The Hacker Files
   HOME

TheInfoList



OR:

''The Hacker Files'' is a twelve issue
DC Comics DC Comics, Inc. (doing business as DC) is an American comic book publisher and the flagship unit of DC Entertainment, a subsidiary of Warner Bros. Discovery. DC Comics is one of the largest and oldest American comic book companies, with thei ...
mini-series published from August 1992 to July 1993. It was written by
Lewis Shiner Lewis Shiner (born December 30, 1950 in Eugene, Oregon) is an American writer. Shiner began his career as a science fiction writer, and then identified with cyberpunk. He later wrote more mainstream novels, albeit often with magical realism and f ...
and illustrated by
Tom Sutton Thomas F. Sutton (April 15, 1937 – May 1, 2002) He enlisted in the U.S. Air Force after graduating from high school in 1955, and worked on art projects while stationed at Fort D.A. Russell (Wyoming), Fort Francis E. Warren, near Laramie, Wyom ...
.


Publication history

The series written by
cyberpunk Cyberpunk is a subgenre of science fiction in a dystopian futuristic setting that tends to focus on a "combination of lowlife and high tech", featuring futuristic technological and scientific achievements, such as artificial intelligence and cyber ...
novelist Lewis Shiner is notable for the first appearance of a post-
Suicide Squad The Suicide Squad is an antihero/supervillain team appearing in American comic books published by DC Comics. The first version of the Suicide Squad debuted in ''The Brave and the Bold'' #25 (September 1959) and the second and modern version, cre ...
member
Barbara Gordon Barbara Gordon is a superheroine appearing in American comic books published by DC Comics, commonly in association with the superhero Batman. The character was created by television producer William Dozier, editor Julius Schwartz, writer Gardne ...
(Oracle), as well as the introduction of Digitronix computers, a brand which continued to show up in the DCU for years afterwards. In issue #1 Lewis Shiner states that he based the series and its main character Jack Marshall on an unpublished novel called ''Red Weather'' in which he detailed the experiences of a young programmer named Jack Marshall who worked for a Texas based computer company named ''Warrex'', manufacturers of the short lived ''Centurion'' computer.


Story

Jack Marshall (Hacker) is a freelance systems analyst from
Raleigh, North Carolina Raleigh (; ) is the capital city of the state of North Carolina and the List of North Carolina county seats, seat of Wake County, North Carolina, Wake County in the United States. It is the List of municipalities in North Carolina, second-most ...
. Fascinated with computers ever since he was a child, he grew up alongside the industry and eventually ended up working at Digitronix World Industries (DTX), a small company in
Dallas, Texas Dallas () is the third largest city in Texas and the largest city in the Dallas–Fort Worth metroplex, the fourth-largest metropolitan area in the United States at 7.5 million people. It is the largest city in and seat of Dallas County w ...
. Maverick company president Donny Travis worked alongside Marshall to invent the Digitronix Desktop PC. The Digitronix PC's success and profits caused rapid growth in the company, and a new senior Vice President named Walter Sutcliffe denied Marshall any profit sharing from his invention, because said profit sharing was based on a handshake agreement between Marshall and Donny Travis. Sutcliffe was one of five middle managers Donny Travis brought in from CompuTech. According to Jack, CompuTech went under due to incompetent middle management. Marshall attempted to steal his own
codebase In software development, a codebase (or code base) is a collection of source code used to build a particular software system, application, or software component. Typically, a codebase includes only human-written source code files; thus, a codeb ...
for a new updated version of Digitronix' proprietary
operating system An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. Time-sharing operating systems schedule tasks for efficient use of the system and may also in ...
DROS (Digitronix Resident Operating System) but was caught and summarily terminated. But since he is the only one who truly understands DROS, he is brought in by the United States government (specifically
Sarge Steel Sarge Steel is a detective/spy character published by Charlton Comics during the 1960s. As he was published during the time of Charlton's ''Action Heroes'' line of superheroes, and had loose ties to some, he is sometimes included with that group. H ...
) as a freelance troubleshooter whenever there is a problem.


