Date: Wed, 6 May 92 07:27 GMT
From: Jean-Bernard Condat <[email protected]>
Subject: File 4--Chaos Computer Club France's hackers bibliography

Enclosed one bibliography that all the CCCF's members read all the
time in France...

Sincerely yours,

Jean-Bernard Condat
Chaos Computer Club France [CCCF]
B.P. 8005
69351 Lyon Cedex 08, France
Phone: +33 1 47 87 40 83, Fax.: +33 1 47 87 70 70.

     ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

File x: Chaos Computer Club France's hackers bibliography

Nelson, B. [Univ. of Southern California, Los Angeles, CA, USA]:
"Straining the capacity of  the  law:  the  idea of  computer crime in
the age of  the computer worm
 In: Computer/Law Journal (April 1991) vol.11, no.2, pp.299-321
 Considers whether traditional justifications for the
 criminalization  of conduct are adequate to encompass new forms of
 'criminal'  behavior arising out of advanced computer technology.
 Describes the reactions of legislator, computer  designers  and
 users, and members of the general public who have opposed Robert
 Tappan Morris's trial a nd  conviction.  Two  prominent  and
 competing theories, retribution and utilitarianism,are  useful  in
 helping understand the conflict between two sets of social values:
 those we seek to protect by means of a criminal justice system and
 those associated with the basic principles of freedom. Nonetheless,
 neither  traditional  retributive nor utilitarian theory provides a
 clear justification for the imposition of
criminal punishment in the case of the 'crime' that Morris  committed  when
he introduced the Internet worm.  (61 Refs)


Spafford, E.H.[Dept. of Comput.  Sci.,  Purdue Univ.,  West Lafayette,  IN,
USA]: "Are computer hacker break-ins ethical?"
 In: Journal of Systems and Software (Jan. 1992) vol.17, no.1; pp.41-7
 Recent  incidents of unauthorized computer intrusion have  brought  about
discussion of the ethics of breaking into computers.  Some individuals have
argued that as long as no significant damage results, break-ins may serve a
useful purpose. Others counter that the break-ins are almost always harmful
and wrong. This article lists and  refutes  many  of the  reasons given  to
justify computer intrusions. It is the author's  contention that  break-ins
are ethical only in extreme situations, such as a life-critical  emergency.
The article also discusses why no break-in is 'harmless'.  (17 Refs)


Kluepfel, H.M.: "In search  of the cuckoo's nest-an  auditing framework for
evaluating the security of open networks"
 In: EDP Auditor Journal (1991) vol.3; pp.36-48
 In Clifford Stoll's best-selling book "The Cuckoo's Egg" he describes the
pursuit of a computer hacker who, like the cuckoo,  left  something in  the
computing nests of  other  users.  The  paper  provides  a  perspective  on
auditing networked systems to find the nest which may have an  extra  'egg'
in it or is  inviting one  because of a  breakdown in  security  design  or
practice. It  focuses  on:  the  security  implications for an increasingly
open network architecture;  the lessons  learned from  performing intrusion
post-mortems;  the  need  for  architecture  plans  and systems engineering
for security; an audit framework for evaluating security.  (26 Refs)


Raymond, E.S.: "New Hacker's dictionary"
 Publisher: MIT Press, London, UK (1991); xx+433 pp.
 From ack to zorch (and with hundreds of other entries in between) The New
acker's Dictionary is a compendium of the remarkable slang used  by today's
computer  hackers.  Although  it  is organized in reference form, it is not
a mere technical dictionary or a dry handbook of terms;  rather,  it offers
the reader a tour  of  hackerdom's  myths,  heroes,  folk  epics,  in-jokes
taboos,  and  dreams-an  unveiling  of  the  continent-spanning  electronic
communities that knit hackers together.Appendixes include  a  selection  of
classic items of hacker folklore and humor, a  composite  portrait  of  'J.
Random Hacker' assembled from the comments of over one hundred respondents,
and a  bibliography of  nontechnical  works  that  have  either  influenced
or described the hacker culture.  (12 Refs)


