net.wars Home Page | NYU Press

Introduction | Contents | Notes | Author | Reviews | Feedback



Notes to Chapter 10
notes to chapter 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

All the Web addresses included were checked when we went online, but some, inevitably, may have moved or changed.


  1. Robert Bickford, "Are YOU a Hacker?" in MicroTimes , January 1989, and also on the Web at http://www.well.com/user/rab/ayah.html. The article was also reprinted in Tricks of the Internet Gurus, edited by Philip Baczewski (SAMS, 1994). <back to text>
  1. Takedown, by New Y ork Times reporter John Markoff and security expert Tsutomu Shimomura (Hyperion 1996); Jonathan Littman, The Fugitive Game (Little, Brown, 1996); Jeff Goodell, The Cyberthief and the Samurai (Dell, 1996). Mitnick also occupied about a third of Katie Hafner and John Markoff ' s Cyberpunk (Simon and Schuster, 1991); Writing in 2600, Mitnick characterized the section about him as "20 percent fabricated and libelous." <back to text>
  1. Personal interview, July 1996. <back to text>
  1. At http://www.2600.com <back to text>
  1. John Perry Barlow, "Crime and Puzzlement," 1990, archived on the Web athttp://www.eff.org/Publications/John_Perry_Barlow/HTML <back to text>
  1. EEPROM stands for Electrically Erasable Programmable Read-Only Memory and is a programmable memory chip that allows you to update a device's internal workings without having to take it apart and physically replace the chip. <back to text>
  1. On the Web at http://www.fish.com/satan/. The program runs only under UNIX and only tests UNIX networks. <back to text>
  1. Markoff and Shimomura, Takedown, 105-6. <back to text>
  1. A script is a small program that essentially automates a series of commands that would otherwise have to be typed manually. <back to text>
  1. Forging email addresses is ridiculously easy to do, but doing so doesn't mean the forger has access to your email box. <back to text>


  1. In 1996, Prince Philip became the third member of the Royal Family to get caught with his signals down in embarrassing circumstances. <back to text>
  1. The hacked versions of the pages are archived on the 2600 Web site, http://www.2600.com <back to text>
  1. More details on this hoax are in the "AOL' s 'Child Fun' UCE FAQ," posted at the time to alt.aol-sucks and news.admin.net-abuse.misc , among others. Retrievable through Deja News ( http://www.dejanews.com ). <back to text>
  1. A vailable on Usenet as comp.risks, or via email. To subscribe send email to risks-request@csl.sri.com with the word "subscribe" in the message body. Old issues are archived at http://www.CSL.sri/risksinfo.html <back to text>
  1. In a March 1993 interview for Personal Computer World , reprinted in Wendy Grossman, Remembering the Future (Springer Verlag, 1997). <back to text>
  1. At Access All Areas Conference, July 1996, London. <back to text>
  1. "Information Security: Computer Attacks at Department of Defense Pose Increasing Risks," dated May 22, 1996, and designated GAO/AIMD-96-84. The report can be accessed on the Web at http://www.access.gpo.gov <back to text>
  1. Paul A. Strassman and William Marlow, "Risk-Free Access into the Global Information Infrastructure via Anonymous Remailers," presented at the Symposium on the Global Information Infrastructure: Information Policy and International Infrastructure, January 28-30, 1996, Kennedy School of Government, Harvard University. <back to text>
  1. Interview for W ired UK, September 1996. <back to text>
  1. Ivars Peterson, Fatal Defect (Random House, 1995). <back to text>
  1. A write-up of how this works is at http://www.cs.princeton.edu/sip/ <back to text>


    

Copyright © 1997-99 NYU Press. All rights reserved.
Reproduction in whole or in part in any form or medium without written permission of New York University Press is prohibited.

NYU Press
Be sure to visit the NYU Press Bookstore

[Design by NiceMedia]