"SoftWar"

The first Story arc SoftWar dealt with a virus infecting the Digitronix computers used by the
Pentagon In geometry, a pentagon (from the Greek πέντε ''pente'' meaning ''five'' and γωνία ''gonia'' meaning ''angle'') is any five-sided polygon or 5-gon. The sum of the internal angles in a simple pentagon is 540°. A pentagon may be simpl ...
, it had somehow spread over the
internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
and infected
Arpanet The Advanced Research Projects Agency Network (ARPANET) was the first wide-area packet-switched network with distributed control and one of the first networks to implement the TCP/IP protocol suite. Both technologies became the technical fou ...
(Advanced Research Projects Agency), Securenet (connects to bombers and missiles) and
Milnet In computer networking, MILNET (fully Military Network) was the name given to the part of the ARPANET internetwork designated for unclassified United States Department of Defense traffic.DEFENSE DATA NETWORK NEWSLETTEDDN-NEWS 26 6 May 1983 MILNE ...
. Jack compiles an
anti-virus Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name. ...
and recounts his history with Digitronix after a confrontation with Sutcliffe. He's able to cure the virus everywhere except
Cheyenne Mountain Complex The Cheyenne Mountain Complex is a Space Force installation and defensive bunker located in unincorporated El Paso County, Colorado, next to the city of Colorado Springs, at the Cheyenne Mountain Space Force Station, which hosts the activities of ...
which isolated itself the moment a virus was detected. The virus takes over the Cheyenne Mountain system and uses it to begin deploying
ICBM An intercontinental ballistic missile (ICBM) is a ballistic missile with a range greater than , primarily designed for nuclear weapons delivery (delivering one or more thermonuclear warheads). Conventional, chemical, and biological weapons c ...
s. Jack uncovers a traitor in Cheyenne Mountain who dies while trying to escape, he later stops
General Wade Eiling General Wade Eiling, sometimes known as The General, is a fictional character appearing in American comic books published by DC Comics. Publication history Wade Eiling first appeared in ''Captain Atom'' #1 (March 1987) and was created by Cary B ...
from accidentally launching a nuclear strike on Russia and prevents World War III.


"Operation Moonwitch"

The Operation Moonwitch storyline was based on real world
Operation Sundevil Operation Sundevil was a 1990 nationwide United States Secret Service crackdown on "illegal computer hacking activities." It involved raids in approximately fifteen different cities and resulted in three arrests and the confiscation of computers, ...
, a
United States Secret Service The United States Secret Service (USSS or Secret Service) is a federal law enforcement agency under the Department of Homeland Security charged with conducting criminal investigations and protecting U.S. political leaders, their families, and ...
crackdown on illegal computer hacking activities that took place in 1990. The operation is named after a decoy message board used by the Federal Government called ''Moon Witch''. Someone got hold of the ''
E911 Enhanced 911, E-911 or E911 is a system used in North America to automatically provide the caller's location to 911 dispatchers. 911 is the universal emergency telephone number in the region. In the European Union, a similar system exists known as ...
document'' which details how the national emergency response system works, and then they put the document online in a real world
zine A zine ( ; short for '' magazine'' or '' fanzine'') is a small-circulation self-published Self-publishing is the publication of media by its author at their own cost, without the involvement of a publisher. The term usually refers to writ ...
named ''
Phrack ''Phrack'' is an e-zine written by and for hackers, first published November 17, 1985. Described by Fyodor as "the best, and by far the longest running hacker zine," the magazine is open for contributions by anyone who desires to publish remarkabl ...
''. The government uses the theft and publication of the document as an excuse to dismantle the Hacker subculture. They arrest Sue Denim of the Speed Metal Kids after copies of the document are planted on their personal computers, and Oracle (Barbara Gordon) who downloaded a copy from Phrack as part of an investigation. Barbara accidentally shoots a Federal agent who had burst into her bedroom, but his vest saves him, in federal prison she uses the alias ''Amy Beddoes'' from her days with the
Suicide Squad The Suicide Squad is an antihero/supervillain team appearing in American comic books published by DC Comics. The first version of the Suicide Squad debuted in ''The Brave and the Bold'' #25 (September 1959) and the second and modern version, cre ...
. Jack Marshall finds a copy on his own machine and deletes it, he's able to trace that copy back to Digitronix World Industries. Catherine Cobert of
Justice League International Justice League International (JLI) is a fictional DC comics superhero team that succeeded the original Justice League from the late 1980s to the early 2000s. The team enjoyed several comic books runs, the first being written by Keith Giffen and ...
calls in the assistance of
Green Lantern Green Lantern is the name of several superheroes appearing in American comic books published by DC Comics. They fight evil with the aid of rings that grant them a variety of extraordinary powers, all of which come from imagination, fearlessness, ...
Hal Jordan Harold "Hal" Jordan, one of the characters known as Green Lantern, is a superhero appearing in American comic books published by DC Comics. The character was created in 1959 by writer John Broome and artist Gil Kane, and first appeared in '' ...
on behalf of Sue Denim and Oracle, but Jack Marshall gets there first.
Oracle An oracle is a person or agency considered to provide wise and insightful counsel or prophetic predictions, most notably including precognition of the future, inspired by deities. As such, it is a form of divination. Description The word '' ...
is able to prove that the file originated at Digitronix and all the detainees are set free.


