Home
Articles
Search
Status
Best of 2600
Keywords
Links
Mirrors
  Open Source
Overview
SQL
PHP
Data

Best of 2600 Book

see Chapters
see Articles

Notes

Complete articles are not always included in the book. See Summer 1987 [14:2] the News Summary/News Items .., Spring 1998 News Update/News Items [14:1] .., Spring 1991 What's Up?/EFF Lawsuit [8:1] .., Spring 1998 [15:1] Message Sent/Our Financial State .., Winter 1998 [15:4] The Victor Spoiled/Mitnick Update .., News Items Summer 1995 [14:2] .., Autumn 1998 [15:3] Progress ..

Stats

First edition published in 2008.
834 pages of articles and commentary, 36 pages in the index (835-871).
Number of articles: 276, from January 1984 [1:1] thru Winter 2007 [24:4].
147 different authors contributed.
Top ten authors by articles written (ties in alphabetical order):
No Author Specified69
Emmanuel Goldstein37
Bernie S.5
The Prophet4
Acidus3
Scott Skinner3
stankdawg3
Anonymous2
Billsf2
Bioc Agent 0032

Top ten keywords:
Phreaking44
Editorial36
Bit Bucket28
Telecommunications28
Exploit15
News15
History13
BBS8
Mischief8
Big Brother7

Chapters

Section Chapter Page
I - The 1980s: In the Beginning 1. Stories and Adventures 3
2. The Last Days of Ma Bell 21
3. New Toys to Play With 65
4. The Early Days of the Net 119
5. Corporate History 157
6. Raids 179
7. The Hacker Philosophy 207
II - The 1990s: The World Discovers Hackers 8. Pop Culture and the Hacker World 233
9. The Computer Revolution 277
10. Learning to Hack Other Things 313
11. More Hacker Stories and Adventures 381
12. The Changing of the Telephone 421
13. Hackers and the Law 491
III - 2000 and Beyond: A Changing Landscape 14. The Lawsuits 573
15. Still More Hacker Stories 601
16. A New Era of Telephony 651
17. Retail Hacking 691
18. Toys of the 21st Century 731

