Phone Losers of America

Total Page:16

File Type:pdf, Size:1020Kb

Phone Losers of America PHONE LOSERS OF AMERICA: by Brad Carter SMASHWORDS EDITION * * * * * PUBLISHED BY: Big Beef Bueno Books on Smashwords Phone Losers of America: Copyright © 2010 by Big Beef Bueno Books Smashwords Edition License Notes This ebook is licensed for your personal enjoyment only. This ebook may not be re-sold or given away to other people. If you would like to share this book with another person, please purchase an additional copy for each person you share it with. If you're reading this book and did not purchase it, or it was not purchased for your use only, then you should return to Smashwords.com and purchase your own copy. Thank you for respecting the author's work. Foreword by Rob Vincent “I'm amazed at the accomplishments of PLA. Reading or hearing about different entities and organizations getting exploited with a hilarious twist is my idea of the perfect read.” -beerfuck It was a late summer night, sometime in the mid 1990s. Dressed in dark clothes, backpack slung over my shoulder, I snuck out the window of my bedroom. From my back yard I headed across town to my favorite rooftop, the high one with easy access to a building's worth of telephone lines belonging to businesses which had closed and emptied for the day. There was a convenient fire escape reaching from the ground straight up to the roof, and no nosy neighbors anywhere within view. I reached the roof, hooked my cheap plastic phone up by starlight, and dialed a string of digits I knew by heart. The phone ringing soothed me until it ended in a clumsy analog clatter. A gruff voice I'd come to know well mumbled a sleepy, “Hello?” “Cactus?” I responded cheerily, in a voice the called party had grown to know equally well. Their resulting string of swear words was awesome. I'd first come across the Phone Losers of America in text files on BBSes a year or so earlier. In the mid '90s, the BBS scene was still desperately trying to be all cool and underground and exclusive. Countless text files which mostly looked and sounded alike, wrapped what actual information they had in an air of forced mystery, all “we are super-elite and we grace you with this meager info because we are so much smarter and cooler than you.” Smarter I could have believed. I was a total newbie and knew it, but I also knew I definitely wasn't cooler than very many people. I was the quiet, brooding, artsy, fat, nerdy kid with social anxieties in the back of the classroom who read 2600 and listened to Off the Hook. “Cool” was something that happened to other people, most of whom enjoyed kicking the crap out of me for being different, so why would my fellow nerds waste our time pretending otherwise in what was entirely our own world? That whole act struck me as really dull, stupid, and unconvincing. Every so often, though, I'd find a file with a sense of humor. Something that spoke my language. Instead of forcing an unconvincing Disney villain act, the author was obviously having some damned fun for a change, and his life seemed to be an endless quest to amuse himself and others. These were the files I'd save to disk, maybe print out to hard copy, and reread often. It didn't take me too long to recognize that most of these really cool files were from a ’zine called "Phone Losers of America." They actually labeled themselves "losers," celebrated it even! How great was that? To a loser like me, pretty freaking great! The writer, RedBoxChiliPepper, didn't just focus on phreak and hacker tricks. The PLA zine was a jolly mix of jokes, pranks, insane adventures, endless non-sequiturs involving some guy named Roy and a certain breed of thorny desert plant, and guides to the exact sorts of irresponsible hobbies I'd taken up to preserve what passed for my boyhood sanity. RBCP celebrated the angry and absurd right alongside my own twisted sense of humor, and taught stupid tech tricks while he was at it. By day I might have been too much of a loser to stop the "cool" kids from making my life hell, but by night I was just enough of a loser to make sure their phones kept mysteriously ringing nonstop, their mailbox was overstuffed with magazine subscriptions, or their cable bill was loaded with expensive pornography for their troubles. When you're a miserable kid who feels like nothing makes sense and the entire world is against you, your first instinct is usually to lash out and break some shit in