"Working-Class Hero"

Jack confronts his former co-worker Yoshio Natsume. Yoshio is the nephew of Tohiro Natsume whose Japanese company originally supplied Digitronix with cheap computer chips he bought on the Black Market from the Yakuza, but he later built chip foundries on the Chinese mainland. Jack confronts Yoshio with evidence of his complicity in the Pentagon Virus and the E911 document leak. Jack discovers that Yoshio was framed by Sutcliffe who has been using his
superuser In computing, the superuser is a special user account used for system administration. Depending on the operating system (OS), the actual name of this account might be root, administrator, admin or supervisor. In some cases, the actual name of t ...
account and password. Yoshio introduces Jack to Yan Qing a Chinese exile and a survivor of the
Tiananmen Square protests of 1989 The Tiananmen Square protests, known in Chinese as the June Fourth Incident (), were student-led demonstrations held in Tiananmen Square, Beijing during 1989. In what is known as the Tiananmen Square Massacre, or in Chinese the June Fourth ...
, her fiance Yi who worked at a Digitronix assembly plant in China, had discovered an
undocumented feature An undocumented feature is an unintended or undocumented hardware operation, for example an undocumented instruction, or software feature found in computer hardware and software that is considered beneficial or useful. Sometimes the documentation ...
in the machine he was working on, it automatically recorded all spoken conversation in its local environment and stored it in a hidden
partition Partition may refer to: Computing Hardware * Disk partitioning, the division of a hard disk drive * Memory partition, a subdivision of a computer's memory, usually for use by a single job Software * Partition (database), the division of a ...
on the machine's optical
hard drive A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magnet ...
. He disappeared soon after sharing this fact with a close friend from the plant. Jack schedules a meeting with his ex-wife Kathy Spencer who works in Digitronix' hardware division, and who designed the security hardware that protects all Digitronix plants. Kathy gives Jack a device which should get him past a plant's electronic security. Jack goes to China intending to break into one of the assembly plants, but his arrival is anticipated by Sutcliffe. Due to a botched infiltration Jack and Yoshio and captured by Sutcliffe and thrown into a holding cell with Yi. While in that cell they begin to see the outlines of the ''
Aleph Aleph (or alef or alif, transliterated ʾ) is the first letter of the Semitic abjads, including Phoenician , Hebrew , Aramaic , Syriac , Arabic ʾ and North Arabian 𐪑. It also appears as South Arabian 𐩱 and Ge'ez . These letter ...
'' conspiracy, the true reason for the virus, and how the information retrieved from the computers would be routed by the virus and co-ordinated by Tohiro Natsume's newest project a
supercomputer A supercomputer is a computer with a high level of performance as compared to a general-purpose computer. The performance of a supercomputer is commonly measured in floating-point operations per second ( FLOPS) instead of million instructions ...
with 64
parallel processor Parallel computing is a type of computation in which many calculations or Process (computing), processes are carried out simultaneously. Large problems can often be divided into smaller ones, which can then be solved at the same time. There are ...
s. They escape from the cell using Kathy's anti-security device, and sneak Yi out of China by shipping him to the US in an equipment box.