Articles

Sort by Page
Year Period Issue Title (from Index) Page Title (if different - used by Best of 2600 Book) Page ..
1984 January [1:1] Ahoy! 22 ..
1984 January [1:1] FBI Goes After ADS Hackers 181 ..
1984 January [1:1] The Truth Behind Those 9999 Numbers 9 ..
1984 February [1:2] Hacking On Telenet 121 ..
1984 March [1:3] Alternate Long Distance 66 ..
1984 March [1:3] The Constitution of a Hacker 209 ..
1984 March [1:3] The First Atomic Bomb 5 ..
1984 April [1:4] A True Saga of Teleconferencing 11 ..
1984 April [1:4] The Trouble With Telemail 122 ..
1984 May [1:5] IBM's Audio Distribution Systems Sure Can Be Fun! 69 ..
1984 May [1:5] The Simple Pleasures of a Step Office 49 ..
1984 May [1:5] The Woes of Having a Small-Time Rural Phone Company 56 ..
1984 June [1:6] 2600 "FLASH"...... 73 ..
1984 June [1:6] ARPANET Hopping: America's Newest Pastime 145 ..
1984 June [1:6] The Dark and Tragic Side of the Great Break-up 71 ..
1984 July [1:7] "Look Out, He's Got a Computer!" 211 ..
1984 July [1:7] Introducing the Clear Box 32 ..
1984 July [1:7] MCI Mail: The Adventure Continues 159 ..
1984 August [1:8] But How Does It Work? 24 ..
1984 September [1:9] A Friend in High Places 55 ..
1984 October [1:10] Getting Caught: Hacker's View 213 ..
1984 October [1:10] Vital Ingredients Switching Centers and Operators 45 ..
1984 November [1:11] Exploring Caves in Travelnet 73 ..
1984 December [1:12] A Time For Reflection 215 ..
1984 December [1:12] The Scariest Number in the World 8 ..
1985 February [2:2] Surveying the COSMOS 58 ..
1985 February [2:2] The Theory of 'Blue Boxing' 27 ..
1985 February [2:2] Trashing Alaska Style 17 ..
1985 March [2:3] How to Get Into a C.O. 52 ..
1985 April [2:4] A Phone Phreak Scores 16 ..
1985 May [2:5] How to Run a Successful Teleconference 76 ..
1985 May [2:5] People Express to be Hacked to Pieces 166 ..
1985 June [2:6] Sherwood Forest Shut Down by Secret Service 197 ..
1985 July [2:7] Banking From Your Terminal - A Look At PRONTO 162 ..
1985 July [2:7] Interesting Things To Do On A DEC-20 125 ..
1985 August [2:8] 2600 "FLASH"...... 2600 A Hacking Victim 170 ..
1985 August [2:8] Commentary: The Threat To Us All The Threat To Us All 187 ..
1985 August [2:8] How Can Sysops Protect Themselves? 192 ..
1985 August [2:8] Moving Satellites Right Up in the Blue......What Was Really Going On? What Was Really Going On? 189 ..
1985 August [2:8] Seized! 2600 Bulletin Board is Implicated in Raid on Jersey Hackers Seized 184 ..
1985 September [2:9] Pursuit For People 164 ..
1985 October [2:10] An Interesting Diversion 60 ..
1985 November [2:11] The Early Phreak Days 44 ..
1985 December [2:12] Our Wishes for '86 and Beyond 139 ..
1986 January [3:1] Private Sector Returning 194 ..
1986 January [3:1] The Basics: Divestiture: What Happened? Divestiture: What Happened? 82 ..
1986 March [3:3] An American Express Phone Story 18 ..
1986 March [3:3] An Overview of AUTOVON and Silver Boxes 30 ..
1986 April [3:4] RSTS For Beginners 127 ..
1986 November [3:11] ICN - more than a bargain 173 ..
1986 November [3:11] Mastering the Networks 148 ..
1986 November [3:11] Wrath of God Strikes 2600 161 ..
1986 December [3:12] A Look at the Future Phreaking World Cellular Telephones - How They Work 85 ..