retaliation. Using my growing skill set to accomplish the petty acts of destructive revenge every oppressed teenager dreams about, I was able to have the last laugh in my own aching head. It was more than that, though... lying on that rooftop, looking up at the stars, with endless possibilities at my fingertips as my nerdy skills, explorations, and pursuits became things I could actually make work for me, I felt like I was finally part of a world which could be a fun and entertaining place, and in which my taking part made some damn sense. Eventually, I grew up a little. School ended, I became prosecutable as an adult and a lot less willing to pursue a life of petty crime. Without my former peers to worry about, I had a chance to finally live life on my own terms and develop my own opinions of what was "cool." For example, I rediscovered how fascinating the tech and telecom worlds were in their own right, when I wasn't just focusing on what I could use from them toward irresponsible ends. No longer out to make a pain in the ass or a criminal of myself, I realized I'd always be a hacker. Fast-forward 15 years or so. Things have certainly changed around here. Through growing up with the PLA I built up the courage to get out of the damn house and start attending 2600 meetings. Finding crowds in which I truly belonged led me to finally figure out how to deal with other people, a skill which I hadn't had cause or ability to develop before. Taking an active role in hacker culture and meeting like-minded geeks has led to my greatest friendships, as well as my involvement with hacker conferences and Off the Hook. Helping newbies find their niche in the ever-evolving hacker community has become one of the driving forces in my life. Against everything I ever expected, my creative pursuits have actual audiences! I'm living the sort of life I've always wanted to, surrounded by a far better crowd of wonderful people than I ever could have asked for. My world is still an amazingly fun place, and I don't see how any of this would have happened were it not for what those crazy text files and their nerdy shits and giggles did for me half my lifetime ago. These are the tales you now find yourself holding in the form of a book by my brilliant friend Brad Carter, RBCP himself. Nowadays, those expensive phone calls I was going to such risk and trouble to steal range from dirt-cheap to free. I've matured into something like a reasonably responsible adult, far more interested in learning, teaching, and getting a laugh than randomly breaking stuff. But if sometime today, tomorrow, or far into the mysterious future you find yourself with access to a certain stream of telecommunications data, don't be too surprised if it decodes to a voice not unlike my own, still cheerfully asking some unsuspecting human the eternal question... "Cactus?" Rob T Firefly Rob Vincent New York, USA, September 2010 Leaving “One Saturday morning I started browsing the PLA forums on my laptop. Within two minutes, I was connected to the speakerphone inside an elevator in a Las Vegas casino, yelling at the occupants to stop farting in the elevator... all the way from Australia. If that's not cool, then I don't know what is! Thanks PLA!” -Tim My life abruptly changed the night I let my best friend die in a gruesome phone phreaking accident. The accident wasn’t exactly my fault, but I kind of assumed that the whole thing would be blamed on me since I was there and did nothing about it. So I panicked and I ran away. Looking back, I realize I could have handled it differently, but this is what I did instead. It began in the Spring of 1990 in Edwardsville, Illinois. It was around 3 o’clock in the morning and I sat upon a hill in a stranger's back yard, overlooking the back of the phone company building. My job was to keep a lookout as my partner in crime, Doug, rummaged around in a dumpster next to the building. We were behind the Illinois Bell building where they parked all the phone company vans and stored a few old broken phone booths. It wasn't a fenced-in area but it should have been. It's a wonder that any phone company would leave their dumpster wide open like they did. Phone phreaks had been using the “trash” found in dumpsters for decades to acquire confidential information from the phone companies, yet very few bother locking their dumpsters even today. Sometimes we would both climb into the dumpster, grab a few bags and throw them in my car.