Arnold, A.G.; Roe, R.A.[Dept. of Philosophy & Tech. Social Sci., Delft Univ
of Technol., Netherlands]: "Action facilitation; a theoretical  concept and
its use in user interface design"
 In: Work With Computers: Organizational,  Management,  Stress and  Health
Aspects. Proceedings of the Third Conference on Human-Computer Interaction.
Vol.1, pp.191-9
 Editor(s): Smith, M.J.; Salvendy, G.; Elsevier, Amsterdam; xii+698 pp.
 The  concept  of  action facilitation,  derived from  Hacker's  theory of
goal-directed  action,  can  be  defined  as  an improvement or maintenance
of  performance  under  conditions of  decreasing  mental  and/or  physical
effort.  This concept applies to any kind  of  work,  including  work  with
computers.  A method for operationalizing this concept in  the  context  of
human-computer interaction is discussed, and it is  shown how  this  method
can  be  applied to the evaluation and design of user interfaces for office
systems.  (20 Refs)


Menkus, B.: "'Hackers': know the adversary"
 In: Computers & Security (Aug. 1991) vol.10, no.5; pp.405-9
 Abstract:  Confusion  appears  to  continue among many of those concerned
about  computer  security  about who hackers are, what they do and why they
are doing it. The author clarifies some of the terms, concepts, and motives
involved  in  the  hacker  phenomenon.  The  author  discusses the hackers'
objectives  and  their methods. He discusses some of the problems that need
to  be  resolved to in order to tackle hackers' activities. Implementing an
effective  counter  hacker strategy rests on the recognition that access to
information  is  only  granted to aid in tasks of value to the organizatio
and  that  an  organizatio  does  have the right to own and use legitimate
information. He concludes that three tactics should be employed: initiation
of  active  lobbying  by the targets of hacker activity; improved personnel
attribute  verification  on  access;  and  tracing system use activity on a
real-time basis.  (3 Refs)


Cook, W.J.: "Costly callers: prosecuting voice mail fraud"
 In: Security Management (July 1991) vol.35, no.7; pp.40-5
 Abstract:  On  August 17, 1990, Leslie Lynne Doucette was sentenced to 27
months  in  prison.  Her  sentence,  one of the most severe ever given to a
computer  hacker in the United States, was based on her role as the head of
a  nationwide  voice  mail  computer  fraud  scheme  and  her  unauthorized
possession  of  481 access codes as part of that scheme. Evidence developed
during  the  investigation  and disclosed in pretrial proceedings, revealed
that  the case was part of a broader trend toward voice mail computer abuse
by hackers. This article examines the telecommunication technology involved
and  the  ways  computer  hackers  use  and  abuse  that technology, and it
summarizes  the  investigation  that  led  to Doucette's conviction and the
convictions of other hackers in her group.


Myong, A.M.; Forcht, K.A.[James Madison Univ., Harrisonburg, VA, USA]: "The
computer hacker: friend or foe?"
 In:  Journal of Computer Information Systems  (Winter 1990-1991)  vol.31,
no.2; pp.47-9
 Abstract:  To  most  people,  the  hacker seems somewhat harmless but the
reality  is  quite  the  contrary. Quite often, extremely sensitive data is
accessed  by  hackers  and  tampering  of  any  kind can cause irreversible
damage. Although this situation is causing great concern, the hacker is not
seen  as  the  hardened  criminal,  and  laws  dealing  with  this  kind of
'technological  trespass'  poses  the  question: 'is the hacker a friend or
foe?'  Obviously,  these  hackers  violate the security and privacy of many
individuals, but by doing so, vulnerabilities in the systems are showcased,
alerting  the  need  for  increased  security. Paradoxically, by committing
computer  crimes, these 'hackers' could be doing society an indirect favor.
The  authors  give  a  profile  of  a hacker and explain how some users and
systems  make  it  easy  for one to break into their system. Various actual
hacks are also presented.  (13 Refs)


Koseki, J.: "Security measures for information and communication networks"
 In: Data Communication and Processing, (1991) vol.22, no.4; pp.38-46
 Abstract:  The  causes  of interruptions of the information/communication
system  can  be classified roughly into accidents and crime. The factors of
disturbing  system  operations include reduction of system functions due to
traffic  congestion.  While  accidents  occur  due  to  unexpected  natural
phenomena  or  human errors, crimes are failures based on intentional human
behavior,  unjust  utilization  and destruction of the system involving the
hacker   and  computer  virus.  In  order  to  complete  the  security  for
information  and communication networks and eliminate the risk of accidents
and  crime, it is necessary to improve system functions and take harmonious
measures  viewed  from  human  and legal factors as well as a technological
standpoint.