"Showdown"

Yoshio discovers a massive mobilization of Digitronix personnel and hardware being sent to a secret facility at
Tyuratam Töretam ( kk, link=no, Төретам, Töretam; russian: link=no, Тюратам, Tyuratam) is a station on the main Moscow to Tashkent railway, located in Kazakhstan. The name means "Töre's grave" in the Kazakh language. Töre, or more formal ...
in
Kazakhstan Kazakhstan, officially the Republic of Kazakhstan, is a transcontinental country located mainly in Central Asia and partly in Eastern Europe. It borders Russia to the north and west, China to the east, Kyrgyzstan to the southeast, Uzbeki ...
, parallel processors,
Prolog Prolog is a logic programming language associated with artificial intelligence and computational linguistics. Prolog has its roots in first-order logic, a formal logic, and unlike many other programming languages, Prolog is intended primarily ...
language modules, and experimental
fiber optic An optical fiber, or optical fibre in Commonwealth English, is a flexible, transparent fiber made by drawing glass (silica) or plastic to a diameter slightly thicker than that of a human hair. Optical fibers are used most often as a means to ...
buses. They figure out that Digitronix is building a working globally networked artificial intelligence which they intend to use to process a few million
gigabyte The gigabyte () is a multiple of the unit byte for digital information. The prefix ''giga'' means 109 in the International System of Units (SI). Therefore, one gigabyte is one billion bytes. The unit symbol for the gigabyte is GB. This defini ...
s of stolen government and industrial secrets. Jack uses a Digitronix
videophone Videotelephony, also known as videoconferencing and video teleconferencing, is the two-way or multipoint reception and transmission of audio and video signals by people in different locations for real time communication.McGraw-Hill Concise Ency ...
to contact
Justice League Europe ''Justice League Europe'' (''JLE'') is a comic book series published by DC Comics that was a spin-off of the comic book '' Justice League America'' (which was then named ''Justice League International'' (vol. 1) for issues #7 to #25). ''Justice ...
headquarters in
London London is the capital and largest city of England and the United Kingdom, with a population of just under 9 million. It stands on the River Thames in south-east England at the head of a estuary down to the North Sea, and has been a majo ...
, and offers them a cure for the Pentagon virus. When he gets there he tells Hal Jordan and the rest of the JLE what Digitronix is really up to.
Wally West Wallace Rudolph "Wally" West is a superhero appearing in American comic books published by DC Comics as the original Kid Flash and the third Flash (DC Comics character), Flash. His power consists mainly of speedster (fiction), superhuman speed. ...
scouts the installation at superspeed and runs into a door knocking himself out, he is captured by Digitronix security but escapes them when he wakes up. Jack uses the
virtual reality Virtual reality (VR) is a simulated experience that employs pose tracking and 3D near-eye displays to give the user an immersive feel of a virtual world. Applications of virtual reality include entertainment (particularly video games), educ ...
interface to hack the AI which looks like Sutcliffe, he confronts it inside a game of ''Code of the West''. Jack had designed a compact videogame for the DTX PC called ''Code of the West'', it is also a
backdoor A back door is a door in the rear of a building. Back door may also refer to: Arts and media * Back Door (jazz trio), a British group * Porta dos Fundos (literally “Back Door” in Portuguese) Brazilian comedy YouTube channel. * Works so title ...
which is
hardcoded Hard coding (also hard-coding or hardcoding) is the software development practice of embedding data directly into the source code of a computer program, program or other executable object, as opposed to obtaining the data from external sources or ...
into the operating system of every Digitronix PC. Jack uses this game to define the rules of the fight between himself and the AI. The AI makes sure there is no possible way for it to lose the game. Jack deliberately loses to the AI, allowing it to kill him in the game, because "''There's a million ways to END the game by losing...but NONE to end it by WINNING. And since you CAN'T lose...you're going to be here a LONG time''". He leaves the AI playing the game, stuck in a recursive loop. Yoshio is put in charge of Digitronix, and no charges are filed against the company.


