Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier Pdf FREE UNDERGROUND: TALES OF HACKING, MADNESS AND OBSESSION ON THE ELECTRONIC FRONTIER PDF Suelette Dreyfus,Julian Assange | 512 pages | 01 May 2012 | Canongate Books Ltd | 9780857862594 | English | Edinburgh, United Kingdom Underground: Hacking, madness and obsession on the electronic frontier by Dreyfus - Free Ebook Goodreads helps you keep track of books you want to read. Want to Read saving…. Want to Read Currently Reading Read. Other editions. Enlarge cover. Error rating book. Refresh and try again. Open Preview See a Problem? Details if other :. Thanks for telling us about the problem. Return to Book Page. Preview — Underground by Suelette Dreyfus. Julian Assange Contributor. Suelette Dreyfus and her co-author, WikiLeaks founder Julian Assange, tell the extraordinary true story of the computer underground, and the bizarre lives and crimes of an elite ring of international hackers who took Underground: Tales of Hacking the establishment. Spanning three continents and a decade of high level infiltration, they created chaos amongst some Underground: Tales of Hacking the world's biggest and most power Suelette Dreyfus and her co-author, WikiLeaks founder Julian Assange, tell the extraordinary true story of the computer underground, and the bizarre lives and crimes of an elite ring of international hackers who took on the establishment. Spanning three continents and a decade of high level infiltration, they created chaos amongst some of the world's biggest and most powerful organisations, including NASA and the US military. Brilliant and obsessed, many of them found Underground: Tales of Hacking addicted to hacking and phreaking. Some descended into drugs and madness, others ended up in jail. As riveting as the finest detective novel and meticulously researched, Underground follows the hackers through their crimes, their betrayals, the hunt, raids and investigations. It is a gripping tale of the digital underground. Get A Copy. Hardcoverpages. Published June 6th by Mandarin first published More Details Original Title. Other Editions Friend Reviews. To see what your friends thought of this book, please sign up. To ask other readers questions about Undergroundplease sign up. Lists with This Book. Community Reviews. Showing Average rating 4. Rating details. More filters. Sort order. Nov 23, Peter rated it it was amazing. I found this one to be a very entertaining read. Firstly, being one with a strong IT background I expected to quickly feel "at home". Secondly, and perhaps even more importantly, I was very much hoping to "relive" my personal experiences with the "early" inter net - to be confirmed in my own perceptions Madness and Obsession on the Electronic Frontier you will. Then was time when you could still snoop around the net openly without second guesses and immediate fear of persecution - ultimately with a wish to simply learn as the driving force I found this one to be a very entertaining read. Then was time when you could still snoop around the net openly Madness and Obsession on the Electronic Frontier second guesses and immediate Underground: Tales of Hacking of persecution - ultimately with a wish to simply learn as the driving force beind your doings. With regards to the book, everything that Dreyfuss writes about appears authentic to me, online BBS, the "holy grail" themed search for secret bug mailling lists and the at times nearly friendly toying of Hackers and Admins with one another all seems familiar. The general idea of what actually makes a "hacking person" contrary to a "cracker" is also conveyed clearly and should only serve to teach the reader to distinctly draw Underground: Tales of Hacking line between the "good" and the "bad" hackers. Dreyfuss also focuses alot on the personal lives and inner struggles found in most of the youthful hackers featured in her book, which only serves to make the book more entertaining and believable. When a nationwide wanted for hackings teenager falls in love with a girl and goes through all the states of happiness on to heartsickness it never feels fake or uncinsere. After all, even hackers are only humans - the book brings that integral message across very nicely. With that said, Underground is a fine factual novel that sheds some light on the early days of the net, Madness and Obsession on the Electronic Frontier curiosity still ruled those people engaged with it. The novel is easy to read and does not overburden someone who is already slightly at home with computers and the technologies around them. Aug 23, Jon rated it it was ok. Unfortunately, Dreyfus includes a lot of unnecessary information. I assume that Dreyfus included the additions to facilitate a better understanding of the characters. Unfortunately, on some of the characters the additional information does not add much to the psychological