1987 January [4:1] Phone News Phones 89 ..
1987 January [4:1] VMS Hacking Stumbling Into Control on a VMS 129 ..
1987 February [4:2] Telecom Informer The Telecom Informer 91 ..
1987 March [4:3] A Guide to Equal Access Getting the Most Out of Equal Access 93 ..
1987 April [4:4] Hacking PC Pursuit 141 ..
1987 April [4:4] Telecom Informer The Telecom Informer 97 ..
1987 May [4:5] Fax Machines FAX : A New Hobby 144 ..
1987 June [4:6] Allnet Horrors Allnet: A Horror Story 171 ..
1987 June [4:6] Pager Tricks Paging for Free 101 ..
1987 July [4:7] Cellular Fraud Cellular Phone Fraud and Where It's Headed 102 ..
1987 July [4:7] How Phreaks Are Caught How Phone Phreaks Are Caught 109 ..
1987 July [4:7] N.Y. Telephone Exposed 2600 Exposes New York Tel 175 ..
1987 August [4:8] A Hacker Survey 218 ..
1987 August [4:8] Summer Games of 87 The Summer Games of 87 198 ..
1987 September [4:9] Worldnet is Coming Worldnet: Getting Closer Every Day 151 ..
1987 October [4:10] Telco's Response Telco Response 176 ..
1987 October [4:10] Telecom Informer 113 ..
1987 December [4:12] Important News 200 ..
1988 Spring [5:1] The Hacker Threat An Interpretation of Computer Hacking 220 ..
1988 Summer [5:2] Reply To Captain Zap A Reader's Replay to Caption Zap 227 ..
1988 Winter [5:4] Hardwiring Free Calls Hardwiring Your Way In 33 ..
1988 Winter [5:4] MCI Ripping Off Customers MCI: The Phone Company with a Lot of Explaining to Do 168 ..
1989 Spring [6:1] Hackers in Jail 202 ..
1989 Spring [6:1] Payphones Explained How Payphones Really Work 35 ..
1989 Summer [6:2] REMEMBER.... 229 ..
1989 Summer [6:2] Scanning For Calls 116 ..
1989 Autumn [6:3] Galactic Hacker Party The Galactic Hacker Party 216 ..
1989 Autumn [6:3] Grade 'A' Hacking 132 ..
1989 Autumn [6:3] The NYNEX Strike Competition... It's the Next Best Thing to Being There 62 ..
1989 Winter [6:4] Our Ever-Changing World Morris Found Guilty 155 ..
1990 Spring [7:1] For Your Protection 493 ..
1990 Spring [7:1] Listening In Via VHF Listening In 423 ..
1990 Summer [7:2] A Bittersweet Victory 501 ..
1990 Summer [7:2] Fun With COCOTS An Introduction to COCOTs 448 ..
1990 Summer [7:2] Negative Feedback 503 ..
1990 Summer [7:2] What is the EFF? 501 ..
1990 Autumn [7:3] Caller ID Caller ID: The Facts 458 ..
1990 Autumn [7:3] Credit Card Algorithm An Algorithm for Credit Cards 370 ..
1990 Autumn [7:3] Facts and Rumors 509 ..
1990 Autumn [7:3] Tone Dialer Conversion Converting a Tone Dialer into a Red Box 439 ..
1991 Spring [8:1] What's Up? 511 ..
1991 Summer [8:2] Review: Cyberpunk When Hackers Ride Horses: A Review of Cyberpunk 235 ..
1991 Autumn [8:3] Dutch Hacker Intrusion The Hacker Video 253 ..
1991 Autumn [8:3] Postal Hacking USPS Hacking 372 ..
1991 Autumn [8:3] Simplex Locks: Illusion of Security Simplex Locks 314 ..
1991 Autumn [8:3] Tidbits 463 ..
1991 Winter [8:4] Birth of a Low Tech Hacker 382 ..
1991 Winter [8:4] Gulf War Printer Virus Annalysis: Gulf War Printer Virus 289 ..
1991 Winter [8:4] Major Telco Privacy Hole U.S. Phone Companies Face Built-In Privacy Hole 464 ..
1992 Spring [9:1] Virus Scanners Revealed Virus Scanners Exposed 290 ..
1992 Summer [9:2] Here We Go Again 524 ..