Recommended publications
  • Universidad Pol Facultad D Trabajo
    UNIVERSIDAD POLITÉCNICA DE MADRID FACULTAD DE INFORMÁTICA TRABAJO FINAL DE CARRERA ESTUDIO DEL PROTOCOLO XMPP DE MESAJERÍA ISTATÁEA, DE SUS ATECEDETES, Y DE SUS APLICACIOES CIVILES Y MILITARES Autor: José Carlos Díaz García Tutor: Rafael Martínez Olalla Madrid, Septiembre de 2008 2 A mis padres, Francisco y Pilar, que me empujaron siempre a terminar esta licenciatura y que tanto me han enseñado sobre la vida A mis abuelos (q.e.p.d.) A mi hijo icolás, que me ha dejado terminar este trabajo a pesar de robarle su tiempo de juego conmigo Y muy en especial, a Susana, mi fiel y leal compañera, y la luz que ilumina mi camino Agradecimientos En primer lugar, me gustaría agradecer a toda mi familia la comprensión y confianza que me han dado, una vez más, para poder concluir definitivamente esta etapa de mi vida. Sin su apoyo, no lo hubiera hecho. En segundo lugar, quiero agradecer a mis amigos Rafa y Carmen, su interés e insistencia para que llegara este momento. Por sus consejos y por su amistad, les debo mi gratitud. Por otra parte, quiero agradecer a mis compañeros asesores militares de Nextel Engineering sus explicaciones y sabios consejos, que sin duda han sido muy oportunos para escribir el capítulo cuarto de este trabajo. Del mismo modo, agradecer a Pepe Hevia, arquitecto de software de Alhambra Eidos, los buenos ratos compartidos alrrededor de nuestros viejos proyectos sobre XMPP y que encendieron prodigiosamente la mecha de este proyecto. A Jaime y a Bernardo, del Ministerio de Defensa, por haberme hecho descubrir las bondades de XMPP.
    [Show full text]
  • Users As Co-Designers of Software-Based Media: the Co-Construction of Internet Relay Chat
    Users as Co-Designers of Software-Based Media: The Co-Construction of Internet Relay Chat Guillaume Latzko-Toth Université Laval AbsTrAcT While it has become commonplace to present users as co-creators or “produsers” of digital media, their participation is generally considered in terms of content production. The case of Internet Relay Chat (IRC) shows that users can be fully involved in the design process, a co-construction in the sense of Science and Technology Studies (STS): a collective, simultaneous, and mutual construction of actors and artifacts. A case study of the early de - velopment of two IRC networks sheds light on that process and shows that “ordinary users” managed to invite themselves as co-designers of the socio-technical device. The article con - cludes by suggesting that IRC openness to user agency is not an intrinsic property of software- based media and has more to do with its architecture and governance structure. Keywords Digital media; Communication technology; Co-construction; Design process; Ordinary user résumé Il est devenu banal de présenter l’usager comme cocréateur ou « produtilisateur » des médias numériques, mais sa participation est généralement envisagée comme une production de contenus. Le cas d’IRC (Internet Relay Chat) montre que les usagers des médias à support logiciel peuvent s’engager pleinement dans le processus de conception, une co-construction au sens des Science and Technology Studies : une construction collective, simultanée et mutuelle des acteurs et des artefacts. Une étude de cas portant sur le développement de deux réseaux IRC éclaire ce processus et montre que les « usagers ordinaires » sont parvenus à s’inviter comme co-concepteurs du dispositif.
