Neu:
23,40€23,40€
KOSTENFREIE Retouren
GRATIS Lieferung:
Mittwoch, 7. Jun.
Auf Lager
Zahlung
Sichere Transaktion
Versand
Amazon
Verkäufer
Amazon
Rückgaben
Retournierbar innerhalb von 30 Tagen nach Erhalt
Gebraucht kaufen 8,11 €
Andere Verkäufer auf Amazon
& Kostenlose Lieferung
81 % positiv in den letzten 12 Monaten
& Kostenlose Lieferung
59 % positiv in den letzten 12 Monaten
Lade die kostenlose Kindle-App herunter und lese deine Kindle-Bücher sofort auf deinem Smartphone, Tablet oder Computer – kein Kindle-Gerät erforderlich. Weitere Informationen
Mit Kindle für Web kannst du sofort in deinem Browser lesen.
Scanne den folgenden Code mit deiner Mobiltelefonkamera und lade die Kindle-App herunter.
Den Autoren folgen
OK
Cyberpunk: Outlaws and Hackers on the Computer Frontier, Revised Taschenbuch – 1. November 1995
| Preis | Neu ab | Gebraucht ab |
|
Audible Hörbuch, Ungekürzte Ausgabe
"Bitte wiederholen" |
0,00 €
| Gratis im Audible-Probemonat | |
|
Gebundenes Buch
"Bitte wiederholen" | 41,87 € | 11,92 € |
- Kindle
0,00 € Dieser und Millionen weitere Titel sind in Kindle Unlimited verfügbar. Oder für 8,90 € kaufen -
Hörbuch
0,00 € Gratis im Audible-Probemonat - Gebundenes Buch
41,87 €4 Gebraucht ab 11,92 € 2 Neu ab 41,87 € - Taschenbuch
23,40 €7 Gebraucht ab 7,19 € 9 Neu ab 23,40 €
Kaufoptionen und Plus-Produkte
- Seitenzahl der Print-Ausgabe400 Seiten
- SpracheEnglisch
- HerausgeberSimon & Schuster
- Erscheinungstermin1. November 1995
- Abmessungen13.97 x 2.54 x 21.43 cm
- ISBN-100684818620
- ISBN-13978-0684818627
Kunden, die diesen Artikel gekauft haben, kauften auch
Produktbeschreibungen
Amazon.de
Pressestimmen
Los Angeles Times Book Review An engrossing, valuable work.
PC Magazine Riveting...an important chronicle of what is happening on the edge of the information age.
Über den Autor und weitere Mitwirkende
Leseprobe. Abdruck erfolgt mit freundlicher Genehmigung der Rechteinhaber. Alle Rechte vorbehalten.
Kevin: The Dark-Side Hacker
The Roscoe Gang
It was partnership, if not exactly friendship, that kept the group together. Each member possessed a special strength considered essential for what needed to be done. Roscoe was the best computer programmer and a natural leader. Susan Thunder prided herself on her knowledge of military computers and a remarkable ability to manipulate people, especially men. Steven Rhoades was especially good with telephone equipment. And aside from his sheer persistence, Kevin Mitnick had an extraordinary talent for talking his way into anything. For a while, during its early days in 1980, the group was untouchable.
Susan was infatuated with Roscoe, but she never cared much for his constant companion, Kevin Mitnick. For his part, Kevin barely gave Susan the time of day. They learned to tolerate one another because of Roscoe. But for all their mutual hostility, Susan and Kevin shared a fascination with telephones and the telephone network; it was a fascination that came to dominate their lives. Susan, Kevin, Roscoe and Steven were "phone phreaks." By their own definition, phreaks were telephone hobbyists more expert at understanding the workings of the Bell System than most Bell employees.
The illegality of exploring the nooks and crannies of the phone system added a sense of adventure to phreaking. But the mechanical components of telephone networks were rapidly being replaced by computers that switched calls electronically, opening a new and far more captivating world for the telephone underground. By 1980, the members of this high-tech Los Angeles gang weren't just phone phreaks who talked to each other on party lines and made free telephone calls. Kevin and Roscoe, in particular, were taking phone phreaking into the growing realm of computers. By the time they had learned how to manipulate the very computers that controlled the phone system, they were calling themselves computer hackers.