Zajac, B.P., Jr.[ABC Rail Corp. Chicago, IL, USA]: "Interview with Clifford
Stoll (computer crime)"
 In: Computers & Security (Nov. 1990) vol.9, no.7; pp.601-3
 Abstract:  Concerns  the trials of Clifford Stoll, tracking a hacker that
was  looking  for  US  military information and then trying to convince the
Federal  Bureau  of Investigation that he had an international computer spy
on  his  hands.  As  the  system  manager,  he  was  to  track down a $0.75
discrepancy in one of the accounting systems. In his quest Stoll discovered
that  this was not the simple theft of some computer time but was something
far   greater-international   computer   espionage  aimed  at  US  military
computers.


"IT security"
 In: Wharton Report (Aug. 1990) no.144; pp.1-8
 Abstract:  As  our reliance on computer systems increases so too does the
risk  of  data  loss.  A  computer  can  be insecure in many ways: a clever
hacker,  a virus, a careless employee or a vandal can steal, destroy, alter
or  read data with relative ease. In addition to this, the proliferation of
networks  and  the  increasing  number  of  tasks given over to a company's
central  computer  have, while helping us achieve higher degrees of output,
made  our data even more insecure. The trend towards open systems will also
bring us security problems.


Schneider, E.W.[Peacham Pedagogics, Madison, NJ, USA]:  "Progress  and  the
hacker ethic (in educational computing)"
 In: Educational Technology (Aug. 1990) vol.30, no.8; pp.52-6
 Abstract:  A  hacker is someone who writes clever code on a small machine
in  something very close to machine language so that the small machine does
things   that   would   be   impressive  on  a  big  time-sharing  machine.
Microcomputers  were  introduced  into  schools  by  teachers who were also
electronic  hobbyists. Some of these teachers went on to learn programming,
becoming  true  hackers.  Due  to  unprecedented demand from industry, true
hackers  in  education  are  an  extinct  species. Other teachers developed
skills  in  keeping  the  machine  running,  and  ordering  the  latest and
greatest;   they   form   a  group  that  is  peculiar  to  education:  the
pseudo-hackers. Most computer applications in higher education have adopted
a  hacker  ethic.  They act as if educational research and medical research
used  the  same way of determining needs, funding, and performing research,
and  disseminating  the results. They expect teachers to be as motivated as
doctors,  learning about the latest techniques and adopting them as quickly
as  possible.  That  may well be the way it ought to be, but that certainly
isn't the way that it is.


Cook, W.J.: Uncovering the mystery of Shadowhawk
 In: Security Management (May 1990) vol.34, no.5; pp.26-32
 Abstract:  How  can  a  juvenile  infiltrate  some  of the country's most
classified  and  secured  datafiles? Easy-with his home PC. On February 14,
1989,  a  hacker  was sentenced to nine months in prison, to be followed by
two  and  a  half  years'  probation,  and  was  ordered to pay restitution
totaling  $10000.  On February 28, 1989, he started serving his prison term
in  a  prison  in South Dakota. If the hacker had been 18 when he committed
these  crimes,  he  would have faced a possible 13-year prison sentence and
fines totaling $800000. Facts developed during a one-week trial established
that  between  July  and  September  1987,  the hacker, under the code name
Shadowhawk,  used  a modem on his home computer to gain unauthorized remote
access  to  AT&T  computers  in  Illinois,  New Jersey, North Carolina, and
Georgia  and  stole  copies  of  copyrighted  AT&T  source  code worth over
$1,120,000.  (7 Refs)


Greenleaf, G.: "Computers and crime-the hacker's new rules"
 In: Computer Law and Security Report (July-Aug. 1990) vol.6, no.2; p.21-2
 Abstract:  The  author reflects on the international response to the case
of Robert Morris, a US hacker. He looks at recent Australian legislation on
computer crime and some legal definitions from England.