    [Show full text]
  • Internet Relay Chat. ERIC Digest
    ED425743 1999-01-00 Internet Relay Chat. ERIC Digest. ERIC Development Team www.eric.ed.gov Table of Contents If you're viewing this document online, you can click any of the topics below to link directly to that section. Internet Relay Chat. ERIC Digest............................................... 1 WHY USE INTERNET RELAY CHAT?..................................... 2 WHAT IS REQUIRED?........................................................ 2 HOW IS IRC ORGANIZED?.................................................. 3 NETS..............................................................................3 CHANNELS......................................................................3 OPS............................................................................... 3 NICKS.............................................................................4 HOW DO YOU FIND, JOIN, OR CREATE A CHANNEL?............... 4 CAN YOU SEND A PRIVATE MESSAGE?................................ 4 HOW DOES ONE EXIT AN IRC CHAT?................................... 4 WHAT ARE THE DISADVANTAGES OF IRC?............................4 WHAT EDUCATIONAL BENEFITS CAN I EXPECT?....................5 ERIC Identifier: ED425743 Publication Date: 1999-01-00 Author: Simpson, Carol Source: ERIC Clearinghouse on Information and Technology Syracuse NY. Internet Relay Chat. ERIC Digest. ED425743 1999-01-00 Internet Relay Chat. ERIC Digest. Page 1 of 6 www.eric.ed.gov ERIC Custom Transformations Team THIS DIGEST WAS CREATED BY ERIC, THE EDUCATIONAL RESOURCES INFORMATION CENTER. FOR MORE
    [Show full text]
  • The Representation of Women in Romantic Comedies Jordan A
    Ursinus College Digital Commons @ Ursinus College Media and Communication Studies Honors Papers Student Research 4-24-2017 Female Moments / Male Structures: The Representation of Women in Romantic Comedies Jordan A. Scharaga Ursinus College, [email protected] Adviser: Jennifer Fleeger Follow this and additional works at: https://digitalcommons.ursinus.edu/media_com_hon Part of the Communication Commons, Film and Media Studies Commons, and the Gender and Sexuality Commons Click here to let us know how access to this document benefits oy u. Recommended Citation Scharaga, Jordan A., "Female Moments / Male Structures: The Representation of Women in Romantic Comedies" (2017). Media and Communication Studies Honors Papers. 6. https://digitalcommons.ursinus.edu/media_com_hon/6 This Paper is brought to you for free and open access by the Student Research at Digital Commons @ Ursinus College. It has been accepted for inclusion in Media and Communication Studies Honors Papers by an authorized administrator of Digital Commons @ Ursinus College. For more information, please contact [email protected]. Female Moments/Male Structures: The Representation of Women in Romantic Comedies Jordan Scharaga April 24, 2017 Submitted to the Faculty of Ursinus College in fulfillment of the requirements for Distinguished Honors in the Media and Communication Studies Department. Abstract: Boy meets girl, boy loses girl, boy gets girl again. With this formula it seems that romantic comedies are actually meant for men instead of women. If this is the case, then why do women watch these films? The repetition of female stars like Katharine Hepburn, Doris Day and Meg Ryan in romantic comedies allows audiences to find elements of truth in their characters as they grapple with the input of others in their life choices, combat the anxiety of being single, and prove they are less sexually naïve than society would like to admit.
    [Show full text]
  • The Copyright Crusade
    The Copyright Crusade Abstract During the winter and spring of 2001, the author, chief technology officer in Viant's media and entertainment practice, led an extensive inqUiry to assess the potential impact of extant Internet file-sharing capabilities on the business models of copyright owners and holders. During the course of this project he and his associates explored the tensions that exist or may soon exist among peer-to-peer start-ups, "pirates" and "hackers," intellectual property companies, established media channels, and unwitting consumers caught in the middle. This research report gives the context for the battleground that has emerged, and calls upon the players to consider new, productive solutions and business models that support profitable, legal access to intellectual property via digital media. by Andrew C Frank. eTO [email protected] Viant Media and Entertainment Reinhold Bel/tIer [email protected] Aaron Markham [email protected] assisted by Bmre Forest ~ VI ANT 1 Call to Arms Well before the Internet. it was known that PCs connected to two-way public networks posed a problem for copyright holders. The problem first came to light when the Software Publishers Association (now the Software & Information Industry Association), with the backing of Microsoft and others, took on computer Bulletin Board System (BBS) operators in the late 1980s for facilitating trade in copyrighted computer software, making examples of "sysops" (as system operators were then known) by assisting the FBI in orchestrat­ ing raids on their homes. and taking similar legal action against institutional piracy in high profile U.S. businesses and universities.' At the same time.
