Home
Articles
Search
Status
Best of 2600
Keywords
Links
Mirrors
  Open Source
Overview
SQL
PHP
Data

Articles

    prev next

Summer1992 cover image
Volume 9
Number 2
48 pages
Summer1992 back cover image
Quote: "The back door program included a feature that was designed to modify a computer in which the program was inserted so that the computer would be destroyed if someone accessed it using a certain password." - United States Department of Justice, July 1992
Notes: Page 36 and 37 has a Bellcore letter and 2600 response that is not in the index.

Author
Nom de plume The Fed
Name
Email
Notes

Aritcle
Synopsis Discusses the author's (a computer security specialists who works for the U.S. government) take on his interactions with the hacker scene versus the governments' distorted view.
Notes
Code None
Page 38
Pages 2
In Best of 2600 book? Yes, page 384, Section 2 (The 1990s: The World Discovers Hackers), Chapter 11 (More Hacker Stories and Adventures)

Links

Addendum

Keywords
Bit Bucket Jargon for where lost computerized data has gone - used here as a miscellaneous category.    (more..)