Full Text of <i>Underground</i> Available for Download

    Date18 Jan 2001
    3441
    Posted ByAnthony Pell
    The full text of "Underground: tales of hacking, madness and obsession on the electronic frontier" is now available for download. ""Underground is the compelling true story of the rise of the computer underground and the crimes of an elite group of . . . The full text of "Underground: tales of hacking, madness and obsession on the electronic frontier" is now available for download. ""Underground is the compelling true story of the rise of the computer underground and the crimes of an elite group of hackers who took on the forces of the establishment.

    Tracing an international ring of computer hackers which spanned three continents and nearly a decade of computer crime, author Suelette Dreyfus weaves a gripping tale against a backdrop of cutting edge technology. Underground uncovers the previously hidden story behind hackers from 8LGM, The Realm, the publishers of International Subversive and other linked Internet hacking groups. These elite hackers were the cream of the international computer underground and broke into tens of thousands of computers, belonging to some of the world's most prestigious institutions including Citibank, the Pentagon, NATO, the FT 100, NASA, Lockheed-Martin, Deutsche Telekom and Australian Telecom. After hacking the Defence Data Network's NIC, some had total control over the most important computers on the Internet - computers which would let them stop communications across the entire net. They divised methods of making free and untraceable telephone calls to hide their activities, invented worms, stalked, hacked and thumbed their noses at security experts such as Eugene Spafford & Cliff Stoll and reporters from the New York Times. They monitored the police -- while the police monitored them. The hackers came from all walks of life, gathering on-line in Germany from Australia, Europe, the UK, the US and Canada, to pursue their targets with an obsessive fervour. "

    See their page at http://www.underground-book.com.

    You are not authorised to post comments.

    LinuxSecurity Poll

    Do you reuse passwords across multiple accounts?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    13
    radio
    [{"id":"55","title":"Yes","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"56","title":"No","votes":"0","type":"x","order":"2","pct":0,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.