OSUNY
   HOME
*





OSUNY
{{Refimprove, date=February 2019 OSUNY (Ohio Scientific Users of New York) was a dial-up bulletin board that was run by two different sysops in the 1980s, "Sysop" while in Scarsdale, New York, and Frank Roberts in White Plains, New York. Named for the Ohio Scientific computer it originally ran on, it attracted a large group of hackers, phone phreaks, engineers, computer programmers, and other technophiles. It remained a haven almost exclusively for the hacker/phreaker community until gaining notoriety through mention in a Newsweek article, ''Hacking Through NASA: A threat- or only an embarrassment'', and mention in the book '' The Hacker Crackdown'' as a favored hangout of the notorious hacker group The Legion of Doom, after which it was shuttered, and another board was brought up as a "replacement" known as The Crystal Palace, which was short-lived. OSUNY was restarted soon after, using an Altos 5-15D running MP/M and the continuously evolving Citadel/UX software. Also in the m ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Dial-up
Dial-up Internet access is a form of Internet access that uses the facilities of the public switched telephone network (PSTN) to establish a connection to an Internet service provider (ISP) by dialing a telephone number on a conventional telephone line. Dial-up connections use modems to decode audio signals into data to send to a router or computer, and to encode signals from the latter two devices to send to another modem. History In 1979, Tom Truscott and Jim Ellis, graduates of Duke University, created an early predecessor to dial-up Internet access called the USENET. The USENET was a UNIX based system that used a dial-up connection to transfer data through telephone modems. Dial-up Internet has been around since the 1980s via public providers such as NSFNET-linked universities. The BBC established Internet access via Brunel University in the United Kingdom in 1989. Dial-up was first offered commercially in 1992 by Pipex in the United Kingdom and Sprint in the United Stat ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Bulletin Board System
A bulletin board system (BBS), also called computer bulletin board service (CBBS), is a computer server running software that allows users to connect to the system using a terminal program. Once logged in, the user can perform functions such as uploading and downloading software and data, reading news and bulletins, and exchanging messages with other users through public message boards and sometimes via direct chatting. In the early 1980s, message networks such as FidoNet were developed to provide services such as NetMail, which is similar to internet-based email. Many BBSes also offer online games in which users can compete with each other. BBSes with multiple phone lines often provide chat rooms, allowing users to interact with each other. Bulletin board systems were in many ways a precursor to the modern form of the World Wide Web, social networks, and other aspects of the Internet. Low-cost, high-performance asynchronous modems drove the use of online services and BBSes t ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Sysop
A sysop (; an abbreviation of system operator) is an administrator of a multi-user computer system, such as a bulletin board system (BBS) or an online service virtual community.Jansen, E. & James,V. (2002). NetLingo: the Internet dictionary. Netlingo Inc., Oxnard, CA The phrase may also be used to refer to administrators of other Internet-based network services.Rhodes, D. & Butler, D. (2002). Solaris Operating Environment Boot Camp. Prentice Hall Professional. Sysops typically do not earn money, but donate their activity to the community. Co-sysops are users who may be granted certain admin privileges on a BBS. Generally, they help validate users and monitor discussion forums. Some co-sysops serve as file clerks, reviewing, describing, and publishing newly uploaded files into appropriate download directories.Gupta, A. (2004). Hacking In The Computer World. Mittal Publications. Historically, the term ''system operator'' applied to operators of any computer system, especially a m ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Hacker (computer Security)
A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers. The subculture that has evolved around hackers is often referred to as the "computer underground". Longstanding controversy surrounds the meaning of the term "hacker." In this controversy, computer programmers reclaim the term ''hacker'', arguing that it refers simply to someone with an advanced understanding of computers and computer networks and that ''cracker'' is the more appropriate term for those who break into computers, whether computer criminals ( black hats) or computer security experts ( white hats). A 2014 article noted that "the black-hat meaning still prevails among the general public". History Birth of subcult ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Phreaking
Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. The term ''phreak'' is a sensational spelling of the word ''freak'' with the ''ph-'' from '' phone'', and may also refer to the use of various audio frequencies to manipulate a phone system. ''Phreak'', ''phreaker'', or ''phone phreak'' are names used for and by individuals who participate in phreaking. The term first referred to groups who had reverse engineered the system of tones used to route long-distance calls. By re-creating these tones, phreaks could switch calls from the phone handset, allowing free calls to be made around the world. To ease the creation of these tones, electronic tone generators known as blue boxes became a staple of the phreaker community. This community included future Apple Inc. cofounders Steve Jobs and Steve Wozniak. The blue box ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Technophile
Technophilia (from Greek τέχνη - ''technē'', "art, skill, craft" and φίλος - ''philos'', "beloved, dear, friend") refers generally to a strong enthusiasm for technology, especially new technologies such as personal computers, the Internet, mobile phones, and home cinema."Technophilia." The American Heritage® Dictionary of the English Language, Fourth Edition. 2003. Houghton Mifflin Company 23 Sep. 2012 http://www.thefreedictionary.com/technophilia The term is used in sociology to examine individuals' interactions with society and is contrasted with technophobia. On a psychodynamic level, technophilia generates the expression of its opposite, technophobia.Richards, Barry. "Technophobia and Technophilia." British Journal of Psychotherapy 10.2 (1993): 188–95. Print. Technophilia and technophobia are the two extremes of the relationship between technology and society. The technophile regards most or all technology positively, adopts new forms of technology enthusiastica ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


