related towards the terms "CRACKING” or "HACKING” (Unethical).
    [Show full text]
  • Virus Bulletin, July 91
    July 1991 ISSN 0956-9979 THE AUTHORITATIVE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Edward Wilding Technical Editor: Fridrik Skulason, University of Iceland Editorial Advisors: Jim Bates, Bates Associates, UK, Phil Crewe, Fingerprint, UK, David Ferbrache, ISIS Ltd., UK, Ray Glath, RG Software Inc., USA, Hans Gliss, Datenschutz Berater, West Germany, Ross M. Greenberg, Software Concepts Design, USA, Dr. Harold Joseph Highland, Compulit Microcomputer Security Evaluation Laboratory, USA, Dr. Jan Hruska, Sophos, UK, Dr. Keith Jackson, Walsham Contracts, UK, Owen Keane, Barrister, UK, John Laws, RSRE, UK, David T. Lindsay, Digital Equipment Corporation, UK, Yisrael Radai, Hebrew University of Jerusalem, Israel, Martin Samociuk, Network Security Management, UK, John Sherwood, Sherwood Associates, UK, Prof. Eugene Spafford, Purdue University, USA, Dr. Peter Tippett, Certus International Corporation, USA, Dr. Ken Wong, PA Consulting Group, UK, Ken van Wyk, CERT, USA. CONTENTS SCANNER UPDATE IBM Triumphs Amidst the ‘Vapourware’ 34 EDITORIAL 2 Results Table 35 TECHNICAL NOTES 3 TUTORIAL PRODUCT REVIEWS Fixed Disk Boot Sectors and 1. SafeWord Virus-Safe 36 Post-Attack Recovery 5 2. Knoxcard: Anti-Virus Hardware 38 Virus Bulletin Education, Training & Awareness Presentations 9 3. Trend Micro Devices’ PC-cillin 40 LETTERS SHAREWARE REVIEW VB Signatures With IBM’s Virscan 10 PC Virus Index 42 Vetting Procedure 10 KNOWN IBM PC VIRUSES 12 END-NOTES & NEWS 44 VIRUS BULLETIN ©1991 Virus Bulletin Ltd, 21 The Quadrant, Abingdon Science Park, Oxon, OX14 3YS, England. Tel (+44) 235 555139. /90/$0.00+2.50 This bulletin is available only to qualified subscribers. No part of this publication may be reproduced, stored in a retrieval system, or transmitted by any form or by any means, electronic, magnetic, optical or photocopying, without the prior written permission of the publishers.
    [Show full text]