Home

Underground: Hacking, madness and obsession on the electronic frontier Part 75

Underground: Hacking, madness and obsession on the electronic frontier - novelonlinefull.com

You’re read light novel Underground: Hacking, madness and obsession on the electronic frontier Part 75 online at NovelOnlineFull.com. Please use the follow button to get notification about the latest chapter next time when you visit NovelOnlineFull.com. Use F11 button to read novel in full-screen(PC only). Drop by anytime you want to read free – fast – latest novel. It’s great if you could leave a comment, share your opinion about the new chapters, new novel with others on the internet. We’ll do our best to bring you the finest, latest novel everyday. Enjoy

2. I have relied on numerous wire service reports, particularly those of UPI Science Reporter William Harwood, for many of my descriptions of Galileo and the launch.

3. William Harwood, 'NASA Awaits Court Ruling on Shuttle Launch Plans', UPI, 10 October 1989.

4. William Harwood, 'Atlantis "Go" for Tuesday Launch', UPI, 16 October 1989.

5. Ibid.

6. From NASA's World Wide Web site.

7. Thomas A. Longstaff and E. Eugene Schulz, 'a.n.a.lysis of the w.a.n.k and OILZ Worms', Computer and Security, vol. 12, no. 1, February 1993, p.

64.

8. Katie Haffner and John Markoff, Cyberpunk, Corgi, London 1994, p.

363.

9. The Age, 22 April 1996, reprinted from The New York Times.

10. DEC, Annual Report, 1989, listed in 'SEC Online'.

11. GEMTOP was corrected to GEMPAK in a later advisory by CIAC.

12. 'Officially' was spelled incorrectly in the original banner.

13. This advisory is printed with the permission of CIAC and Kevin Oberman. CIAC requires the publication of the following disclaimer:

This doc.u.ment was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government, nor the University of California, nor any of their employees makes any warranty, express or implied, or a.s.sumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily const.i.tute or imply its endors.e.m.e.nt, recommendation or favouring by the United States Government or the University of California. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or the University of California, and shall not be used for advertising or product endors.e.m.e.nt purposes.

14. Michael Alexander and Maryfran Johnson, 'Worm Eats Holes in NASA's Decnet', Computer World, 23 October 1989, p. 4.

15. Ibid.

16. William Harwood, 'Shuttle Launch Rained Out', UPI, 17 October 1989.

17. Vincent Del Guidice, 'Atlantis Set for Another Launch Try', UPI, 18 October 1989.

18. William Harwood, 'Astronauts Fire Galileo on Flight to Jupiter', UPI, 18 October 1989.

Chapter 2

1. Words And Music by Rob Hirst/James Moginie. (c) Copyright 1985 Sprint Music. Administered for the World--Warner/Chappell Music Australia Pty Ltd. Used By Permission.

2. FIRST was initially called CERT System. It was an international version of CERT, the Computer Emergency Response Team, funded by the US Department of Defense and run out of Carnegie Mellon University.

3. OTC was later merged with Telecom to become Telstra.

4. Stuart Gill is described in some detail in Operation Iceberg; Investigation of Leaked Confidential Police Information and Related Matters, Ordered to be printed by the Legislative a.s.sembly of Victoria, October 1993.

Chapter 3

1. Words And Music by Peter Garrett/James Moginie.

(c) Copyright 1982 Sprint Music. Administered for the World--Warner/Chappell Music Australia Pty Ltd. Used By Permission.

Chapter 4

1. Words And Music by Peter Garrett/James Moginie/Martin Rotsey. (c) Copyright 1980 Sprint Music. Administered for the World--Warner/Chappell Music Australia Pty Ltd. Used By Permission.

Chapter 5

1. Words And Music by Rob Hirst/James Moginie. (c) Copyright 1989 Sprint Music. Administered for the World--Warner/ Chappell Music Australia Pty Ltd. Used By Permission.