The Hacker Crackdown
''The Hacker Crackdown: Law and Disorder on the Electronic Frontier'' is a work of nonfiction by Bruce Sterling first published in 1992. The book discusses watershed events in the hacker subculture in the early 1990s. The most notable topic covered is Operation Sundevil and the events surrounding the 1987–1990 war on the Legion of Doom network: the raid on Steve Jackson Games, the trial of "Knight Lightning" (one of the original journalists of ''Phrack''), and the subsequent formation of the Electronic Frontier Foundation. The book also profiles the likes of "Emmanuel Goldstein" (publisher of '' 2600: The Hacker Quarterly''), the former assistant attorney general of Arizona Gail Thackeray, FLETC instructor Carlton Fitzpatrick, Mitch Kapor, and John Perry Barlow. In 1994, Sterling released the book for the Internet with a new afterword. Historical perspective Though published in 1992, and released as a freeware, electronic book in 1994, the book offers a unique and colorful portr ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Citadel/UX
Citadel/UX (typically referred to simply as "Citadel") is a collaboration suite (messaging and groupware) that is descended from the Citadel family of programs which became popular in the 1980s and 1990s as a bulletin board system platform. It is designed to run on open source operating systems such as Linux or BSD. Although it is being used for many bulletin board systems, in 1998 the developers began to expand its functionality to a general purpose groupware platform. In order to modernize the Citadel platform for the Internet, the Citadel/UX developers added functionality such as shared calendars, instant messaging, and built-in implementations of Internet protocols such as SMTP, IMAP, Sieve, POP3, GroupDAV and XMPP. All protocols offer OpenSSL encryption for additional security. Users of Citadel/UX systems also have available to them a web-based user interface which employs Ajax style functionality to allow application-like interaction with the system. Citadel uses the Ber ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

2600 Magazine
''2600: The Hacker Quarterly'' is an American seasonal publication of technical information and articles, many of which are written and submitted by the readership, on a variety of subjects including hacking, telephone switching systems, Internet protocols and services, as well as general news concerning the computer "underground." With origins in the phone phreaking community and late 20th-century counterculture, ''2600'' and its associated conference transitioned to coverage of modern hacker culture, and the magazine has become a platform for speaking out against increased digital surveillance and advocacy of personal and digital freedoms. Publication history The magazine's name comes from the phreaker discovery in the 1960s that the transmission of a 2600 hertz tone – which could be produced perfectly with a plastic toy whistle given away free with Cap'n Crunch cereal, discovered by friends of John Draper – over a long-distance trunk connection gained access t ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Telnet
Telnet is an application protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP). Telnet was developed in 1969 beginning with , extended in , and standardized as Internet Engineering Task Force (IETF) Internet Standard STD 8, one of the first Internet standards. The name stands for " teletype network". Historically, Telnet provided access to a command-line interface on a remote host. However, because of serious security concerns when using Telnet over an open network such as the Internet, its use for this purpose has waned significantly in favor of SSH. The term ''telnet'' is also used to refer to the software that implements the client part of the protocol. Telnet client applications are available for virtually all c ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Secure Shell
The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable applications are remote login and command-line execution. SSH applications are based on a client–server architecture, connecting an SSH client instance with an SSH server. SSH operates as a layered protocol suite comprising three principal hierarchical components: the ''transport layer'' provides server authentication, confidentiality, and integrity; the ''user authentication protocol'' validates the user to the server; and the ''connection protocol'' multiplexes the encrypted tunnel into multiple logical communication channels. SSH was designed on Unix-like operating systems, as a replacement for Telnet and for unsecured remote Unix shell protocols, such as the Berkeley Remote Shell (rsh) and the related rlogin and rexec protocols, which all use insecure, plaintext transmission of authentication tokens. SSH was first de ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]