profile and makes reading a chore. Part of this feeling of unnecessary information Madness and Obsession on the Electronic Frontier probably due to the way that Dreyfus organized the material. In the end, great stories and material, but the writing style and organization did not facilitate an enjoyable reading experience. A unique glimpse into the early hacker culture of the Underground: Tales of Hacking and 90s. It's good to have this recorded - the early internet and its curious pioneers. The ideas we are now debating — such as freedom of information — sprang to life from this fertile ground. Jan 02, Eric Phetteplace rated it did not like it Shelves: prose. A chronicle of the early days of hacking in the s, primarily focused on Australian hackers but with some British and American characters in there too. I guess I expected a little too much from this book as I was mainly interested in the technical side of things, which it does go into a little at parts but not enough for me. On the whole, though, it's just not well-written. Almost every narrative jumps around awkwardly as Dreyfus tries to fill in extraneous details she forgot to mention at th A chronicle of the early days of hacking in the s, primarily focused on Australian hackers but with some British and American characters in there too. Almost every narrative jumps around awkwardly as Madness and Obsession on the Electronic Frontier tries to fill in extraneous details she forgot to mention at the appropriate time. Read through the first chapter and you'll understand what I Madness and Obsession on the Electronic Frontier all that surrounding detail about NASA was useless to me. I love these glimpses into the minds of hackers and how everything worked before the Internet. Sharing, openness and then changes coming with new laws brought on by few "black sheep". Some of these stories are unbelievable. Some are sad. Some Madness and Obsession on the Electronic Frontier funny. I enjoyed all of them. Well done. Apr 08, Brian Palmer rated it did not like it Shelves:non-fiction. Writing a book on hacking, computer security, and so forth is hard. When this was written, back init was surely even harder, as the general audience this book is aimed at was presumably less familiar with the technical details of "cyberspace. I read this from a PDF that's freely available on the book's website; it was presented in a fixed-width, ty Writing a book on hacking, computer security, and so forth is hard. I read this from a PDF that's freely available on the book's website; it was presented in a fixed-width, typewriter- seeming font -- the sort of font that you'd use to Underground: Tales of Hacking most electronic text from the s, and eschewed much typography or layout again, like you were reading an ASCII text from that period. This may have made it worse, because Dreyfus kept interrupting her own timeline to include anecdotes or brief timejumps about the subject of each chapter. But with no sign that the timejump occurred, the writing felt disjoint and bizarre, irrelevant details complicating what should be straightforward description of what happened. I read the first pages or so quickly, before it got to the chapter on Assange "Mendax". He apparently helped edit the text he is listed as a contributor here on Goodreads ; it was there that, whether it was simply seeing how the text glissed over attributes that more recent profiles of Assange have focused on, or wondering how much of this chapter has been glamorized, that I felt like it became a captive to the "hacker" view. In the end, I finished but was left feeling that the book glossed past things, and the writing itself left me down. I probably wouldn't recommend it -- Michelle Slatalla's Masters of Deception was written at around the same time, and took a similarly fairly sympathetic view of its characters, but is much better written. Nov 13, Sagar Acharya rated it it was amazing. A must book for nerds. A true account on Australian, British and US hackers. It shows the earliest ways to abuse computers and law and how phreakers and hackers having amazing handles brought about mischief, havoc and how they were penalised in their respective laws. I laughed for about two minutes on this wordplay. Many sides of hacking like social engineering getting things done by talking in a waylimited access exploiting for extracting free calls aroundA must book for nerds. Many sides of hacking like social engineering getting things done by talking in a waylimited access exploiting for extracting free calls aroundgetting root access through dial connections in very powerful Underground: Tales of Hacking and exaggerated ways of police to get confessions out of hackers are elaborated so well. These were times when hard disks were 20mb big and RAM was about 1mb for consumer computers and the universities had really poor network security systems.