2. The full text of the articles, used by permission News Ltd and Helen Meredith, is:

3. From Operation Iceberg; Investigations and Recommendations into Allegations of Leaked Confidential Police Information, included as Appendix 1 in the report of the Deputy Ombudsman, Operation Iceberg; Investigation of Leaked Confidential Police Information and Related Matters.

4. Ibid., pp. 26-7.

5. Michael Alexander, 'International Hacker "Dave" Arrested', Computer World, 9 April 1990, p. 8.

6. Matthew May, 'Hacker Tip-Off', The Times, 5 April 1990; Lou Dolinar, 'Australia Arrests Three in Computer Break-Ins', Newsday, 3 April 1990.

Chapter 6

1. Words And Music by Rob Hirst/James Moginie/Peter Garrett. (c) Copyright 1978 Sprint Music. Administered for the World--Warner/Chappell Music Australia Pty Ltd. Used By Permission.

Chapter 7

1. Words And Music by Peter Garrett/James Moginie/Rob Hirst. (c) Copyright 1988 Sprint Music. Administered for the World--Warner/Chappell Music Australia Pty Ltd. Used By Permission.

2. Rupert Battc.o.c.k, 'The Computer Misuse Act Five years on--the Record since 1990', paper, Strathclyde University, Glasgow, UK.

3. For the British material in this chapter, I have relied on personal interviews, media reports (particularly for the Wandii case), journal articles, academic papers and commission reports.

4. Colin Randall, 'Teenage Computer Hacker "Caused Worldwide Chaos"', Daily Telegraph, 23 February 1993.

5. The local phone company agreed to reduce the bill to [sterling]3000, EORTIC information systems manager Vincent Piedboeuf told the court.

6. Susan Watts, 'Trial Haunted by Images of Life in the Twilight Zone', The Independent, 18 March 1993.

7. Toby Wolpe, 'Hacker Worked on Barclay's Software', Computer Weekly, 4 March 1993.

8. David Millward, 'Computer Hackers Will be Pursued, Vow Police', Daily Telegraph, 19 March 1993.

9. Chester Stern, 'Hackers' Threat to Gulf War Triumph', Mail on Sunday, 21 March 1993.

10. 'Crimes of the Intellect--Computer Hacking', editorial, The Times, 20 March 1993.

11. 'Owners Must Act to Put End to Computer Hacker "Insanity"', South China Morning Post, 30 March 1993.

Please click Like and leave more comments to support and keep us alive.

RECENTLY UPDATED MANGA

My Doomsday Territory

My Doomsday Territory

My Doomsday Territory Chapter 727 Author(s) : 笔墨纸键 View : 332,185
Nine Star Hegemon Body Arts

Nine Star Hegemon Body Arts

Nine Star Hegemon Body Arts Chapter 4842 Danger Around Every Corner Author(s) : 平凡魔术师, Ordinary Magician View : 7,230,463
Shadow Slave

Shadow Slave

Shadow Slave Chapter 1606 Belated Apology Author(s) : Guiltythree View : 3,292,241
Martial Peak

Martial Peak

Martial Peak Chapter 5836: Crushing the Enemy Author(s) : Momo,莫默 View : 15,247,502
Inadvertently Invincible

Inadvertently Invincible

Inadvertently Invincible Chapter 601 Author(s) : Xin Feng, 新丰 View : 475,414

Underground: Hacking, madness and obsession on the electronic frontier Part 75 summary

You're reading Underground: Hacking, madness and obsession on the electronic frontier. This manga has been translated by Updating. Author(s): Suelette Dreyfus. Already has 490 views.

It's great if you read and follow any novel on our website. We promise you that we'll bring you the latest, hottest novel everyday and FREE.

NovelOnlineFull.com is a most smartest website for reading manga online, it can automatic resize images to fit your pc screen, even on your mobile. Experience now by using your smartphone and access to NovelOnlineFull.com