FREE BOOKS

Author's List




PREV.   NEXT  
|<   51   52   53   54   55   56   57   58   59   60   61   62   63   64   65   66   67   68   69   70   71   72   73   74   75  
76   77   78   79   80   81   82   83   84   85   86   87   88   89   90   91   92   93   94   95   96   97   98   99   100   >>   >|  
ice-mail security, and lock out legitimate users, or even shut down the system entirely. Cellular phone-calls, cordless phones, and ship-to-shore telephony can all be monitored by various forms of radio; this kind of "passive monitoring" is spreading explosively today. Technically eavesdropping on other people's cordless and cellular phone-calls is the fastest-growing area in phreaking today. This practice strongly appeals to the lust for power and conveys gratifying sensations of technical superiority over the eavesdropping victim. Monitoring is rife with all manner of tempting evil mischief. Simple prurient snooping is by far the most common activity. But credit-card numbers unwarily spoken over the phone can be recorded, stolen and used. And tapping people's phone-calls (whether through active telephone taps or passive radio monitors) does lend itself conveniently to activities like blackmail, industrial espionage, and political dirty tricks. It should be repeated that telecommunications fraud, the theft of phone service, causes vastly greater monetary losses than the practice of entering into computers by stealth. Hackers are mostly young suburban American white males, and exist in their hundreds--but "phreaks" come from both sexes and from many nationalities, ages and ethnic backgrounds, and are flourishing in the thousands. # The term "hacker" has had an unfortunate history. This book, The Hacker Crackdown, has little to say about "hacking" in its finer, original sense. The term can signify the free-wheeling intellectual exploration of the highest and deepest potential of computer systems. Hacking can describe the determination to make access to computers and information as free and open as possible. Hacking can involve the heartfelt conviction that beauty can be found in computers, that the fine aesthetic in a perfect program can liberate the mind and spirit. This is "hacking" as it was defined in Steven Levy's much-praised history of the pioneer computer milieu, Hackers, published in 1984. Hackers of all kinds are absolutely soaked through with heroic anti-bureaucratic sentiment. Hackers long for recognition as a praiseworthy cultural archetype, the postmodern electronic equivalent of the cowboy and mountain man. Whether they deserve such a reputation is something for history to decide. But many hackers--including those outlaw hackers who are computer intruders, and whose activities are
PREV.   NEXT  
|<   51   52   53   54   55   56   57   58   59   60   61   62   63   64   65   66   67   68   69   70   71   72   73   74   75  
76   77   78   79   80   81   82   83   84   85   86   87   88   89   90   91   92   93   94   95   96   97   98   99   100   >>   >|  



Top keywords:

Hackers

 

history

 

computer

 

computers

 

practice

 

passive

 

activities

 

people

 

eavesdropping

 

hacking


hackers

 

cordless

 
Hacking
 

access

 
information
 

wheeling

 

signify

 

deepest

 
systems
 

potential


describe

 

highest

 

exploration

 

determination

 
intellectual
 
backgrounds
 

ethnic

 

flourishing

 

thousands

 

hacker


nationalities
 
phreaks
 
original
 

unfortunate

 

Hacker

 

Crackdown

 

spirit

 

electronic

 

postmodern

 
equivalent

cowboy

 

mountain

 

archetype

 

cultural

 

sentiment

 

bureaucratic

 

recognition

 

praiseworthy

 

Whether

 
outlaw