Kluepfel, H.M. [Bellcore, Morristown, NJ, USA]: Foiling  the  wily  hacker:
more than analysis and containment
 Conference  Title: Proceedings. 3-5 Oct. 1989 International Carnahan Conf.
Security Technology; pp.15-21
 Publisher: ETH Zentrum-KT, Zurich, Switzerland; 1989; 316 pp.
 Abstract:  The  author  looks  at  the  methods  and tools used by system
intruders.  He  analyzes the development of the hacker, his motivation, his
environment,  and the tools used for system intrusion. He probes the nature
of   the   vulnerable  networking  environments  that  are  the  target  of
intrusions.  The author addresses how to turn the tables on these intruders
with  their  own  tools  and  techniques. He points out that there are many
opportunities  to  learn  from the intruders and design that knowledge into
defensive  solutions  for  securing computer-based systems. The author then
presents a strategy to defend and thwart such intrusions.  (16 Refs)


Dehnad, K. [Columbia Univ., New York, NY, USA] : "A simple way of improving
the login security"
 In: Computers & Security (Nov. 1989) vol.8, no.7; pp.607-11
 Abstract:  The login procedure is formulated as a test of hypothesis. The
formulation  is  used  to  show  that  the commonly used procedure provides
valuable  information  to a hacker which enables him to use trial and error
to  gain  access  to  a computer system. A general method for reducing this
information  is described and its properties studied. The method introduces
randomness  into  the  procedure, thus denying a hacker the luxury of trial
and error.  (6 Refs)


Earley, J.: "Supplier's view-considering dial-up (hacker prevention)"
 In: Computer Fraud & Security Bull. (Oct. 1989) vol.11, no.12; pp.15-18
 Abstract:  Discusses  the  practicalities  of hacker prevention. Password
protection,   data  encryption  algorithms  and  the  combination  of  data
encryption  and  access control are briefly considered. The Horatius access
control  system  and  Challenge  Personal  Authenticator are discussed.


Lubich, H.P.: "Computer viruses, worms, and other animals: truth & fiction"
 In: Output (5 April 1989) vol.18, no.4; pp.31-4
 Abstract:    Computer    viruses   can   be   classified   according   to
characteristics, especially their effects and their propagation mechanisms.
Harmless  and destructive viruses and their propagation in computer systems
are  discussed.  Related  definitions  of  virus, worm, mole, Trojan horse,
trapdoor, logic bomb, time bomb, sleeper, hole, security gap, leak, hacker,
and  cracker  are  explained.  System penetration by hackers or viruses has
been  aided  by  lack  of  system  security  consciousness, and by security
deficiencies   in   hardware   and   software  supplied  by  manufacturers.
Countermeasures  discussed  include  care in software purchase, use of test
programs, use of special security measures, and recourse to legislation.


Brunnstein, K.: "Hackers in the shadow of the KGB"
 In: Chip (May 1989) no.5; pp.14-19
 Abstract:  The  author  examines  the  question  of  whether  hackers are
criminals  or  idealists.  He sketches a profile of a typical hacker (which
turns  out to be similar to that of a professional programmer) and looks at
hackers'  work  methods,  clubs and motives. He outlines some of their more
wellknown  cases (e.g. the Chaos club, the Hannover hacker, the involvement
of  Russia in buying stolen technical secrets) and comments on the measures
being  taken  to  prevent  hackers  getting in and to make computer systems
'secure'.


Campbell, D.E. [PSI  Int.,  Fairfax,  VA,  USA]:  "The  intelligent  threat
(computer security)"
 In: Security Management (Feb. 1989) vol.33, no.2; pp.19A-22
 Abstract:  This  article  is  about  the  hacker as an external threat, a
terrorist,  a  person  who  destroys  information  for spite, revenge, some
get-rich-quick  scheme, or some ideological reason-but always with physical
or electronic destruction or modification of data as a possible end result.
The  hacker  as  a destructive force is the external threat all information
systems  are  faced  with,  and as a manager of these systems, your job may
depend on how well you defend your data against such a force.


