The Best Of 2600: A Hacker Odyssey

E-Book Overview

Since 1984, the quarterly magazine 2600 has provided fascinating articles for readers who are curious about technology. Find the best of the magazine’s writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker’s perspective. Included are stories about the creation of the infamous tone dialer “red box” that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks.

E-Book Content

94192ffirs.qxd 6/3/08 11:18 PM Page i The Best of 2600 A Hacker Odyssey Emmanuel Goldstein Wiley Publishing, Inc. 94192ffirs.qxd 6/3/08 11:18 PM Page ii The Best of 2600: A Hacker Odyssey Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-29419-2 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Website is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Website may provide or recommendations it may make. Further, readers should be aware that Internet Websites listed in this work may have changed or disappeared between when this work was written and when it is read. For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (800) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002. Library of Congress Cataloging-in-Publication Data: Goldstein, Emmanuel, 1959The best of 2600 : a hacker odyssey / Emmanuel Goldstein. p. cm. Includes bibliographical references and index. ISBN 978-0-470-29419-2 (cloth) 1. Computer security—History. 2. Computer crimes—History. 3. Computer hackers—History. 4. Telecommunication—Security measures—History. 5. Wiretapping—History. I. 2600. II. Title. III. Title: Best of 2,600. QA76.9.A25G643 2008 005.8—dc22 2008018567 2 Trademarks: Wiley and the
You might also like

Parallel And Distributed Logic Programming
Authors: Bhattacharya A. , Konar A. , Mandal A.    187    0


Distributed Computing: Principles, Algorithms, And Systems
Authors: Ajay D. Kshemkalyani , Mukesh Singhal    106    0


Perl Programming For Biologists
Authors: D. Curtis Jamison    119    0


Spatial Data Modeling For 3d Gis
Authors: Alias Abdul-Rahman , Morakot Pilouk    140    0


Shape Analysis And Structuring
Authors: Leila de Floriani , Michela Spagnuolo    137    0


Introduction To Lambda Calculus
Authors: Barendregt H. , Barendsen E.    139    0


Fortran 90 For Scientists And Engineers
Authors: Brian Hahn    159    0


System Theory, The Schur Algorithm And Multidimensional Analysis
Authors: Daniel Alpay , Victor Vinnikov    207    0


Linear Programming: Introduction
Authors: Dantzig G. , Thapa M.    202    0