    [Show full text]
  • VIRTUS and Rfarley.Com 1 CHILD SEXUAL ABUSE CRIMES
    INTERNET SAFETY: New Challenges in Protecting God’s Children Online 2007 National Safe Environment Leadership Conference by Robert Hugh Farley Robert Hugh Farley M.S. Consultant in Crimes …against Children Chicago, IL USA www.RFarley.com www.RFarley.com Download your copy of the seminar handout materials online at www.virtus.org VIRTUS and RFarley.com 1 CHILD SEXUAL ABUSE CRIMES z Opportunity z Desire z Children are perfect victims www.RFarley.com THE ONLINE CHILD MOLESTER www.RFarley.com CHILD SEXUAL ABUSE IS AN OLD CRIME Computers … z New technique for molesters to gain access to children z New tools z New evidence But it’s still the same old crime ! www.RFarley.com VIRTUS and RFarley.com 2 NEW PROGRAM FOR 2007 www.RFarley.com EVOLUTION OF ONLINE CRIMES z Text dialogue z Still images z Moving images z Real times images www.RFarley.com WEBCAM AND “REAL TIME” PROBLEMS FOR CHILDREN www.RFarley.com VIRTUS and RFarley.com 3 WEBCAM CASE ILLUSTRATION “MENO” www.RFarley.com CHILD EXPLOITATION HISTORY Beyond Computers …. z Cell phones z Text messaging –SMS z Internet access www.RFarley.com TEXT MESSAGES Do yur kds snd msgz lik DIS 1? Try texting this back U r like so grounded 4ever cya www.RFarley.com VIRTUS and RFarley.com 4 IDENTIFICATION OF COMPUTER TERMS www.RFarley.com COMPUTER HARDWARE z System box or base unit z Monitor z Keyboard z Pointing device z Audio devices z Printer www.RFarley.com MOLESTER PERIPHERALS z Scanners z Digital cameras z Video devices www.RFarley.com VIRTUS and RFarley.com 5 CHILD MOLESTER COLLECTIONS www.RFarley.com ELEMENTS OF THE COLLECTION z Child erotica z Child pornography z Trophies www.RFarley.com DOWNLOAD A FILE z Received from an external source z Storage - hard drive vs.
    [Show full text]
  • Introduction to Online Sexual Exploitation Curriculum 1 Safe Online Outreach Project Learning Objectives
    Introduction To Online Sexual Exploitation: Curriculum February 2003 Safe OnLine Outreach Project © M. Horton 2003 Safe OnLine Outreach Project Acknowledgements This document is the result of many hours of hard work and dedication. I'd like to thank Renata Karrys, Jaynne Aster, Nikki O'Halloran, Charlaine Avery, Lisa Ingvallsen and Elizabeth Nethery for their support and assistance in producing this document. Additionally the SOLO Advisory Committee, the Canadian National Crime Prevention - Community Mobilization Program, the Vancouver Foundation, Athabasca University/MediaCan and Parents Against Sexual Abuse have all been instrumental in turning this idea into a Project. Lastly, David and Conor have been silent contributors to this project since it began. Their support is woven into each page. Merlyn Horton SOLO Project Coordinator February 2003 Safe OnLine Outreach Project February 3, 2003 Introduction to the Curriculum Dear Reader, The curriculum you hold in your hands was produced in a former pottery studio in the middle of a coastal rain forest in British Columbia, Canada; the physical launch pad for this examination of a virtual issue. It is the result of three years of research. This introduction is intended to outline a context for the curriculum and to give you an overview of how to use this curriculum, who should present this curriculum and how appropriate audiences might be chosen. Context The philosophical foundation for this curriculum, and indeed for the Safe OnLine Outreach Project, is the United Nations Convention on the Rights of the Child (CRC)1. The CRC is one of four Conventions created by the United Nations to further the goal of recognizing the inherent dignity and rights of all members of the human family2.
