2600 Magazine
   HOME
*



picture info

2600 Magazine
''2600: The Hacker Quarterly'' is an American seasonal publication of technical information and articles, many of which are written and submitted by the readership, on a variety of subjects including hacking, telephone switching systems, Internet protocols and services, as well as general news concerning the computer " underground." With origins in the phone phreaking community and late 20th-century counterculture, ''2600'' and its associated conference transitioned to coverage of modern hacker culture, and the magazine has become a platform for speaking out against increased digital surveillance and advocacy of personal and digital freedoms. Publication history The magazine's name comes from the phreaker discovery in the 1960s that the transmission of a 2600 hertz tone – which could be produced perfectly with a plastic toy whistle given away free with Cap'n Crunch cereal, discovered by friends of John Draper – over a long-distance trunk connection gained acces ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Computer
A computer is a machine that can be programmed to Execution (computing), carry out sequences of arithmetic or logical operations (computation) automatically. Modern digital electronic computers can perform generic sets of operations known as Computer program, programs. These programs enable computers to perform a wide range of tasks. A computer system is a nominally complete computer that includes the Computer hardware, hardware, operating system (main software), and peripheral equipment needed and used for full operation. This term may also refer to a group of computers that are linked and function together, such as a computer network or computer cluster. A broad range of Programmable logic controller, industrial and Consumer electronics, consumer products use computers as control systems. Simple special-purpose devices like microwave ovens and remote controls are included, as are factory devices like industrial robots and computer-aided design, as well as general-purpose devi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Cap'n Crunch
Cap'n Crunch is a corn and oat breakfast cereal manufactured by Quaker Oats Company, a subsidiary of PepsiCo since 2001. After introducing the original cereal in 1963, marketed simply as ''Cap'n Crunch'', Quaker Oats has since introduced numerous flavors and seasonal variations, some for a limited time—and currently offers a Cap'n Crunch product line. The original Cap'n Crunch cereal was developed to recall a recipe of brown sugar and butter over rice. It was one of the first cereals to use an oil coating to deliver its flavoring, which required an innovative baking process. The taste has been described as similar to the UK and Ireland cereal Golden Nuggets. Product history Pamela Low, a flavorist at Arthur D. Little, developed the original Cap'n Crunch flavor in 1963—recalling a recipe of brown sugar and butter her grandmother Luella Low served over rice at her home in Derry, New Hampshire. Low created the flavor coating for Cap'n Crunch, describing it as giv ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Grey Hat
A grey hat (greyhat or gray hat) is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent typical of a black hat hacker. The term came into use in the late 1990s, derived from the concepts of " white hat" and " black hat" hackers. When a white hat hacker discovers a vulnerability, they will exploit it only with permission and not divulge its existence until it has been fixed, whereas the black hat will illegally exploit it and/or tell others how to do so. The grey hat will neither illegally exploit it, nor tell others how to do so. A further difference among these types of hacker lies in their methods of discovering vulnerabilities. The white hat breaks into systems and networks at the request of their employer or with explicit permission for the purpose of determining how secure it is against hackers, whereas the black hat will break into any system or network in order to uncov ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Hacker (computer Security)
A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers. The subculture that has evolved around hackers is often referred to as the "computer underground". Longstanding controversy surrounds the meaning of the term " hacker." In this controversy, computer programmers reclaim the term ''hacker'', arguing that it refers simply to someone with an advanced understanding of computers and computer networks and that ''cracker'' is the more appropriate term for those who break into computers, whether computer criminals ( black hats) or computer security experts ( white hats). A 2014 article noted that "the black-hat meaning still prevails among the general public". History Birth of subc ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Loaded Term
Loaded language (also known as loaded terms, emotive language, high-inference language and language-persuasive techniques) is rhetoric used to influence an audience by using words and phrases with strong connotations. This type of language is very often made vague to more effectively invoke an emotional response and/or exploit stereotypes. Loaded words and phrases have significant emotional implications and involve strongly positive or negative reactions beyond their literal meaning. Definition Loaded terms, also called emotive or ethical words, were clearly described by Charles Stevenson. He noticed that there are words that do not merely describe a possible state of affairs. "Terrorist" is not used only to refer to a person who commits specific actions with a specific intent. Words such as "torture" or " freedom" carry with them something more than a simple description of a concept or an action. They have a "magnetic" effect, an imperative force, a tendency to influence the ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Nineteen Eighty-Four
''Nineteen Eighty-Four'' (also stylised as ''1984'') is a dystopian social science fiction novel and cautionary tale written by the English writer George Orwell. It was published on 8 June 1949 by Secker & Warburg as Orwell's ninth and final book completed in his lifetime. Thematically, it centres on the consequences of totalitarianism, mass surveillance and repressive regimentation of people and behaviours within society. Orwell, a democratic socialist, modelled the authoritarian state in the novel on Stalinist Russia and Nazi Germany. More broadly, the novel examines the role of truth and facts within societies and the ways in which they can be manipulated. The story takes place in an imagined future in the year 1984, when much of the world is in perpetual war. Great Britain, now known as Airstrip One, has become a province of the totalitarian superstate Oceania, which is led by Big Brother, a dictatorial leader supported by an intense cult of personality manufacture ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

