Welcome to our latest new user
Rodrigo Yeowtch
! (Registered 2024-11-24)
You are not logged in -
nap
CSDb User Forums
Forums
>
CSDb Discussions
>
"Hacker Tales" - Call for Contributions
2003-08-30
13:55
Scout
Registered: Dec 2002
Posts: 1570
"Hacker Tales" - Call for Contributions
Found this in another forum.
So don't shoot the messenger!!!!
R.
----8<----------SNiP!------------------
"HACKER TALES"
CALL FOR CONTRIBUTIONS
Background:
Dr.K, author of "Complete Hacker's Handbook", has just agreed to write a 2nd book about hackers called "Hacker Tales".
Born in 1959, the author originally did a degree in Psycholinguistics, but soon got sidetracked into hacking, attending "Hacking at the End of the Universe" (1993) and "Access All Areas" (1995). One of the regular attendees at London 2600 for a number of years, Dr.K worked with Zap to co-found the short lived P/H-UK hacking ezine before writing "Complete Hacker's Handbook", and has most recently been working as a computer specialist for the "world's most famous secret society".
When not writing, Dr.K can be found in various London recording studios or playing electronic music at parties and clubs. Dr.K has been married for 25 years and has a large and ever growing brood of ankle-biters to keep him company as he slips into obsolescence.
The recently revised and updated "Complete Hacker's Handbook" (Carlton 2000,2002), has sold over 60,000 copies worldwide, and been translated into Japanese, Dutch and Polish.
Publisher's PR Blurb:
"Hacker Tales" is a compilation of true stories from the cyber-underground relating the exploits of real hackers. It is aimed at a mass market audience who want to read about real world hackers and who are only familiar with hacking from high profile mass-media coverage in newspapers and through fictional representations of hackers in books (e.g. "Neuromancer", "Shockwave Rider", "Snow Crash") and films ("Swordfish", "Hackers", "War Games" & "The Matrix").
Because of this, the public perception of the stereotypical hacker is a obsess ional teenaged boy, pale-faced from spending too long in front of a computer, with a bad complexion from too much junk food, dark rims under the eyes from too much "tube-time" and no social life.
While there is an element of truth in the public stereotype, the reality is somewhat different.
Hacker culture has flourished in the last 10 years as never before, and as the Internet has spread across the globe, the profile of a typical hacker has changed. No longer restricted to university students and academics the Internet has become a playground for people of all ages and genders to explore computers and networks. As the skills involved in hacking have become ever more widespread, cyber-activists and cyber-artists have taken to using new media to spread their message, "old-school" hackers have grown up to become security professionals and a whole new generation have learnt to speak TCP/IP as they come to grips with the ongoing evolution of the World Wide Web.
These days the "hacker" is likely to be an academic, an IT security professional, a bored housewife, a political activist intent on using technology to spread their message or even a spotty teenage boy with too much attitude hell bent on defacing websites just as graffiti artists target trains with spray cans. Their motives will vary, their methods will vary, their favorite food and operating systems will vary, but the end results for the corporations and individuals who are hacked are still the same - a compromised computer system that costs time and money to put back online.
"Hacker Tales" aims to capture the thoughts and stories of the people who choose, for whatever reason, to compromise system security. It will speak with the authentic voice of the cyber-underground as the author talks to genuine hackers and encourages them to have their say, explaining their motives, how they began hacking, their greatest hacks, their methods and in the worst case scenario, how they got busted for hacking and what happened next.
The stories in "Hackers Tales" will be the best way for the readers to understand the mind of a hacker - unless they become a hacker themselves.
GENERAL GUIDELINES FOR CONTRIBUTIONS
I want hackers, communications junkies, computer enthusiasts, computer haters, cyber activists, cyberpunks, cypherpunks, data travelers, digital graffiti artists, electro-wizards, gurus (any kind), hackers, hardware freaks, law enforcement officers, MP3 pirates, old timers, paranoid androids, phone phreaks, programmers, secret society members, security specialists, stupid users, system managers, techno-anarchists, wannabee's, war walkers and war chalkers, warez dudes, whizz kids, and even more hackers to contribute to "Hacker Tales", BUT I also want everyone to be safe from possible legal repercussions.