    [Show full text]
  • The Rubberbandits' Guide to Satire
    Estudios Irlandeses, Issue 16, 2021, pp. 79-94. https://doi.org/10.24162/EI2021-9984 ____________________________________________________________________________________________ AEDEI The Rubberbandits’ Guide to Satire: Absurdism and Social Commentary in a Cross-Media Environment Faye Mercier University of Amsterdam, The Netherlands Copyright (c) 2021 by Faye Mercier. This text may be archived and redistributed both in electronic form and in hard copy, provided that the author and journal are properly cited and no fee is charged for access. Abstract. This paper argues that through an engagement with cross-media hybridity, Irish comedy duo The Rubberbandits have established a dynamic cross-media forum that aims to restore the Irish public’s capacity for critical social and political engagement. Central to this process is The Rubberbandits’ ability to use their absurdist satire as a foundational tool that can serve as the basis of this cultural forum, while also facilitating the negotiation of social and political issues across a variety of media. Given that this cultural forum exists across different media, platforms, and formats, this paper sets out to analyse the various ways in which the duo have adapted their satirical style to suit the demands of these different media forms, and what implications this process of adaption has had on their work. Beginning with an analysis of the social and critical functions of satirical comedy more broadly, this paper will then focus on the specific brand of satirical social commentary employed by The Rubberbandits, paying particular attention to the role of absurdity in their critical engagement with prominent issues facing Irish society. As this paper will demonstrate, by embracing the hybridity of the cross- media environment, all the while maintaining their absurdist satirical style, The Rubberbandits have established a dynamic and carnivalesque cross-media forum that aims to restore the Irish public’s capacity for critical social and political engagement.
    [Show full text]
  • Kari Cwynar, Experimental Comedy Training Camp, C
    !" Experimental Comedy Training Camp by Kari Cwynar Life of a Craphead, Doored, 2012 PHOTO: YUULA BENIVOLSKI; IMAGE COURTESY OF THE ARTISTS Experimental Comedy pp!"#–$% Training Camp By Kari Cwynar In September $*#$, two performance artists - Ieva Misevičiūtė and Michael Portnoy – arrived at The Ban) Centre to lead a thematic residency titled “Experimental Comedy Training Camp”. Joined by comedian Reggie Watts, cartoonist Steven Johnson, and curator Mai Abu ElDahab, they worked with $* young artists over six weeks, devising a rigorous structure for this “training camp” that included daily improv sessions, movement workshops, experiments in the break-down of language and frequent performances in the “Experimental Comedy Club”. Three months later, there were reports of a new per- once a year you have the opportunity to do something in a formance series in Toronto: Doored – a monthly comedic theatre or gallery space. You also get asked to perform on variety show hosted at Double Double Land by Life of buses, on the street… we got asked to do a performance on a a Craphead, the collaborative duo of Amy Lam and Jon canoe (!!!). Which is fine, but then it’s hard to do consistent McCurley, who had just returned from “Experimental work that you can build on….”# Having begun their careers Comedy Training Camp”. While in Banff, they met a as performers at comedy shows because of the structure number of artists – Neil LaPierre, Bridget Moser and and consistency, Lam and McCurley were now eager to Fake Injury Party – who all ended up back in Toronto; host performance artists and audiences in the same way.
    [Show full text]
  • Botnets, Zombies, and Irc Security
    Botnets 1 BOTNETS, ZOMBIES, AND IRC SECURITY Investigating Botnets, Zombies, and IRC Security Seth Thigpen East Carolina University Botnets 2 Abstract The Internet has many aspects that make it ideal for communication and commerce. It makes selling products and services possible without the need for the consumer to set foot outside his door. It allows people from opposite ends of the earth to collaborate on research, product development, and casual conversation. Internet relay chat (IRC) has made it possible for ordinary people to meet and exchange ideas. It also, however, continues to aid in the spread of malicious activity through botnets, zombies, and Trojans. Hackers have used IRC to engage in identity theft, sending spam, and controlling compromised computers. Through the use of carefully engineered scripts and programs, hackers can use IRC as a centralized location to launch DDoS attacks and infect computers with robots to effectively take advantage of unsuspecting targets. Hackers are using zombie armies for their personal gain. One can even purchase these armies via the Internet black market. Thwarting these attacks and promoting security awareness begins with understanding exactly what botnets and zombies are and how to tighten security in IRC clients. Botnets 3 Investigating Botnets, Zombies, and IRC Security Introduction The Internet has become a vast, complex conduit of information exchange. Many different tools exist that enable Internet users to communicate effectively and efficiently. Some of these tools have been developed in such a way that allows hackers with malicious intent to take advantage of other Internet users. Hackers have continued to create tools to aid them in their endeavors.