Samid, G.: "Taking uncommon-but effective-steps for computer security"
 In: Computers in Banking (March 1989) vol.6, no.3; pp.22, 61-2
 Abstract:  System managers and security officials should take the time to
familiarize  themselves with the hackers job. Only then will they develop a
sense of their system's vulnerability. Such awareness is a prerequisite for
installation  of  a  heavy-duty  defense. No computer system is break-safe.
Therefore  computer  security  starts with identifying who will benefit the
most  from  breaking  in.  Then  the  analysis  should  assess the value of
breaking  in for the intruder. That value should be less than the effort or
cost of accomplishing the intrusion. As long as the balance cost/benefit is
kept  unfavorable  to  the  would-be  intruder,  the  system  is  virtually
break-safe.


Wilding, E.: "Security services shaken by UK hacker's claims"
 In: Computer Fraud & Security Bulletin; (Jan. 1989) vol.11, no.3; pp.1-5
 Abstract:  Discusses  the  case  of  Edward  Austin  Singh, the UK hacker
reported  in  October  to  have  accessed  some  250  academic, commercial,
government  and  military  networks worldwide. This case serves as a useful
framework  for  discussing  legal issues related to computer hacking in the
UK.


Gliss, H.: "US research systems attacked by German student"
 In: Computer Fraud & Security Bulletin (July 1988) vol.10, no.9; pp.1-3
 Abstract:  A  researcher  with  'a  hacker's  mentality'  caught a German
computer  science student from Hanover. The researcher, Clifford Stoll from
Lawrence  Berkeley  Laboratory  (LBL),  trapped  the  student  by  a  trace
connection  over the US data networks into Bremen University (West Germany)
and  from  there through DATEX-P to the individual telephone from which the
hacker did his job. The author gives a comprehensive overview about Stoll's
successful  approach,  and  the  lessons which LBL management drew from the
case.



Beale, I.: Computer eavesdropping-fact or fantasy
 In: EDP Auditor Journal (1988) vol.3; pp.39-42
 Abstract:  Equipped with a black and white television set, an antenna and
a  small  amount  of  electronics  equipment  it is possible to display the
information  from  the  screen of a terminal located in a building over 300
metres  away. This shows how easy eavesdropping can be, how inexpensive the
necessary equipment is and how readable the data received is. Clearly then,
senior  management  within  many  companies  should  be concerned about the
vulnerability of their systems and the information contained within them. A
broad  range of information currently processed on computer systems is of a
confidential  nature  and  needs to be stored and processed within a secure
environment.  This  type  of information includes financial data, financial
projections,   design  data  for  new  products,  personnel  records,  bank
accounts,  sensitive  correspondence  and competitive contract bids. Any of
this information may be valuable to eavesdroppers either for their own use,
or  so  that they can sell it to a third party. Another interested party in
this  technology is the would-be hacker. By using eavesdropping techniques,
the  hacker  will  be able to readily identify user ids and passwords which
are valid on client computer systems. This will be much more efficient than
the  techniques  currently  used  by  hackers to identify valid user id and
password combinations.


Stoll, C.: "Stalking the wily hacker"
 In: Communications of the ACM (May 1988) vol.31, no.5; pp.484-97
 Abstract:  In  August  1986  a  persistent computer intruder attacked the
Lawrence  Berkeley Laboratory (LBL). Instead of trying to keep the intruder
out,  LBL took the novel approach of allowing him access while they printed
out his activities and traced him to his source. This trace back was harder
than  expected, requiring nearly a year of work and the cooperation of many
organizations. This article tells the story of the break-ins and the trace,
and sums up what was learned.  (49 Refs)


Schechter, H.: "Dial-up network management-more than just security!"
 Conference  Title:  SECURICOM  86. 4th Worldwide Congress on Computer and
Communications Security and Protection; pp.173-8
 Publisher: SEDEP, Paris, France; date: 1986; 476 pp; date: 4-6 March 1986
 Abstract:  During  the  last  few  years,  worldwide  data communications
networks  have  been  besieged  by terrorist attacks, the personal computer
hacker.  As  businesses  have  aggressively  pursued  the use of the PC and
dial-up  services,  they have found that they must guard their networks and
data,  and  at  the  same time manage this dial-up network like they manage
leased  line  networks.  The  paper  analyzes  the  needs and components of
dial-up network management and security.