Here are some guidelines for submissions.
* PROTECT YOURSELF - FIRST & FOREMOST.
* Don't contribute something that gets your ass in court and/or thrown in jail or fired because your uptight and/or straight boss doesn't appreciate your contribution.
* If you need to, then use anonymous webmail, remailers, proxies etc to send any contributions.
* PGP is an option - the "Hacker Tales" public key should be attached to these guidelines.
* Change company and corporate details if necessary, change IP addresses, change anything you want - just make sure that no-one can trace you from what you have contributed.
* Use another handle if you are too well known. Or just submit under "anonymous hacker" or similar. I don't want to know who you are - I just want to collect "Hacker Tales".
* EDITING: I will remove or change any details that will lead to legal consequences. I will change names if they are too personal (to "John Q Hacker" or "Jane X Hacker", "Anonymous Hacker" etc). I will remove or change any header details or corporate IP's; otherwise details will remain intact.
* Any suggestions to make these guidelines better?
* Any problems?
* Any questions?
* Email: completehackershandbook@h o t m a i l_DOT_c.o.m
Submission Suggestions:
Got any stories that fit with these themes?
Got any stories that *don't* fit with these themes that are worth hearing anyhow?
Remember that a good hack doesn't have to compromise system security.
* Early Days: The BBS years
Did you BBS?
How and why did you start and what hacks did you pull on each other?
* Hackers Begin Young
How old were you when you realized you were a hacker?
What did you do next?
* Hacker Groups
Ever been part of a "Hacker Group"?
What happened?
* Phone-Phreaking
How did you start?
What tales can you tell about the times you phreaked?
Any notable long distance, unusual, or other phreaks worth reporting?
* Hacker Conferences
Ever been to a Hacker Conference?
Now tell some funny/sad/unusual/typical tales about a conference.
* Getting Busted
If you have been unlucky enough to get busted:
How and Why?
What happened next?
* Cyber-Activism
Are you a "cyber activist"?
Why? And what do you do to promote your group?
* Pirate Connection
Are you a warez or mp3 pirate?
How did you start and what do you do?
* Social Engineering
If you are a social engineer or infiltration type hacker:
How and why did you start?
What do you do and how do you do it?
* Corporate Hacks
Did you ever hack a big corporation?
Why and How?
What happened then?
* Japes and Jokes
You know what I mean: re-routed phone-lines, mis-directed domains, re-written websites.
* Hacker Food
Pizza or Chinese? Jolt or Espresso?
What's your favorite hacking food?
What's your Favorite Recipe?
* Skip/Dumpster Diving
Ever dumpster dived? Why?
What happened?
Any nifty stories about great skips and bad skips, security, dogs, tools etc.
* Web Defacement
Do you deface websites?
Why do you do it? (Cyber Activism, personal or group promotion or what?)
How do you do it?
* 2600 or other local Hacker Meetings
Do you go to 2600 meetings?
Any stories about what happened?
* Miscellaneous:
The above list is a good starting point BUT do you have another "Hacker Tale" worth telling that doesn't fit with any of these categories? If so please tell it now ...
Personal "Prizes" for Contributors:
Contrary to popular belief, writers get paid peanuts while the publishers reap the rich rewards.
For this reason contributors will not be paid anything - however they WILL get their "Hacker Tale" in print. In an attempt to reward contributors for their hard work, I will hold a raffle for all contributors who wish to enter. Everyone who enters gets their name in a hat and then I will allow my youngest grandson (currently aged 8 months) to pick the winners.
Instead of the usual rubbish (i.e. signed books) I have THREE original "Hacking at the End of the Universe" (1993) posters from the HackTic conference of the same name. They look great hanging in any computer enthusiast's workshop, studio or study. In addition to this I also have the usual rubbish: TWO copies of "Hacker Tales" and ONE copy of "Complete Hacker's Handbook". I'll even sign them if you want, but you'll never get a good price for them second-hand that way ...
FIRST "PRIZE"
HEU poster (1993)
"Hacker Tales" (2004)
"Complete Hacker's Handbook" (2002)
SECOND "PRIZE"
HEU poster (1993)
"Hacker Tales" (2004)
THIRD "PRIZE"
HEU poster (1993)
Once the book goes to press I'll do the raffle and announce the winners.