Speed Metal Kids

The
Speed metal Speed metal is an extreme subgenre of heavy metal music that originated in the late 1970s from new wave of British heavy metal (NWOBHM) roots.K. Kahn-Harris, ''Extreme Metal: Music and Culture on the Edge'' (Berg Publishers, 2007), , p. 31. It ...
Kids are teenage hackers who worship internet personalities like Hacker and Oracle, and who serve as his assistants: *Sue Denim - Fifteen-year-old heavy metal fan. *Phreaky Phreddy - As in
phone phreaking Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. The term ''phreak'' is a ...
, *Master Blaster - A thirteen-year-old
African-American African Americans (also referred to as Black Americans and Afro-Americans) are an Race and ethnicity in the United States, ethnic group consisting of Americans with partial or total ancestry from sub-Saharan Africa. The term "African American ...
video game buffs and alkdhiauydiayo;wuyay(*&(87wduagwduadavgdagdgadw


Digitronix PC

The Digitronix PC (DTX PC) of 1992 is an inexpensive
OEM An original equipment manufacturer (OEM) is generally perceived as a company that produces non-aftermarket parts and equipment that may be marketed by another manufacturer. It is a common industry term recognized and used by many professional or ...
personal computer A personal computer (PC) is a multi-purpose microcomputer whose size, capabilities, and price make it feasible for individual use. Personal computers are intended to be operated directly by an end user, rather than by a computer expert or tec ...
that can also serve as a business capable
workstation A workstation is a special computer designed for technical or scientific applications. Intended primarily to be used by a single user, they are commonly connected to a local area network and run multi-user operating systems. The term ''workstat ...
or a clustered file server. It boasted 100
megabytes The megabyte is a multiple of the unit byte for digital information. Its recommended unit symbol is MB. The unit prefix ''mega'' is a multiplier of (106) in the International System of Units (SI). Therefore, one megabyte is one million bytes o ...
of
ram Ram, ram, or RAM may refer to: Animals * A male sheep * Ram cichlid, a freshwater tropical fish People * Ram (given name) * Ram (surname) * Ram (director) (Ramsubramaniam), an Indian Tamil film director * RAM (musician) (born 1974), Dutch * ...
, an
HDTV High-definition television (HD or HDTV) describes a television system which provides a substantially higher image resolution than the previous generation of technologies. The term has been used since 1936; in more recent times, it refers to the g ...
monitor and optical disk storage, possibly based on the
NeXTcube The NeXTcube is a high-end workstation computer developed, manufactured, and sold by NeXT from 1990 until 1993. It superseded the original NeXT Computer workstation and is housed in a similar cube-shaped magnesium enclosure, designed by frog desig ...
's
magneto-optical drive A magneto-optical drive is a kind of optical disc drive capable of writing and rewriting data upon a magneto-optical disc. Both 130 mm (5.25 in) and 90 mm (3.5 in) form factors exist. In 1983, just a year after the introduc ...
. It also had built in compatibility with
NTSC The first American standard for analog television broadcast was developed by National Television System Committee (NTSC)National Television System Committee (1951–1953), Report and Reports of Panel No. 11, 11-A, 12–19, with Some supplement ...
\
PAL Phase Alternating Line (PAL) is a colour encoding system for analogue television. It was one of three major analogue colour television standards, the others being NTSC and SECAM. In most countries it was broadcast at 625 lines, 50 fields (25 ...
formats and had built in composite video out, as well as advanced digital audio and video editing capacity on-chip, possibly as
coprocessor A coprocessor is a computer processor used to supplement the functions of the primary processor (the CPU). Operations performed by the coprocessor may be floating-point arithmetic, graphics, signal processing, string processing, cryptography o ...
s similar to the
Amiga Amiga is a family of personal computers introduced by Commodore in 1985. The original model is one of a number of mid-1980s computers with 16- or 32-bit processors, 256 KB or more of RAM, mouse-based GUIs, and significantly improved graphi ...
.


DROS

DROS is the ''Digitronix Resident Operating System'', a free copy of DROS was bundled with every machine. Lewis Shiner gives detailed information on the inner workings of DROS in the usr/hacker/mail section at the back of the first two issues. Because series consultant Alan Wexelblat had warned him that
UNIX Unix (; trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, whose development started in 1969 at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and ot ...
wasn't considered secure enough for government installation (in 1992), he decided that DROS would look like UNIX but would not exactly be UNIX. Kim Fairchild another series consultant suggested that he use
emacs Emacs , originally named EMACS (an acronym for "Editor MACroS"), is a family of text editors that are characterized by their extensibility. The manual for the most widely used variant, GNU Emacs, describes it as "the extensible, customizable, s ...
as DROS' resident
text editor A text editor is a type of computer program that edits plain text. Such programs are sometimes known as "notepad" software (e.g. Windows Notepad). Text editors are provided with operating systems and software development packages, and can be us ...
. In DROS file blocks are graphically represented as rows of stacked rectangular blocks. All commands shown when Jack interacts with DROS are Unix commands. As in UNIX,
BSD The Berkeley Software Distribution or Berkeley Standard Distribution (BSD) is a discontinued operating system based on Research Unix, developed and distributed by the Computer Systems Research Group (CSRG) at the University of California, Berk ...
and
Linux Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which ...
, there are user and superuser accounts.According to usr/hacker/mail page 25, ''The Hacker Files'' #1 and 2


