"Unleash your creativity and unlock your potential with MsgBrains.Com - the innovative platform for nurturing your intellect." » » ,,Underground: Hacking, Madness, and Obsession on the Electronic Frontier'' by Suelette Dreyfus🌏🗺️

Add to favorite ,,Underground: Hacking, Madness, and Obsession on the Electronic Frontier'' by Suelette Dreyfus🌏🗺️

Select the language in which you want the text you are reading to be translated, then select the words you don't know with the cursor to get the translation above the selected word!




Go to page:
Text Size:

NIC Network Information Center (US), run by DOD: a computer which assigned domain names for the Internet.

NRL Naval Research Laboratory (US)

NSA National Security Agency (US)

NUA Network User Address: the `telephone' number of a computer on an

X.25 network

NUI Network User Identifier (or Identification): combined username/password used on X.25 networks for billing purposes

NorTel Northern Telecom, Canadian manufacturer of telecommunications equipment

PABX Private Automatic Branch Exchange

PAD Packet Assembler Disassembler—ASCII gateway to X.25 networks

PAR `PAR?'—command on PAD to display PAD parameters

RMIT Royal Melbourne Institute of Technology

RTG Radioisotope Thermoelectric Generator, space probe Galileo's plutonium-based power system

RTM Robert Tappan Morris (Jr), the Cornell University student who wrote the Internet worm, also known as the RTM worm

Scanner A program which scans and compiles information, such as a list of NUAs

SPAN Space Physics Analysis Network: global DECNET- based network, primarily controlled by NASA

Sprint US telecommunications company, an X.25 network provider

Sprinter Word used by some Australian and English hackers to denote scanner. Derived from scanning attacks on Sprint communications

Sprintnet X.25 network controlled by Sprint communications

Sun Sun Microsystems—a major producer of Unix workstations

TCP Transmission Control Protocol (RFC793): a standard for data connection between two computers on the Internet

TELENET An X.25 network, DNIC 3110

Telnet A method of connection between two computers on the Internet or other TCP/IP networks

Trojan A program installed by hackers to secretly gather information, such as passwords. Can also be a backdoor

Tymnet An X.25 network controlled by MCI, DNIC 3106

Unix Multi-user computer operating system developed by AT&T and

Berkeley CSRG

VAX Virtual Address Extension: series of mini/mainframe computer systems produced by DEC

VMS Virtual Memory System: computer operating system produced by DEC and used on its VAX machines

WANK Worms Against Nuclear Killers: the title of DECNET/VMS-based worm released into SPAN/DEC/HEPNET in 1989

X.25 International data communications network, using the X.25 communications protocol. Network is run primarily by major telecommunications companies. Based on CCITT standard # X.25

Zardoz A restricted computer security mailing list

Notes.

Chapter 1

1. Words And Music by Rob Hirst/Martin Rotsey/James Moginie/Peter Garrett/Peter Gifford. (c) Copyright 1982 Sprint Music. Administered for the World—Warner/ Chappell Music Australia Pty Ltd. Used By Permission.

2. I have relied on numerous wire service reports, particularly those of UPI Science Reporter William Harwood, for many of my descriptions of Galileo and the launch.

3. William Harwood, `NASA Awaits Court Ruling on Shuttle Launch Plans', UPI, 10 October 1989.

4. William Harwood, `Atlantis "Go" for Tuesday Launch', UPI, 16 October 1989.

5. Ibid.

6. From NASA's World Wide Web site.

7. Thomas A. Longstaff and E. Eugene Schulz, `Analysis of the WANK and OILZ Worms', Computer and Security, vol. 12, no. 1, February 1993, p. 64.

8. Katie Haffner and John Markoff, Cyberpunk, Corgi, London 1994, p. 363.

9. The Age, 22 April 1996, reprinted from The New York Times.

10. DEC, Annual Report, 1989, listed in `SEC Online'.

11. GEMTOP was corrected to GEMPAK in a later advisory by CIAC.

12. `Officially' was spelled incorrectly in the original banner.

13. This advisory is printed with the permission of CIAC and Kevin Oberman. CIAC requires the publication of the following disclaimer:

This document was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government, nor the University of California, nor any of their employees makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation or favouring by the United States Government or the University of California. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or the University of California, and shall not be used for advertising or product endorsement purposes.

14. Michael Alexander and Maryfran Johnson, `Worm Eats Holes in NASA's Decnet', Computer World, 23 October 1989, p. 4.

15. Ibid.

16. William Harwood, `Shuttle Launch Rained Out', UPI, 17 October 1989.

Are sens