Recommended publications
  • Hacks, Cracks, and Crime: an Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Missouri, St. Louis University of Missouri, St. Louis IRL @ UMSL Dissertations UMSL Graduate Works 11-22-2005 Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St. Louis, [email protected] Follow this and additional works at: https://irl.umsl.edu/dissertation Part of the Criminology and Criminal Justice Commons Recommended Citation Holt, Thomas Jeffrey, "Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers" (2005). Dissertations. 616. https://irl.umsl.edu/dissertation/616 This Dissertation is brought to you for free and open access by the UMSL Graduate Works at IRL @ UMSL. It has been accepted for inclusion in Dissertations by an authorized administrator of IRL @ UMSL. For more information, please contact [email protected]. Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers by THOMAS J. HOLT M.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2003 B.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2000 A DISSERTATION Submitted to the Graduate School of the UNIVERSITY OF MISSOURI- ST. LOUIS In partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSOPHY in Criminology and Criminal Justice August, 2005 Advisory Committee Jody Miller, Ph. D. Chairperson Scott H. Decker, Ph. D. G. David Curry, Ph. D. Vicki Sauter, Ph. D. Copyright 2005 by Thomas Jeffrey Holt All Rights Reserved Holt, Thomas, 2005, UMSL, p.
    [Show full text]
  • Ethical Hacking
    International Journal of Scientific and Research Publications, Volume 5, Issue 6, June 2015 1 ISSN 2250-3153 Ethical Hacking Susidharthaka Satapathy , Dr.Rasmi Ranjan Patra CSA, CPGS, OUAT, Bhubaneswar, Odisha, India Abstract- In today's world where the information damaged the target system nor steal the information, they communication technique has brought the world together there is evaluate target system security and report back to the owner one of the increase growing areas is security of network ,which about the threats found. certainly generate discussion of ETHICAL HACKING . The main reason behind the discussion of ethical hacking is insecurity of the network i.e. hacking. The need of ethical hacking is to IV. FATHER OF HACKING protect the system from the damage caused by the hackers. The In 1971, John Draper , aka captain crunch, was one of the main reason behind the study of ethical hacking is to evaluate best known early phone hacker & one of the few who can be target system security & report back to owner. This paper helps called one of the father's of hacking. to generate a brief idea of ethical hacking & all its aspects. Index Terms- Hacker, security, firewall, automated, hacked, V. IS HACKING NECESSARY crackers Hacking is not what we think , It is an art of exploring the threats in a system . Today it sounds something with negative I. INTRODUCTION shade , but it is not exactly that many professionals hack system so as to learn the deficiencies in them and to overcome from it he increasingly growth of internet has given an entrance and try to improve the system security.
    [Show full text]
  • Paradise Lost , Book III, Line 18
    _Paradise Lost_, book III, line 18 %%%%%%%%%%%%%%%%%%%%%%%% ++++++++++Hacker's Encyclopedia++++++++ ===========by Logik Bomb (FOA)======== <http://www.xmission.com/~ryder/hack.html> ---------------(1997- Revised Second Edition)-------- ##################V2.5################## %%%%%%%%%%%%%%%%%%%%%%%% "[W]atch where you go once you have entered here, and to whom you turn! Do not be misled by that wide and easy passage!" And my Guide [said] to him: "That is not your concern; it is his fate to enter every door. This has been willed where what is willed must be, and is not yours to question. Say no more." -Dante Alighieri _The Inferno_, 1321 Translated by John Ciardi Acknowledgments ---------------------------- Dedicated to all those who disseminate information, forbidden or otherwise. Also, I should note that a few of these entries are taken from "A Complete List of Hacker Slang and Other Things," Version 1C, by Casual, Bloodwing and Crusader; this doc started out as an unofficial update. However, I've updated, altered, expanded, re-written and otherwise torn apart the original document, so I'd be surprised if you could find any vestiges of the original file left. I think the list is very informative; it came out in 1990, though, which makes it somewhat outdated. I also got a lot of information from the works listed in my bibliography, (it's at the end, after all the quotes) as well as many miscellaneous back issues of such e-zines as _Cheap Truth _, _40Hex_, the _LOD/H Technical Journals_ and _Phrack Magazine_; and print magazines such as _Internet Underground_, _Macworld_, _Mondo 2000_, _Newsweek_, _2600: The Hacker Quarterly_, _U.S. News & World Report_, _Time_, and _Wired_; in addition to various people I've consulted.
