Prices for Custom Writing
within 5 days $17.95 per page within 3 days $19.95 per page within 48 hours $21.95 per page within 24 hours $25.95 per page within 12 hours $29.95 per page within 6 hours $38.95 per page
Service Features
  • Original and quality writing
  • 24/7 qualified support
  • Lifetime discounts
  • 300 words/page
  • Double-spaced, 12 pt. Arial
  • Any writing format
  • Any topic
  • Fully referenced
  • 100% Confidentiality
  • Free title page
  • Free outline
  • Free bibliography
  • Free unlimited revisions
Affordable Student Services

Sign-up for over 800,000 original essays & term papers

Buy original essay on any topic

hackers

Title: hackers
Category: /Literature/English
Details: Words: 10079 | Pages: 37 (approximately 235 words/page)
hackers
TABLE OF CONTENTS Introduction . . . . . . . . . . . . . . . . . . . 1 Methodology . . . . . . . . . . . . . . . . . . . 6 What is the Computer Underground? . . . . . . . . 11 Topography of the Computer Underground . . . . . . 20 Hacking . . . . . . . . . . . . . . . . . 20 Phreaking . . . . . . . . . . . . . . . . . . 21 Pirating . . . . . . . . . . . . . . . . . 24 Social Organization and Deviant Associations . . . 28 Mutual Association . . . . . . . . . . . . . . . . 31 The Structure of the Computer Underground . . . . 33 Bulletin Board Systems . . . . . . . . . . 33 Towards a BBS Culture . . . . . . . . . 37 Bridges, Loops, and Voice Mail Boxes . . . 53 Summary . . . . . . . . . . . . . . . . . . 57 Mutual Participation . . . . . . . . . . . . . . . 59 Pirate Groups . . . . . . . . . . . . . . . 63 Phreak/hack groups . . . . . . . . . . . . 64 Summary . . . . . . . . . . . . . . . . . . 67 Conclusion . . . . . . . . . . . . . . . . . . . . 69 REFERENCES . . . . . . . . . . . . . . . . . . . . 75 APPENDIX A. COMPUTER UNDERGROUND PSEUDONYMS . . . 76 APPENDIX B. NEW USER QUESTIONNAIRE FROM A PHREAK/HACK BBS . 77 Introduction The proliferation of home …showed first 75 words of 10079 total…
You are viewing only a small portion of the paper.
Please login or register to access the full copy.
…showed last 75 words of 10079 total…keeping off random non-CU callers, are not effective in screening out "feds." Data and media accounts show that boards are regularly infiltrated by telephone security personnel and software companies. Also, the adoption of handles to protect identities is defeated by the consistent use of the same handle over time. But in order to obtain and maintain status and prestige in the CU one must keep the same pseudonym in order to (literally) "make a nam

Need a custom written paper?

Buy a custom written essay and get 20% OFF the first order