1992 Summer [9:2] Hitchhiker's Guide To Boxing Phreaking in the '90s 466 ..
1992 Summer [9:2] Portable Hacking On the Road Again: Portable Hacking 278 ..
1992 Summer [9:2] The View of a Fed 384 ..
1992 Summer [9:2] Voice Mail Hacking Voicemail Hacking 472 ..
1992 Autumn [9:3] Toll Fraud Toll Fraud: What the Big Boys Are Nervous About 478 ..
1992 Winter [9:4] Growth of a Low Tech Hacker 390 ..
1992 Winter [9:4] Hackers in a World of Malls Hackers in a World of Malls: Secret Service Behind Harassment of 2600 Meeting 512 ..
1992 Winter [9:4] Letter From Prison 387 ..
1993 Spring [10:1] A Study of Hackers 392 ..
1993 Spring [10:1] Descrambling Cable 331 ..
1993 Spring [10:1] Lawsuit Filed Against Secret Service Lawsuit Filed Against Secret Service: Action is Taken on Behalf of D.C. 2600 Meeting 517 ..
1993 Summer [10:2] News Update 511 ..
1993 Summer [10:2] Video Review: Commonwealth Films Assorted Videos from Commonwealth Films 238 ..
1993 Autumn [10:3] Congressional Wake-up Calls Congress Takes A Holiday 550 ..
1993 Autumn [10:3] Hacking at the End of the Universe 271 ..
1993 Autumn [10:3] meeting mania 518 ..
1993 Autumn [10:3] True Colors 441 ..
1993 Winter [10:4] Cellular Phone Biopsy 425 ..
1993 Winter [10:4] Hackers in Jail, Part Two 526 ..
1993 Winter [10:4] More Meeting Advice 519 ..
1994 Spring [11:1] A Gift From Hallmark 339 ..
1994 Spring [11:1] Crime Waves 266 ..
1994 Spring [11:1] Scary News Not Much Good News Here 555 ..
1994 Spring [11:1] The Chrome Box 324 ..
1994 Summer [11:2] Hackers On Planet Earth 273 ..
1994 Autumn [11:3] How To Listen In 349 ..
1994 Autumn [11:3] Opening Doors 274 ..
1994 Autumn [11:3] The Ghost Board 397 ..
1994 Winter [11:4] Digital Telephony Passes 559 ..
1994 Winter [11:4] Inspiration 557 ..
1995 Spring [12:1] Pager Major 339 ..
1995 Spring [12:1] Review: Masters of Deception West Side Hacker: Masters of Deception 239 ..
1995 Spring [12:1] The World vs. Kevin Mitnick 528 ..
1995 Summer [12:2] ATM Tricks 335 ..
1995 Summer [12:2] Day of the Hacker 398 ..
1995 Summer [12:2] News Items 534 ..
1995 Summer [12:2] The Bernie S. Saga 531 ..
1995 Summer [12:2] War Dialing 401 ..
1995 Autumn [12:3] Military Madness 405 ..
1995 Autumn [12:3] Movie Reviews : The Net, Hackers "Baby... You're Elite" 243 ..
1995 Autumn [12:3] Movie Reviews: The Net, Hackers The Net 242 ..
1995 Autumn [12:3] No More Secrets 535 ..
1995 Winter [12:4] Fugitive Game, Takedown Review Cashing in on Mitnick: The Fugitive Game 245 ..
1996 Spring [13:1] Caught in the Web 538 ..
1996 Spring [13:1] Confessions of a Beige Boxer 408 ..
1996 Spring [13:1] Unshredding the Evidence 378 ..
1996 Summer [13:2] Guided Perceptions 256 ..
1996 Autumn [13:3] Fallout 540 ..
1996 Winter [13:4] Toward More Secrets 308 ..
1997 Spring [14:1] Consequences of .gov/.mil Hacking 301 ..
1997 Spring [14:1] Downsizing Insurance 414 ..
1997 Spring [14:1] Enough is Enough 544 ..
1997 Spring [14:1] Hacking LED Signs 325 ..
1997 Summer [14:2] Cablemodem Security Holes Cable Modem Security Holes 333 ..
1997 Summer [14:2] Fast Food Phun 365 ..
1997 Summer [14:2] Fortezza: The Next Clipper? 310 ..
1997 Summer [14:2] GSM Comes to North America 428 ..