    [Show full text]
  • Tangled Web : Tales of Digital Crime from the Shadows of Cyberspace
    TANGLED WEB Tales of Digital Crime from the Shadows of Cyberspace RICHARD POWER A Division of Macmillan USA 201 West 103rd Street, Indianapolis, Indiana 46290 Tangled Web: Tales of Digital Crime Associate Publisher from the Shadows of Cyberspace Tracy Dunkelberger Copyright 2000 by Que Corporation Acquisitions Editor All rights reserved. No part of this book shall be reproduced, stored in a Kathryn Purdum retrieval system, or transmitted by any means, electronic, mechanical, pho- Development Editor tocopying, recording, or otherwise, without written permission from the Hugh Vandivier publisher. No patent liability is assumed with respect to the use of the infor- mation contained herein. Although every precaution has been taken in the Managing Editor preparation of this book, the publisher and author assume no responsibility Thomas Hayes for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein. Project Editor International Standard Book Number: 0-7897-2443-x Tonya Simpson Library of Congress Catalog Card Number: 00-106209 Copy Editor Printed in the United States of America Michael Dietsch First Printing: September 2000 Indexer 02 01 00 4 3 2 Erika Millen Trademarks Proofreader Benjamin Berg All terms mentioned in this book that are known to be trademarks or ser- vice marks have been appropriately capitalized. Que Corporation cannot Team Coordinator attest to the accuracy of this information. Use of a term in this book should Vicki Harding not be regarded as affecting the validity of any trademark or service mark. Design Manager Warning and Disclaimer Sandra Schroeder Every effort has been made to make this book as complete and as accurate Cover Designer as possible, but no warranty or fitness is implied.
    [Show full text]
  • Flexible Infections: Computer Viruses, Human Bodies, Nation-States, Evolutionary Capitalism
    Science,Helmreich Technology, / Flexible Infections& Human Values Flexible Infections: Computer Viruses, Human Bodies, Nation-States, Evolutionary Capitalism Stefan Helmreich New York University This article analyzes computer security rhetoric, particularly in the United States, argu- ing that dominant cultural understandings of immunology, sexuality, legality, citizen- ship, and capitalism powerfully shape the way computer viruses are construed and com- bated. Drawing on popular and technical handbooks, articles, and Web sites, as well as on e-mail interviews with security professionals, the author explores how discussions of computer viruses lean on analogies from immunology and in the process often encode popular anxieties about AIDS. Computer security rhetoric about compromised networks also uses language reminiscent of that used to describe the “bodies” of nation-states under military threat from without and within. Such language portrays viruses using images of foreignness, illegality, and otherness. The security response to viruses advo- cates the virtues of the flexible and adaptive response—a rhetoric that depends on evolu- tionary language but also on the ideological idiom of advanced capitalism. As networked computing becomes increasingly essential to the operations of corporations, banks, government, the military, and academia, worries about computer security and about computer viruses are intensifying among the people who manage and use these networks. The end of the 1990s saw the emergence of a small industry dedicated to antivirus protection software, and one can now find on the World Wide Web a great deal of information about how viruses work, how they can be combated, and how computer users might keep up with ever-changing inventories and taxonomies of the latest viruses.
    [Show full text]
  • The Hackers Profiling Project (HPP)
    The Hackers Profiling Project (HPP) Presentation by Raoul Chiesa United Nations, Consultant on cybercrime Interregional Crime and Justice Research Institute (UNICRI) Counter Human Trafficking and Emerging Crimes Unit The Hackers Profiling Project (HPP) What is UNICRI? A United Nations entity established in 1968 to support countries worldwide in crime prevention and criminal justice UNICRI carries out applied research, training, technical cooperation and documentation / information activities UNICRI dissemi nat es ifinforma tion and maitiintains contttactswith professionals and experts worldwide Counter Human Trafficking and Emerging Crimes Unit: cyber crimes, counterfeiting, environmental crimes, trafficking in stolen works of art… The Hackers Profiling Project (HPP) What is ISECOM? Institute for Security and Open Methodologies (Est. 2002) A registered Non-Profit Organization Headquarters in Barcelona (Spain) and New York (U.S.A.) An Open Source Community Registered OSI, using Open and Peer Review process to assure quality and develop a Chain of Trust A Certification Authority grounded in trust and backed by Academic Institutions (La Salle University network) The Hackers Profiling Project (HPP) Cybercrime In recent years we have observed a series of “worrying” developments: A dramatic decrease in the “window of exposure” Dangerous synergies between technologically advanced personalities, classic criminality and terrorism Increase of the dependence between homeland security, telecommunications, fundamental services and ICT Security issues Nevertheless, often the cybercrime phenomenon is analysed in a wrong manner The Hackers Profiling Project (HPP) Hackers The term hacker has been heavily misused since the 80’s; since the 90’s, the mainstream have used it to justify every kind of “IT crime”, from very low-level attacks to massive DDoS Lamers, script-kiddies, industrial spies, hobbiest hackers….for the mass, they are all the same From a business point of view, companies don’t clearly know who they should be afraid of.