Command line examples


Notes

* In issue #11 of the series Digitronix technicians in Kazakhstan demonstrate an early prototype virtual reality computer interface that may be the same one later used by Barbara Gordon (Oracle). * The letters printed in issues #3-12 were taken from online letter columns that Shiner setup on
GEnie Jinn ( ar, , ') – also romanized as djinn or anglicized as genies (with the broader meaning of spirit or demon, depending on sources) – are invisible creatures in early pre-Islamic Arabian religious systems and later in Islamic mytho ...
and
CompuServe CompuServe (CompuServe Information Service, also known by its initialism CIS) was an American online service provider, the first major commercial one in the world – described in 1994 as "the oldest of the Big Three information services (the oth ...
bulletin boards. Some of the letters were from computer industry professionals and enthusiasts who often corrected technical errors they had found in previous issues. * The cover to issue #8 shows a DTX (Digitronix)
SCSI Small Computer System Interface (SCSI, ) is a set of standards for physically connecting and transferring data between computers and peripheral devices. The SCSI standards define commands, protocols, electrical, optical and logical interface ...
optical storage disk (possibly a hybrid magneto-optical/ DVD RAM drive), with a 40 megabyte to 2 gigabyte storage capacity and a DTX
mainboard A motherboard (also called mainboard, main circuit board, mb, mboard, backplane board, base board, system board, logic board (only in Apple computers) or mobo) is the main printed circuit board (PCB) in general-purpose computers and other expand ...
. The optical storage disk is labeled as "
Macintosh The Mac (known as Macintosh until 1999) is a family of personal computers designed and marketed by Apple Inc., Apple Inc. Macs are known for their ease of use and minimalist designs, and are popular among students, creative professionals, and ...
,
NeXT Next may refer to: Arts and entertainment Film * ''Next'' (1990 film), an animated short about William Shakespeare * ''Next'' (2007 film), a sci-fi film starring Nicolas Cage * '' Next: A Primer on Urban Painting'', a 2005 documentary film Lit ...
,
DOS DOS is shorthand for the MS-DOS and IBM PC DOS family of operating systems. DOS may also refer to: Computing * Data over signalling (DoS), multiplexing data onto a signalling channel * Denial-of-service attack (DoS), an attack on a communicat ...
and
Novell Novell, Inc. was an American software and services company headquartered in Provo, Utah, that existed from 1980 until 2014. Its most significant product was the multi-platform network operating system known as Novell NetWare. Under the lead ...
compatible". * According to the book's ''
Who's Who ''Who's Who'' (or ''Who is Who'') is the title of a number of reference publications, generally containing concise biography, biographical information on the prominent people of a country. The title has been adopted as an expression meaning a gr ...
'' entry, Digitronix computers are supposedly used by both
Batman Batman is a superhero appearing in American comic books published by DC Comics. The character was created by artist Bob Kane and writer Bill Finger, and debuted in Detective Comics 27, the 27th issue of the comic book ''Detective Comics'' on ...
and Oracle.


References


External links


Streettech: A synopsis of The Hacker FilesPhrack: Volume 4 Issue 40 File 2 of 14 July 9, 1992


* [http://groups.google.com/group/rec.arts.comics.misc/browse_frm/thread/227c7e2ac17d8927/c261ee94ca166804?tvc=1&q=the+hacker+files%2C+1992&hl=en#c261ee94ca166804 Usenet archive - The Hacker Files, mostly: by Johanna Draper, October 23 1992] {{DEFAULTSORT:Hacker Files DC Comics titles Cyberpunk comics 1992 comics debuts Fictional hackers