LEGALESE
My publisher requires that the book will include a standard disclaimer:
"This book is intended as a guide to information retrieval, which may help computer security and guard against hackers. The author and publisher expressly do not advocate any activity that could be illegal in any manner. The reader is advised to consult with his or her attorney concerning applicable federal and state laws. The author and publisher assume no responsibility for any injury and/or damage to persons and property which is incurred as a consequence, directly or indirectly, or the use and application of any of the contents of this work"
WITH THIS IN MIND:
Now is the chance to tell your stories if you want, but remember, protect yourself first and foremost. I don't want any of the "Hacker Tales" to have an unhappy ending because of this book, but I do want everyone to tell their tales.
Dr.K - 19/08/03.
2003-08-30
18:59
Steppe
Registered: Jan 2002
Posts: 1510
So what exactly does this have to do with the Commodore scene? Where exactly lies the point you're trying to discuss with us? Or is this just a cheap spam to get us into buying that book?
*shakes head*
2003-08-30
19:05
Mihai
Registered: Feb 2002
Posts: 29
there were quite a lot of C64 sceners that used to phreak a lot :)
2003-08-30
19:52
Steppe
Registered: Jan 2002
Posts: 1510
Erm, on a second glance I can see that it's indeed a request for contributions...
I got tired of reading after 20 lines and thought it's just another spammer trying to advertise his hacker book. ;-)
Sorry.
2003-08-30
21:33
Mihai
Registered: Feb 2002
Posts: 29
I wonder if he read Hacker's Crackdown, Triad released it on the C=.
2003-08-31
00:13
fade
Account closed
Registered: Mar 2002
Posts: 290
"oh i'm an electronic musician" "movies like Hackers, Matrix"
What a fucken puppet, he can have his bored housewife phreaker shove my mini-moog up his arse as i alligator clip his tongue and send 1336 mhz down.. If he wants a story get him to talk to that Woszniak guy from Apple. But it has been done to death and any idiot knows real phreaking died out with digital technology. Send him to Dalnet with a copy of BackOrifice..
Just like to point out the obvious..
Refresh
Subscribe to this thread:
You need to be logged in to post in the forum.
Search the forum:
Search
All forums
C64 Coding
C64 Composing
C64 Pixeling
C64 Productions
CSDb Bug Reports
CSDb Development
CSDb Discussions
CSDb Entries
CSDb Feedback
CSDb Info
CSDb moderators
CSDb Questions
Messages to moderators
Requests
for
in
Writer & text
Text
Writer
All times are CET.
Search CSDb
All
Releases
Groups
Sceners
Events
BBS
SIDs
-------
Forum
Comments
Advanced
Users Online
Copyfault/Extend^tsn..
Ray Manta/DataDoor
wil
Honcho
Fresh
Genius/Xenon
Alakran_64
Jammer
Guests online: 101
Top Demos
1
Next Level
(9.7)
2
13:37
(9.7)
3
Coma Light 13
(9.7)
4
Edge of Disgrace
(9.6)
5
Mojo
(9.6)
6
The Demo Coder
(9.6)
7
Uncensored
(9.6)
8
What Is The Matrix 2
(9.6)
9
Wonderland XIV
(9.6)
10
Comaland 100%
(9.6)
Top onefile Demos
1
Layers
(9.6)
2
Party Elk 2
(9.6)
3
Cubic Dream
(9.6)
4
Copper Booze
(9.6)
5
Libertongo
(9.5)
6
Rainbow Connection
(9.5)
7
Onscreen 5k
(9.5)
8
Morph
(9.5)
9
Dawnfall V1.1
(9.5)
10
It's More Fun to Com..
(9.5)
Top Groups
1
Performers
(9.3)
2
Booze Design
(9.3)
3
Oxyron
(9.3)
4
Nostalgia
(9.3)
5
Censor Design
(9.3)
Top Logo Graphicians
1
t0m3000
(10)
2
Sander
(9.8)
3
Mermaid
(9.5)
4
Facet
(9.4)
5
Shine
(9.4)
Home
-
Disclaimer
Copyright © No Name 2001-2024
Page generated in: 0.109 sec.