Kevin was the only one of the original group to go even deeper, to take an adolescent diversion to the point of obsession. Susan, Roscoe and Steve liked the control and the thrill, and they enjoyed seeing their pranks replayed for them in the newspapers. But almost a decade later it would be Kevin, the one who hid from publicity, who would come to personify the public's nightmare vision of the malevolent computer hacker.
Born in Altona, Illinois, in 1959, Susan was still an infant when her parents, struggling with an unhappy marriage, moved to Tujunga, California, northeast of the San Fernando Valley. Even after the move to paradise, with the implicit promise of a chance to start afresh, Susan's family continued to unravel. Susan was a gawky, buck-toothed little girl. Rejected and abused, at age eight she found solace in the telephone, a place where perfect strangers seemed happy to offer a kind word or two. She made friends with operators, and began calling random numbers in the telephone book, striking up a conversation with whomever she happened to catch. Sometimes she called radio disc jockeys.
After her parents divorced, Susan dropped out of the eighth grade, ran away to the streets of Hollywood and adopted the name Susy Thunder. Susan didn't make many friends, but she did know how to feed herself. Before long, she was walking Sunset Boulevard, looking for men in cars who would pay her for sex. She cut a conspicuous figure next to some of the more diminutive women on the street. Barely out of puberty, Susan was already approaching six feet.
When she wasn't walking the streets, she was living in a hazy, drug-filtered world as a hanger-on in the L.A. music scene, a rock-star groupie. Susan was a bruised child developing into a bruised adult. Quaalude was her medium of choice for spiriting her away from reality, and when Quaalude was scarce, she switched to alcohol and heroin. Her mother finally put her into a nine-month rehabilitation program; she was abruptly thrown out midcourse. Conflicting stories of Susan's ouster were in keeping with the blurry line between fact and myth that described her life. As Susan was to tell it, the adulation of power she developed as a groupie compelled her to single out the most powerful male staff member at the treatment center and seduce him. Another story, circulated by Susan's detractors, is that the male staff member for whom she left the program "sold" her services to a brothel.
Susan found an apartment in Van Nuys and retreated once again to the telephone, taking comfort in knowing that with the telephone she could gain access to a world of her own conjuring and shut it out whenever she chose. She began calling the telephone conference lines that were springing up all over Los Angeles in the late 1970s. By dialing a conference-line number, Susan could connect herself to what sounded like cross talk, except that she was heard by the others and could join in the conversation. Some conference-line callers were teenagers who dialed up after school; others were housewives who stayed on all day, tuning in and out between household chores but never actually hanging up the phone. By nightfall, many of the conference lines turned into telephonic sex parlors, the talk switching from undirected chitchat to explicit propositions.
One day in early 1980 Susan discovered HOBO-UFO, one of the first "legitimate" conference lines in Los Angeles in that its owners used their own conferencing equipment instead of piggybacking on the phone company's facilities. Drawing hundreds of people every day, HOBO-UFO was run from the Hollywood apartment of a young college student who called himself Roscoe. A friend of Roscoe's named Barney financed the setup, putting up the money for the multiple phone lines and other equipment while Roscoe provided the technical wherewithal. Susan decided she couldn't rest until she had met Roscoe, the power behind it all. But to achieve that goal, Susan knew she would have to abandon her disembodied telephone persona. She liked describing herself to men over the telephone. She knew from experience that all she had to do was mention that she was a six-foot-two blond and she wouldn't have to wait long for a knock at the door. She was right. No sooner did she deliver the description than Roscoe came calling.
The woman who greeted Roscoe was exactly as she had described herself. Susan had dressed up and made her face up carefully for the big date. But she could not conceal certain physical oddities. Her long face displayed a set of teeth so protrusive as to produce a slight speech impediment. And there was something incongruous about her large frame: her upper torso was narrow and delicate, but it descended to a disproportionate outcropping of hips and heavy thighs. Roscoe, for his part, was thin and pale. His brown-framed glasses met Susan's chin. But if either Susan or Roscoe was disappointed in the other's looks, neither showed it. They went to dinner, and when Roscoe asked Susan about her line of work she told him she was a therapist and then quickly changed the subject.