    [Show full text]
  • Sample Chapter
    5674ch01.qxd_jt 9/24/03 8:44 AM Page 1 11 TheThe OnlineOnline WorldWorld 5674ch01.qxd_jt 9/24/03 8:44 AM Page 2 Today’s online world has changed dramatically in the last decade. Back then, online to the average user meant a telephone connection directly to either another computer or to an online service, such as CompuServe or AOL. The Internet now dominates all online activity. In popular parlance, the Internet is synonymous with the World Wide Web, although it is much more, as we’ll explain in this book. The Internet can be described generally as a “network” of networks. It is a transportation vehicle for applications. In fact, the visual representations of the Net look like a road map. If lines are drawn between each connection, between larger and larger connections, and between smaller and smaller ones, the end result is a web of connections—a virtual road map. This book is divided into four rough sections. The first is for beginners. It is to get anyone up to speed quickly with the information needed about the Web. Each chapter has recommended Web sites (to type the address, or Uniform Resource Locator [URL] into your Web browser) to help direct you. The second section has more detailed information about downloads, email, secu- rity, and information on virus protection. The third part is about how to create a Web site, Web tools, blogging, and what you can add to your Web site (such as streaming media, RSS feeds, and XML, among other things). The fourth part is by far the densest.
    [Show full text]
  • Way of the Ferret: Finding and Using Resources on the Internet
    W&M ScholarWorks School of Education Books School of Education 1995 Way of the Ferret: Finding and Using Resources on the Internet Judi Harris College of William & Mary Follow this and additional works at: https://scholarworks.wm.edu/educationbook Part of the Education Commons Recommended Citation Harris, Judi, "Way of the Ferret: Finding and Using Resources on the Internet" (1995). School of Education Books. 1. https://scholarworks.wm.edu/educationbook/1 This Book is brought to you for free and open access by the School of Education at W&M ScholarWorks. It has been accepted for inclusion in School of Education Books by an authorized administrator of W&M ScholarWorks. For more information, please contact [email protected]. DOCUMENT RESUME IR 018 778 ED 417 711 AUTHOR Harris, Judi TITLE Way of the Ferret: Finding andUsing Educational Resources on the Internet. SecondEdition. Education, Eugene, INSTITUTION International Society for Technology in OR. ISBN ISBN-1-56484-085-9 PUB DATE 1995-00-00 NOTE 291p. Education, Customer AVAILABLE FROM International Society for Technology in Service Office, 480 Charnelton Street,Eugene, OR 97401-2626; phone: 800-336-5191;World Wide Web: http://isteonline.uoregon.edu (members: $29.95,nonmembers: $26.95). PUB TYPE Books (010)-- Guides -Non-Classroom (055) EDRS PRICE MF01/PC12 Plus Postage. Mediated DESCRIPTORS *Computer Assisted Instruction; Computer Communication; *Educational Resources;Educational Technology; Electronic Mail;Information Sources; Instructional Materials; *Internet;Learning Activities; Telecommunications; Teleconferencing IDENTIFIERS Electronic Resources; Listservs ABSTRACT This book is designed to assist educators'exploration of the Internet and educational resourcesavailable online. An overview lists the five basic types of informationexchange possible on the Internet, and outlines five corresponding telecomputingoptions.
    [Show full text]