1997 Summer [14:2] News Summary News Items 299 ..
1997 Summer [14:2] The Neverending Story 562 ..
1997 Autumn [14:3] Sobering Facts 296 ..
1997 Autumn [14:3] The EZPass System The E-ZPass System 327 ..
1997 Winter [14:4] Remember the Future Remember the Future - Distributor Update section 348 ..
1998 Spring [15:1] Message Sent 530 ..
1998 Spring [15:1] Naming Exchanges 484 ..
1998 Spring [15:1] News Update News Items 434 ..
1998 Summer [15:2] Lies 247 ..
1998 Summer [15:2] Where Long Distance Charges Come From 487 ..
1998 Autumn [15:3] Back Orifice Tutorial 294 ..
1998 Autumn [15:3] Progress 254 ..
1998 Autumn [15:3] Trunking Communications Monitoring 362 ..
1998 Winter [15:4] Become a Radio Ninja 367 ..
1998 Winter [15:4] The Victor Spoiled 268 ..
1999 Spring [16:1] Internet Peering 302 ..
1999 Spring [16:1] The Big Time 258 ..
1999 Summer [16:2] A Culmination of Efforts 547 ..
1999 Summer [16:2] Adventures With Neighborhood Gates 419 ..
1999 Autumn [16:3] An Overview of Cellemetry 435 ..
1999 Autumn [16:3] Internet Radio Internet Radio Stations 306 ..
1999 Autumn [16:3] Quantum Hacking 287 ..
1999 Autumn [16:3] The Guide to Thorough Killing Killing a File 285 ..
1999 Winter [16:4] Hack The Media 261 ..
1999 Winter [16:4] Intro to POCSAG/FLEX Interception An Intro to Paging Networks and POCSAG/FLEX Interception 345 ..
1999 Winter [16:4] Violence, Vandals, Victims 566 ..
1999 Winter [16:4] Why Redboxing Doesn't Work 446 ..
2000 Spring [17:1] A Taste of Freedom 586 ..
2000 Spring [17:1] Fun at Circuit City 702 ..
2000 Spring [17:1] The Next Chapter 575 ..
2000 Summer [17:2] A Brief Intro to Biometrics 809 ..
2000 Summer [17:2] Hacking The Three Holed Payphone 652 ..
2000 Summer [17:2] Madness 580 ..
2000 Summer [17:2] Secrets of Dell 697 ..
2000 Autumn [17:3] A Summer of Trials 587 ..
2000 Autumn [17:3] DeCSS in Words 584 ..
2000 Autumn [17:3] The Making of a Pseudo Felon 630 ..
2001 Spring [18:1] Signs of Hope 591 ..
2001 Spring [18:1] The Anna Kournikova Virus Strange Love: Or How I Learned to Stop Worrying and Love the Anna Kournikova Virus 639 ..
2001 Autumn [18:3] Consequences 615 ..
2001 Winter [18:4] 2001-2002 594 ..
2001 Winter [18:4] Basics on Answering Machine Hacking 659 ..
2001 Winter [18:4] Examining Student Databases 602 ..
2001 Winter [18:4] Fun Facts about Wal-mart 711 ..
2001 Winter [18:4] Fun with Radio Shack 704 ..
2001 Winter [18:4] Harnessing the Airwaves 758 ..
2001 Winter [18:4] The Future of Enhanced 911 681 ..
2002 Spring [19:1] CampusWide Wide Open 604 ..
2002 Spring [19:1] Idiocy in the Telcos 655 ..
2002 Spring [19:1] Poor Man's 3d 812 ..
2002 Spring [19:1] Retail Hardware Revisited 714 ..
2002 Summer [19:2] A Look Back 640 ..
2002 Summer [19:2] A New Era of Telecommunications Surveillance A New Era of Telecommunications Surveillance: America in the 21st Century 683 ..
2002 Summer [19:2] NCR ATMs - Aurum Ex Machina 765 ..
2002 Summer [19:2] The Afghan Phone System 657 ..
2002 Summer [19:2] The Comprehensive Guide to 802.11B Wireless Networks 733 ..
2002 Autumn [19:3] A History of '31337SP34K' 816 ..
2002 Autumn [19:3] A Word of Warning from a Caught Uncapper 634 ..
2002 Autumn [19:3] Hacking Electronic Message Centers 768 ..