    [Show full text]
  • Basics of Ethical Hacking – Manthan M. Desai
    Hacking For Beginners – Manthan Desai 2010 Legal Disclaimer Any proceedings and or activities related to the material contained within this book are exclusively your liability. The misuse and mistreat of the information in this book can consequence in unlawful charges brought against the persons in question. The authors and review analyzers will not be held responsible in the event any unlawful charges brought against any individuals by misusing the information in this book to break the law. This book contains material and resources that can be potentially destructive or dangerous. If you do not fully comprehend something on this book, don‘t study this book. Please refer to the laws and acts of your state/region/ province/zone/territory or country before accessing, using, or in any other way utilizing these resources. These materials and resources are for educational and research purposes only. Do not attempt to violate the law with anything enclosed here within. If this is your intention, then leave now. While using this book and reading various hacking tutorials, you agree to follow the below mentioned terms and conditions: 1. All the information provided in this book is for educational purposes only. The book author is no way responsible for any misuse of the information. 2. "Hacking for Beginners” is just a term that represents the name of the book and is not a book that provides any illegal information. “Hacking for Beginners” is a book related to Computer Security and not a book that promotes hacking/cracking/software piracy. 3. This book is totally meant for providing information on "Computer Security”, "Computer Programming” and other related topics and is no way related towards the terms "CRACKING” or "HACKING” (Unethical).
    [Show full text]
  • Copyrighted Material
    INDEX Abene, Mark (Phiber Optik), 70 Appearance points (AP), wireless Access key, 72 networks, 73, 74 AccessData, 40. See also FTK Appendixes, inclusion in report, 56 ActiveX, 77 Apple Computer, 6 ADC (analog-to-digital conversion), 21 Application and file analysis, 123–125 Adleman, Len, 51 Application suites, 39, 40, 55 Admissibility of evidence ARPANET, 4 acceptable alteration of evidence, 29 Arrest and arraignment, 60 chain of custody, 119, 134, 135 ASCII (American Standard Code for and choosing course of action, 29, 30 Information Exchange), 18, 39 and goal of computer forensics, 13 Assembly language, 3 hearsay, 135–137 Asymmetric keys, 48, 49 and record keeping, 53 ATA disks, 118 Attorney-client privilege, 61 relevance, 132–134 Auction fraud, 97–99 reliability, 26, 131, 132, 135, 136 Authentication, wireless networks, 72 Adware, 75, 77, 78 AvantStar Products, 124 American Standard Code for Information Exchange (ASCII), 18, 39 Analog-to-digital conversion (ADC or Backdoors, 77–79, 112 A/D), 21 Backus, John, 3 Analog versus digital, 17, 18, 21 Bait-and-switch fraud, 98, 99 Analysis Base-2, 19 Base-10, 19, 20 application and file analysis, 123, 124 Base-16, 19 data encryption, 47–49 Basic input output system. See BIOS deleted files, 43, 44 http://www.pbookshop.comBasic integrated operating system. See execution files, 41 BIOS file extensions, 44, 45 Best evidence rule, 26, 135 file slack. See File slack Binary system, 17, 18, 20–22 file structures, 45, 46 BIOS, 32, 33, 116, 123 hidden data,COPYRIGHTED 123 Bit-stream MATERIAL images, 119 password
    [Show full text]
  • Joseph Migga Kizza Fourth Edition
    Computer Communications and Networks Joseph Migga Kizza Guide to Computer Network Security Fourth Edition Computer Communications and Networks Series editor A.J. Sammes Centre for Forensic Computing Cranfield University, Shrivenham Campus Swindon, UK The Computer Communications and Networks series is a range of textbooks, monographs and handbooks. It sets out to provide students, researchers, and nonspecialists alike with a sure grounding in current knowledge, together with comprehensible access to the latest developments in computer communications and networking. Emphasis is placed on clear and explanatory styles that support a tutorial approach, so that even the most complex of topics is presented in a lucid and intelligible manner. More information about this series at http://www.springer.com/series/4198 Joseph Migga Kizza Guide to Computer Network Security Fourth Edition Joseph Migga Kizza University of Tennessee Chattanooga, TN, USA ISSN 1617-7975 ISSN 2197-8433 (electronic) Computer Communications and Networks ISBN 978-3-319-55605-5 ISBN 978-3-319-55606-2 (eBook) DOI 10.1007/978-3-319-55606-2 Library of Congress Control Number: 2017939601 # Springer-Verlag London 2009, 2013, 2015 # Springer International Publishing AG 2017 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc.
