X-Nico

2 unusual facts about hackers


Community Memory

In his book Hackers: Heroes of the Computer Revolution, Steven Levy described how the founders of Community Memory began the organization.

Hackers: Wizards of the Electronic Age

The film includes footage of a hacker conference, and interviews with some of the programmers that created the personal computer revolution, including Bill Atkinson, Bill Budge, Doug Carlston, John Draper, Andrew Fluegelman, Lee Felsenstein, Richard Greenblatt, Andy Hertzfeld, David Hughes, Susan Kare, Richard Stallman, Bob Wallace, Robert Woodhead, Steve Wozniak, and others.


.tp

In August 1999, before the holding of the referendum, one of the independence leaders José Ramos-Horta, now the President of East Timor, was purported to have stated that arrangements had been made for hackers to attack Indonesian sites.

During the 1999 East Timorese crisis the cctld server services for the '.tp' domain were attacked by hackers believed to be at the behest and with support from a faction of the Indonesian military.

Bryan Clough

In 1990, Clough and Paul Mungo, a journalist, wrote Approaching Zero (1992) a book that covered the activities of phreakers, hackers and computer virus writers.

Clough has written several books and articles dealing with phreakers, hackers and computer virus writers; credit card fraud; banking; and the activities of MI5 during World War II, specifically the Tyler Kent - Anna Wolkoff Affair (2005).

Chaos Communication Camp

The Chaos Communication Camp is an international meeting of hackers that takes place every four years, organized by the Chaos Computer Club (CCC).

David S. Touretzky

In 2011, Touretzky began hosting a mirror of the website of George Hotz, containing executable files and instructions facilitating the jailbreaking of the Sony PlayStation 3, after Sony filed lawsuits against Hotz and other hackers aiming to utilize the takedown provisions of the DMCA to remove the content from the Internet.

Draft Communications Data Bill

However, the bill has been said to provide the legislative basis for a "giant database" that would allow "quite complicated questions" about "communications behaviors and patterns" which could become a "honeypot for casual hackers, blackmailers, criminals large and small from around the world, and foreign states", as Lord Strasburger described it, as the bill was scrutinsed by the Joint Committee of MPs and peers.

EBCDIC

Open-source-software advocate and hacker Eric S. Raymond writes in his Jargon File that EBCDIC was almost universally loathed by early hackers and programmers because of its multitude of different versions, none of which resembled the other versions, and that IBM produced it in direct competition with the already-established ASCII.

Electronic voting in Ireland

In October 2006, a group of Dutch hackers, including Rop Gonggrijp, showed how similar machines to the ones purchased in Ireland could be modified by replacing the EEPROMs with Nedap -Firmware with EEPROMs with their own firmware.

Emmanuel Goldstein

In the 1995 film Hackers, Matthew Lillard plays a character named Emmanuel Goldstein, who makes a reference to Nineteen Eighty-Four with the line: "'1984'? Yeah, right. That's a typo."

Festering Hate

The last traces of recognition for Cereal Killer and The Plague appear in Rafael Moreu's 1995 film, Hackers.

Great Hacker War

In 1991 Phiber Optik, while attending the first CFP conference in San Francisco with Craig Neidorf, was invited to join a telephone conference bridge by fellow hackers where an apologetic Shulman expressed his remorse at how the situation had been blown out of proportion and his view that Goggans had crossed the line in informing on other hackers to law enforcement in an effort to increase the prestige of ComSec.

Linus's Law

In the book The Hacker Ethic and the Spirit of the Information Age (2001), Torvalds introduces his law in the prologue "What Makes Hackers Tick? a.k.a. Linus's Law", suggesting that every motivation that makes a man do something can be classified under "survival", "social life" or "entertainment".

Mainland invasion of the United States

The risk of cyber-attacks on both civilian and military computer targets was brought to light after China became suspected of using government funded hackers to disrupt American banking systems, defense industries, telecommunication systems, power grids, utility controls, air traffic and train traffic control systems, as well as certain military systems such as C4ISR, and ballistic missile launch systems.

Mischief

As an overt demonstration to other hackers of their skill in the use of force, these security breaches can be taken as a sign of criminal intent and may result in charges as serious as terrorism.

Neophile

Common among most hackers, SF fans, and members of several other connected leading-edge subcultures, including the pro-technology 'Whole Earth' wing of the ecology movement, space activists, many members of Mensa, and the Discordian/neo-pagan underground (see geek).

Neurosecurity

The anime series Ghost in the Shell: Stand Alone Complex (2002–2003) prominently features hackers manipulating neural implants.

PC-LISP

Note that the Franz LISP dialect was the immediate, portable successor to the ITS version of Maclisp and is perhaps the closest thing to the LISP in the Steven Levy book Hackers as is practical to operate.

Peter Samson

Steven Levy's Hackers: Heroes of the Computer Revolution outlines Samson's interest in trains and electronics, and his influence in the club.

Robert David Steele

He also appeared in two French documentaries: Les Hackers (English translation: Hackers), on the National Geographic Channel, CIA Guerres Secretes (By William Karel) and Le Monde selon Bush (English translation: The World according to Bush by William Karel), on the television channel Paris Première.

The Hackers Conference

The first Hackers Conference was organized in 1984 in Marin County, California, by Stewart Brand and his associates at Whole Earth and The Point Foundation.

University of Oulu

The University of Oulu is known among hackers as the home of the Internet Relay Chat and for the File Transfer Protocol server x2ftp, named after the basement / blast shelter area in which it was physically located.

Where Them Girls At

An early version of the song featuring a cappella vocals was obtained by computer hackers, through accessing Guetta's recording studio's Wi-Fi connection.

Winn Schwartau

Another of his books, "Cybershock" (2000, 2001), is a non-technical look at the Defcon conference, hackers in general, Phreaking and the importance of computer security.

Wizzywig

The main character from the series, Kevin, is a composite of many well known phreaks and hackers such as Kevin Mitnick, Kevin Poulsen, Joybubbles, and many others.


see also