2002 Autumn [19:3] Hacking on Vacation 722 ..
2002 Autumn [19:3] Outsmarting Blockbuster 695 ..
2002 Winter [19:4] Honeypots: Building the Better Hacker 818 ..
2002 Winter [19:4] Positivity 596 ..
2003 Spring [20:1] A Glimpse at the Future of Computing 642 ..
2003 Spring [20:1] A Hacker Goes to Iraq 618 ..
2003 Spring [20:1] ANI and Caller ID Spoofing 664 ..
2003 Spring [20:1] Best Buy Insecurities 692 ..
2003 Spring [20:1] Fun with 802.11b at Kroger's 700 ..
2003 Spring [20:1] Getting Busted - Military Style 619 ..
2003 Spring [20:1] XM - The Flawed Future of Radio 753 ..
2003 Autumn [20:3] Feeding the Frenzy 662 ..
2003 Autumn [20:3] Getting to Know Your Neighbors 739 ..
2003 Autumn [20:3] Infidelity in the Information Age Infidelity in the Information Age: How I Caught My Cheating Girlfriend 637 ..
2003 Winter [20:4] Hacking the 'Captivate' Network 743 ..
2003 Winter [20:4] Hacking the Genome 820 ..
2003 Winter [20:4] Paranoia vs. Sanity 706 ..
2003 Winter [20:4] Verizon's Call Intercept 669 ..
2004 Spring [21:1] Hacking a Mercedes Benz with a Universal Remote 772 ..
2004 Spring [21:1] Hacking the Hilton 716 ..
2004 Spring [21:1] Vonage Broadband Security Risk 686 ..
2004 Summer [21:2] Impromptu Lock Picks 777 ..
2004 Autumn [21:3] Hacking Soda Machines 721 ..
2004 Autumn [21:3] How to Hack the Lottery 780 ..
2004 Winter [21:4] An Old Trick for a New Dog - WiFi and MITM 744 ..
2005 Spring [22:1] Backdoor Exits from the US Military 627 ..
2005 Spring [22:1] Electronic Application Insecurity 720 ..
2005 Spring [22:1] New York City's MTA Exposed 785 ..
2005 Spring [22:1] Unlocking the Power of WAP 747 ..
2005 Summer [22:2] Fun with School ID Numbers 614 ..
2005 Summer [22:2] Getting More from T-Mobile 675 ..
2005 Summer [22:2] Hacking Google AdWords 795 ..
2005 Summer [22:2] Home Depot's Lousy Security 696 ..
2005 Summer [22:2] ParadisePoker.com Blackjack Cracked 644 ..
2005 Summer [22:2] Remote Secrets Revealed 773 ..
2005 Summer [22:2] The University of Insecurity 612 ..
2005 Winter [22:4] How to Track Any UK GSM Mobile Phone How to Track Any UK GSM Mobile Phone (Without the User's Consent) 679 ..
2005 Winter [22:4] Observing the Lottery 646 ..
2005 Winter [22:4] The Real Electronic Brain Implantation Enhancement 824 ..
2006 Winter [23:4] Circumventing the DoD's SmartFilter 628 ..
2006 Winter [23:4] FirstClass Hacking 615 ..
2006 Winter [23:4] The Not-So-Great Firewall of China 801 ..
2007 Spring [24:1] Backspoofing 101 672 ..
2007 Spring [24:1] Challenges 751 ..
2007 Spring [24:1] RFID: Radio Freak-me-out Identification 749 ..
2007 Summer [24:2] An ISP Story 648 ..
2007 Summer [24:2] Hacking Answers by Gateway 729 ..
2007 Summer [24:2] VoIP Cellphones: The Call of the Future 687 ..
2007 Autumn [24:3] Hacking an Election 805 ..
2007 Autumn [24:3] Social Engineering and Pretexts 828 ..
2007 Autumn [24:3] Target: For Credit Card Fraud 708 ..
2007 Winter [24:4] Cracked Security at the Clarion Hotel 718 ..
2007 Winter [24:4] HACKER PERSPECTIVE: Rop Gonggrijp Using Hacker Skills to Change History 807 ..
2007 Winter [24:4] PayPal Hurts 725 ..
2007 Winter [24:4] Scanning the Skies 761 ..
2007 Winter [24:4] The More Things Change... 831 ..