A business student at the University of Southern California, Roscoe was one of the best-known phone phreaks around Los Angeles. When a reporter from a local newspaper began researching a story about conference lines, he told a few HOBO-UFO regulars that he wanted to meet Roscoe. The next day a caller greeted him by reeling off the billing name on his unlisted phone number, his home address, the year and make of his car, and his driver's license number. Then the caller announced himself: "This is Roscoe."
When Susan and Roscoe met in 1980, phone phreaking was by no means a new phenomenon. Phone phreaks had been cheating the American Telephone and Telegraph Company for years. They started out with "blue boxes" as their primary tool. Named for the color of the original device, blue boxes were...
Produktinformation
- Herausgeber : Simon & Schuster; Updated Edition (1. November 1995)
- Sprache : Englisch
- Taschenbuch : 400 Seiten
- ISBN-10 : 0684818620
- ISBN-13 : 978-0684818627
- Abmessungen : 13.97 x 2.54 x 21.43 cm
- Amazon Bestseller-Rang: Nr. 962,443 in Bücher (Siehe Top 100 in Bücher)
- Nr. 2,159 in Strafrecht (Bücher)
- Nr. 3,104 in Berichte über authentische Verbrechen
- Nr. 4,826 in Kriminalität
- Kundenrezensionen:
Über die Autoren

Entdecke mehr Bücher des Autors, sieh dir ähnliche Autoren an, lies Autorenblogs und mehr

Entdecke mehr Bücher des Autors, sieh dir ähnliche Autoren an, lies Autorenblogs und mehr
Kundenrezensionen
Kundenbewertungen, einschließlich Produkt-Sternebewertungen, helfen Kunden, mehr über das Produkt zu erfahren und zu entscheiden, ob es das richtige Produkt für sie ist.
Um die Gesamtbewertung der Sterne und die prozentuale Aufschlüsselung nach Sternen zu berechnen, verwenden wir keinen einfachen Durchschnitt. Stattdessen berücksichtigt unser System beispielsweise, wie aktuell eine Bewertung ist und ob der Prüfer den Artikel bei Amazon gekauft hat. Es wurden auch Bewertungen analysiert, um die Vertrauenswürdigkeit zu überprüfen.
Erfahre mehr darüber, wie Kundenbewertungen bei Amazon funktionieren.-
Spitzenrezensionen
Spitzenbewertungen aus Deutschland
Derzeit tritt ein Problem beim Filtern der Rezensionen auf. Bitte versuche es später erneut.
However, having just finished Jonathan Littman's "The Fugitive Game" I have to recommend reading both books to get the full story. Markoff's conflicts-of-interest and questionable journalistic practices aren't apparent from reading just "Cyberpunk." What appears to be a non-fiction account is, in reality, more complicated than that.... You really owe it to yourself to read both sides of the story.
So read this book and enjoy it for what it is -- and then read Littman for another perspective.
I read Cuckoo's Egg, and this is a great companion.
if you're trying to vilify the "evil's" of hackers and hacking this is a fantastic book to read.
if you're looking for a book that remains unbiased, read Jon littman's THE FUGITIVE GAME or THE WATCHMAN. littman handles this topic with the skill of a surgeon. he takes the cyber-world of 0's and 1's and gives it weight, color and sound.
Spitzenrezensionen aus anderen Ländern
The first chapter features Susan Thunder, a military computer enthusiast, whose fascination with telephone networks would evolve into knowledge of the working of the Bell System that exceed most employee ranking. Despite her intellectual talents inherent social failings would find her street walking for pecuniary sexual endeavors. She finally evolved into alcohol and heroin use supported financially by money for sex. Years later she found her salvation by harnessing the challenges of military computer systems, a passion that became socially and financially rewarding.
Later pages reflect Nasa in preparation for a war of the future fought with computer hackers and related computer viruses.





