Diary of a Hacker

What I am about to write about happened in October of 1988, right after I had turned 16. Yes, I had a Computer. Yes, I was a hacker. Yes, this is my story. This story is all …

The FBI fights computer crime

The FBI fights computer crime with weapons that are at least ten years old, according to one insider with contacts deep inside the “hacker” community. Hampered by …

Dial Back isn’t always secure

Date: Thu, 28-Feb-85 Subject: Dial Back isn’t always secure From: [usenet via anonymous donor] An increasingly popular technique for protecting dial-in ports from the …

The CyberPunk Movement

There’s been a lot of talk lately about the CyberPunk Movement – maybe a little too much talk (please, Mr. Hewson, don’t sue me for plagiarism! 🙂 ). It seems …

For Your Protection

From 2600 magazine volume 7, number 1 SPRING To Subscribe: 2600, PO BOX 752, Middle Island, NY 11953-0752 $18 individual, $45 corporate yearly subscription rates FOR YOUR …

Hackers Penetrate DOD Computer Systems

United States General Accounting Office ___________________________________ GAO Testimony Before the Subcommittee on Government Information and Regulation, Committee on …

List of Computer Hackers News Articles

The following is a list of articles that I have found concerning the computer underground in various magazines and news-papers. The list is in chronological order. If you know …

Acronyms 02

It’s amazing that my first Acronym’s text file went over so well! So, here’s the second and much larger companion to it…Acro 2. Yeah, I know 2 days is …

Acronyms 01

A lot of you are probably feeling the same I way am right at the moment I am writing this file. I just got done applying for a nice board and I simply went blank while filling …

CIRR Database

A tool for corporate research For more info, contact: Kerry Dressler through EnviroNet mail CIRR actually stands for the Company and Industrial Research Reports Datebase. Not …