corship
Date Submitted: 09/24/2003 19:45:46
URL: http://essay.studyarea.com/cgi-bin/essay/Essay_board.cgi
Forum: Technology_History
Thread Number: 42
[ Go back to previous page ]
--------------------------------------------------------------------------------
Original Message
--------------------------------------------------------------------------------
"Hacker (10000 words)"
Posted by Ditin (Guest) on Apr-21-01 at 10:16 AM
TABLE OF CONTENTS
Introduction . . . . . . . . . . . . . . . . . . . 1
Methodology . . . . . . . . . . . . . . . . . . . 6
What is the Computer Underground? . . . . . . . . 11
Topography of the Computer Underground . . . . . . 20
Hacking . . . . . . . . . . . . . . . . . 20
Phreaking . . . . . . . . . . . . . . . . . . 21
Pirating . . . . . . . . . . . . . . . . . 24
Social Organization and Deviant Associations . . . 28
Mutual Association . . . . . . . . . . . . . . . . 31
The Structure of the Computer Underground . . . . 33
Bulletin Board Systems . . . . . . . . . . 33
Towards a BBS Culture . . . . . . . . . 37
Bridges, Loops,
Is this Essay helpful? Join now to read this particular paper
and access over 480,000 just like this GET BETTER GRADES
and access over 480,000 just like this GET BETTER GRADES
eroids so damn old it's lame, but this guy is looking for pd %public domain% #####. No way was he going to get access. He didn't even know what this board is. I left him a message telling him that I didn't have one. He never called back after that (CH, sysop of a pirate BBS, field notes, 1988). ____________________ 18 One such quiz, from a p/h board, can be found in Appendix B. 58 Ironically, the pseudo-elaborate security
Need a custom written paper? Let our professional writers save your time.