George Orwell
Eric Arthur Blair (25 June 1903 – 21 January 1950), better known by his pen name George Orwell, was an English novelist, essayist, journalist, and critic. His work is characterised by lucid prose, social criticism, opposition to totalitarianism, and support of democratic socialism. Orwell produced literary criticism, poetry, fiction and polemical journalism. He is known for the allegorical novella '' Animal Farm'' (1945) and the dystopian novel '' Nineteen Eighty-Four'' (1949). His non-fiction works, including '' The Road to Wigan Pier'' (1937), documenting his experience of working-class life in the industrial north of England, and '' Homage to Catalonia'' (1938), an account of his experiences soldiering for the Republican faction of the Spanish Civil War (1936–1939), are as critically respected as his essays on politics, literature, language and culture. Blair was born in India, and raised and educated in England. After school he became an Imperial policeman ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Pen Name
A pen name, also called a ''nom de plume'' or a literary double, is a pseudonym (or, in some cases, a variant form of a real name) adopted by an author and printed on the title page or by-line of their works in place of their real name. A pen name may be used to make the author's name more distinctive, to disguise the author's gender, to distance the author from their other works, to protect the author from retribution for their writings, to merge multiple persons into a single identifiable author, or for any of a number of reasons related to the marketing or aesthetic presentation of the work. The author's real identity may be known only to the publisher or may become common knowledge. Etymology The French-language phrase is occasionally still seen as a synonym for the English term "pen name", which is a "back-translation" and originated in England rather than France. H. W. Fowler and F. G. Fowler, in '' The King's English'' state that the term ''nom de plume'' evol ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

AT&T Breakup
The breakup of the Bell System was mandated on January 8, 1982, by an agreed consent decree providing that AT&T Corporation would, as had been initially proposed by AT&T, relinquish control of the Bell Operating Companies, which had provided local telephone service in the United States. This effectively took the monopoly that was the Bell System and split it into entirely separate companies that would continue to provide telephone service. AT&T would continue to be a provider of long-distance service, while the now-independent Regional Bell Operating Companies (RBOCs), nicknamed the "Baby Bells", would provide local service, and would no longer be directly supplied with equipment from AT&T subsidiary Western Electric. This divestiture was initiated by the filing in 1974 by the United States Department of Justice of an antitrust lawsuit against AT&T. AT&T was, at the time, the sole provider of telephone service throughout most of the United States. Furthermore, most telephonic eq ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Bantam Books
Bantam Books is an American publishing house owned entirely by parent company Random House, a subsidiary of Penguin Random House; it is an imprint of the Random House Publishing Group. It was formed in 1945 by Walter B. Pitkin, Jr., Sidney B. Kramer, and Ian and Betty Ballantine, with funding from Grosset & Dunlap and Curtis Publishing Company. It has since been purchased several times by companies including National General, Carl Lindner's American Financial and, most recently, Bertelsmann; it became part of Random House in 1998, when Bertelsmann purchased it to form Bantam Doubleday Dell. It began as a mass market publisher, mostly of reprints of hardcover books, with some original paperbacks as well. It expanded into both trade paperback and hardcover books, including original works, often reprinted in house as mass-market editions. History The company was failing when Oscar Dystel, who had previously worked at Esquire and as editor on Coronet magazine was hired in ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




The Hacker Crackdown
''The Hacker Crackdown: Law and Disorder on the Electronic Frontier'' is a work of nonfiction by Bruce Sterling first published in 1992. The book discusses watershed events in the hacker subculture in the early 1990s. The most notable topic covered is Operation Sundevil and the events surrounding the 1987–1990 war on the Legion of Doom network: the raid on Steve Jackson Games, the trial of " Knight Lightning" (one of the original journalists of ''Phrack''), and the subsequent formation of the Electronic Frontier Foundation. The book also profiles the likes of " Emmanuel Goldstein" (publisher of ''2600: The Hacker Quarterly''), the former assistant attorney general of Arizona Gail Thackeray, FLETC instructor Carlton Fitzpatrick, Mitch Kapor, and John Perry Barlow. In 1994, Sterling released the book for the Internet with a new afterword. Historical perspective Though published in 1992, and released as a freeware, electronic book in 1994, the book offers a unique and colorful po ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Bulletin Board System
A bulletin board system (BBS), also called computer bulletin board service (CBBS), is a computer server running software that allows users to connect to the system using a terminal program. Once logged in, the user can perform functions such as uploading and downloading software and data, reading news and bulletins, and exchanging messages with other users through public message boards and sometimes via direct chatting. In the early 1980s, message networks such as FidoNet were developed to provide services such as NetMail, which is similar to internet-based email. Many BBSes also offer online games in which users can compete with each other. BBSes with multiple phone lines often provide chat rooms, allowing users to interact with each other. Bulletin board systems were in many ways a precursor to the modern form of the World Wide Web, social networks, and other aspects of the Internet. Low-cost, high-performance asynchronous modems drove the use of online services and B ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]