Talk:Hackers: Heroes of the Computer Revolution

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

Untitled[edit]

I am writing this article as I read the book so it is in progress. It will probably need some editing after I am done with it. Also, initially the article will look like a raw dump of info, but I will edit it for content afterwards. Dori 06:36, Nov 29, 2003 (UTC)

I believe the story about Stewart Nelson conflates two episodes. While I believe he was involved in making blue boxes, I had a brief look at a schematic for one about 1969, this was long after he was involved in programming the pdp-1 to generate dial pulses, not tones, to trace out the MIT telephone network and the networks it connected to. I briefly saw a map of this network around 1965. I heard that the dialing project came to light one night when a telephone company repairman was called in to fix an unrelated problem in the MIT telephone exchange. It seems they had made a factor of two programming error and the pdp-1 output bit was dialing at 5 pulses per second, not the standard 10 pulses per second. The sound of this slow dialing stood out audibly in the nightime quiet of the MIT exchange. The repairman investigated the odd sound and this led to the discovery of the project.--AJim 05:36, 4 June 2006 (UTC)Reply[reply]

this is an added part: usally people think that hackers are bad ones in this technolgical world but they are the ones that reveal the truth about the secret of the crazy world we live in today the bad ones are the crackers they use there cryptolgy skills to destroy your most chersied files programs im speaking from experiance so please don't condem people who hack condem the people who crack

TRANSLATION:

This is an added part: usually people think that hackers are bad ones in this technolgical world but they are the ones that reveal the truth about the secret of the crazy world we live in today. The bad ones are the crackers they use there cryptolgy skills to destroy your most cherished files and programs. I'm speaking from experiance so please don't condemn people who hack. Condemn the people who crack.

(...I couldn't understand the other one :D)

Fair use rationale for Image:Hackersz .jpg[edit]

Image:Hackersz .jpg is being used on this article. I notice the image page specifies that the image is being used under fair use but there is no explanation or rationale as to why its use in this Wikipedia article constitutes fair use. In addition to the boilerplate fair use template, you must also write out on the image description page a specific explanation or rationale for why using this image in each article is consistent with fair use.

Please go to the image description page and edit it to include a fair use rationale. Using one of the templates at Wikipedia:Fair use rationale guideline is an easy way to ensure that your image is in compliance with Wikipedia policy, but remember that you must complete the template. Do not simply insert a blank template on an image page.

If there is other fair use media, consider checking that you have specified the fair use rationale on the other images used on this page. Note that any fair use images lacking such an explanation can be deleted one week after being tagged, as described on criteria for speedy deletion. If you have any questions please ask them at the Media copyright questions page. Thank you.

BetacommandBot (talk) 23:15, 13 February 2008 (UTC)Reply[reply]

Example behavior - Egyptian story[edit]

This is the excised section [[[User:William R. Buckley|William R. Buckley]] (talk) 21:43, 20 December 2009 (UTC)] {Hacker do not have a specific place to live they can be anywhere any time due to computer revolution, in the city of Los Angeles they found a hacker in the email inbox system and when they located the hacker they have found that he has been using a public computer in Cairo Egypt and with the help of INTERPOL they did caught him in action , and for the surprise they found a 13 years old boy doing a professional hacker work , and when they did make a small research of what the damage he did to the mail box system , they found out that he did not do anything and he only wanted to test his skills and after his family get involved and make them make an obligation to prevent him getting into hack again, the 13 years was happy even after the police caught him his shout his name in plain saying " I am the Best Hacker in the World ". police report introduced Mohamed Sherine Mansour Mohamed as the smallest hacker in Egypt.}Reply[reply]

Tabloid[edit]

Chapter 8: "PCC spun off ... a tabloid newspaper" links to a dab page. Please can an expert divert the link to tabloid journalism or tabloid (newspaper format)? Certes (talk) 21:04, 21 September 2011 (UTC)Reply[reply]

What is QURAIS?