    [Show full text]
  • A History of Cyber Security Attacks 1980 to Present a History of Cyber Security Attacks 1980 to Present
    A History of Cyber Security Attacks 1980 to Present http://taylorandfrancis.com A History of Cyber Security Attacks 1980 to Present Bruce Middleton CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2017 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed on acid-free paper International Standard Book Number-13: 978-1-4987-8586-0 (Hardback) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, trans- mitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright .com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc.
    [Show full text]
  • Lesson 1: Being a Hacker
    LESSON 1 BEING A HACKER Lesson 1: Being a Hacker WARNING The Hacker Highschool Project is a learning tool and as with any learning tool there are dangers. Some lessons, if abused, may result in physical injury. Some additional dangers may also exist where there is not enough research on possible effects of emanations from particular technologies. Students using these lessons should be supervised yet encouraged to learn, try, and do. However ISECOM cannot accept responsibility for how any information herein is abused. The following lessons and workbooks are open and publicly available under the following terms and conditions of ISECOM: All works in the Hacker Highschool Project are provided for non-commercial use with elementary school students, junior highschool students, and highschool students whether in a public institution, private institution, or a part of home-schooling. These materials may not be reproduced for sale in any form. The provision of any class, course, training, or camp with these materials for which a fee is charged is expressly forbidden without a license, including college classes, university classes, trade-school classes, summer or computer camps, and similar. To purchase a license, visit the LICENSE section of the HHS web page at http://www.hackerhighschool.org/licensing.html. The Hacker Highschool Project is an open community effort and if you find value in this project, we ask that you support us through the purchase of a license, a donation, or sponsorship. 2 Lesson 1: Being a Hacker Table of Contents For the
    [Show full text]
  • How Hackers Think: a Mixed Method Study of Mental Models and Cognitive Patterns of High-Tech Wizards
    HOW HACKERS THINK: A MIXED METHOD STUDY OF MENTAL MODELS AND COGNITIVE PATTERNS OF HIGH-TECH WIZARDS by TIMOTHY C. SUMMERS Submitted in partial fulfillment of the requirements For the degree of Doctor of Philosophy Dissertation Committee: Kalle Lyytinen, Ph.D., Case Western Reserve University (chair) Mark Turner, Ph.D., Case Western Reserve University Mikko Siponen, Ph.D., University of Jyväskylä James Gaskin, Ph.D., Brigham Young University Weatherhead School of Management Designing Sustainable Systems CASE WESTERN RESERVE UNIVESITY May, 2015 CASE WESTERN RESERVE UNIVERSITY SCHOOL OF GRADUATE STUDIES We hereby approve the thesis/dissertation of Timothy C. Summers candidate for the Doctor of Philosophy degree*. (signed) Kalle Lyytinen (chair of the committee) Mark Turner Mikko Siponen James Gaskin (date) February 17, 2015 *We also certify that written approval has been obtained for any proprietary material contained therein. © Copyright by Timothy C. Summers, 2014 All Rights Reserved Dedication I am honored to dedicate this thesis to my parents, Dr. Gloria D. Frelix and Dr. Timothy Summers, who introduced me to excellence by example and practice. I am especially thankful to my mother for all of her relentless support. Thanks Mom. DISCLAIMER The views expressed in this dissertation are those of the author and do not reflect the official policy or position of the Department of Defense, the United States Government, or Booz Allen Hamilton. Table of Contents List of Tables ....................................................................................................................
    [Show full text]