Quote: "The back door program included a feature that was designed to modify a computer in which the program was inserted so that the computer would be destroyed if someone accessed it using a certain password." - United States Department of Justice, July 1992 Notes: Page 36 and 37 has a Bellcore letter and 2600 response that is not in the index.
Nom de plume
Discusses the author's (a computer security specialists who works for the U.S. government) take on his interactions with the hacker scene versus the governments' distorted view.
In Best of 2600 book?
Yes, page 384, Section 2 (The 1990s: The World Discovers Hackers), Chapter 11 (More Hacker Stories and Adventures)
Jargon for where lost computerized data has gone - used here as a miscellaneous category. (more..)
Copyleft 2008-2018 William R. Epp, banner by Max Nardi.