Professional Documents
Culture Documents
Hugo Cornwall
****************************************
HUGO CORNWALL
Introduction
Appendices (omitted)
I: Trouble Shooting
II: Eccentric Glossary
III: CCITT and related standards
IV: Standard computer alphabets
V: Modems
VI: RS 232C and V 24
VII: Radio Spectrum
VIII: Port-finder flow chart
IX: File Transfer Protocols
Index (omitted)
The world outside the home computer has also changed. Electronic
publishing was still a tentative, self-apologetic industry in
1984; now it is operating with vigour and there are many more and
many different systems and services to be explored. There has
been an astonishing growth in the range of electronic services
available for customers of all kinds to use; some represent
substantial publishing activities, others allow large companies
to work ever more closely with their branches and men in the
field, or to communicate more effectively with retailers. The
keen competition to sell new financial services has made banks
and building societies place even more of their future hopes in
communications technology. Electronic mail systems are now
serious commercial enterprises. At the same time, the range of
network facilities - the railway lines or roads along which data
can travel from one remote location to another - has been
considerably extended both in terms of sophistication and the
number of people who expect to use it.
INTRODUCTION
Every hacker I have ever come across has been quite clear where
the fun lies: it is in developing an understanding of a system
and finally producing the skills and tools to command it. In the
vast majority of cases the processes of 'getting in' and
exploring the architecture of the operating system and applications
is much more satisfying than what is in the end discovered from
protected data files. In this respect the hacker is the direct
descendant of the phone phreaks of fifteen years ago; phone
phreaking became interesting as intra-nation and international
subscriber trunk dialling was introduced - when the London-based
phreak finally chained his way through to Hawaii he usually had
no one there to speak to - except the local weather service or
American Express office to confirm that the desired target had
indeed been hit. Interestingly enough, one of the earliest of the
present generation of hackers, Susan Headley, only 17 when she
began her exploits in California in 1977, chose as her target the
local phone company and, with the information extracted from her
hacks, ran all over the telephone network. In one of the many
interviews which she has given since, she has explained what
attracted her: it was a sense of power. Orthodox computer
designers have to be among the intellectual elite of our time;
and here was a 17-year-old blonde, hitherto heavily into rock
musicians, showing their work up. She 'retired' four years later
when a boy friend started developing schemes to shut down part of
the phone system. Last heard of, after giving evidence to a
committee of the US Congress, she was working on a "government
project".