Troy, E.F.: "Security for dial-up lines"
 Issued by: Nat. Bur. Stand., Washington, DC, USA; May 1986; vi+60 pp.
 Abstract:  This  publication  describes  the  problem  of  intrusion into
government and private computers via dial-up telephone lines, the so-called
'hacker  problem'.  There is a set of minimum protection techniques against
these  people  and  more  nefarious  intruders  which should be used in all
systems which have dial-up communications. These techniques can be provided
by  a  computer's  operating system, in the best case. If the computer does
not  have  the  capability  to  give  adequate  protection  against  dialup
intruders,  then other means should be used to shore up the system's access
control  security.  There  are  a  number  of hardware devices which can be
fitted  to computers or used with their dial-up terminals and which provide
additional  communications  protection  for nonclassified computer systems.
This  publication  organizes  these devices into two primary categories and
six  subcategories  in order to describe their characteristics and the ways
in which they can be used effectively in dial-up computer communications. A
set  of evaluative questions and guidelines is provided for system managers
to  use  in  selecting  the  devices which best fit the need. A set of four
tables  is  included  which  lists  all  known  devices in the four primary
categories,  along  with  vendor contact information. No attempt is made to
perform any qualitative evaluation of the devices individually.  (41 Refs)


Roberts, W. [Dept. of Comput. Sci., Queen Mary  Coll.,  London, UK]:  "'Re-
member to lock the door': MMI and the hacker"
 Conference    Title:   System   Security:   Confidentiality,   Integrity,
Continuity. Proceedings of the International Conference; pp.107-14
 Publisher: Online Publications, Pinner, UK; date: 1986; xii+232 pp.
 Conference date: Oct. 1986; London, UK
 Abstract:  Increasing  emphasis  is being placed on the importance of man
machine  interface  (MMI)  issues  in  modern  computer systems. This paper
considers  the  ways  in  which  common  MMI features can help intruders to
breach  the security of a system, and suggests methods for enhancing system
security and data integrity by careful MMI design, aiding both the user and
the system administrator.


Murphy, I. [Secure Data Syst., Philadelphia, PA, USA]: "Aspects  of  hacker
crime: high-technology tomfoolery or theft?"
 In: Information Age (April 1986) vol.8, no.2; pp.69-73
 Abstract:  Computer  crime  is  an increasingly common problem worldwide.
Perpetrated by a growing band of people known as hackers, it is exacerbated
by  the  ease  with  which  hackers  communicate  over clandestine bulletin
boards. The types of information contained in these boards is reviewed, and
a parallel is drawn with the problem of telephone fraud also rampant in the
USA.  The  author  looks at the problem of unauthorized access to telephone
lines and personal data. (1 Ref)


Shain, M.: "Software protection-myth or reality?"
 Conference  Title:  Protecting  and  Licensing Software and Semiconductor
Chips in Europe; 30 pp.
 Publisher: Eur. Study Conferences, Uppingham, Rutland, UK; 1985; 273 pp.
 Conference date: 7-8  Nov. 1985; Amsterdam, Netherlands
 Abstract:  The  article  reviews  the  motives  people  have  for copying
software and estimates the size of the revenue loss due to this. Commercial
software  protection  schemes  are reviewed and an account of microcomputer
fundamentals  is  given  for  those with no prior knowledge. The techniques
used  by the software hacker are analyzed and a view is taken as to whether
software protection is a myth or reality.


Mullen, J.B.: "Online system reviews: controls and management concerns"
 In: Internal Auditor (Oct. 1985) vol.42, no.5; pp.77-82
 Abstract:  The  generally  accepted  controls  for  online systems can be
divided  into  three categories: preventive; detective; and corrective. The
preventive  controls  include  sign-on  key  and  passwords.  The  periodic
changing of these controls and other preventive access controls may prevent
a  hacker  from  learning  the access system via observation. The detective
controls   include:  line  protocol,  which  defines  the  method  of  data
transmission;  front-end  edits,  routines  within  the  online-application
programs  to  detect  errors  in  critical fields; and authorization files,
online  files  containing  user  passwords.  Corrective  controls  include:
transaction  logging;  online  training,  security software; audit caveats;
audit procedures and effectiveness.


Rous, C.C. [Cerberus Comput. Security Inc., Toronto, Ont.,  Canada]:  "What
makes hackers tick? A computer owner's guide"
 In: CIPS Review (July-Aug. 1985) vol.9, no.4; pp.14-15
 Abstract:   Harmless  pranksters  or  malicious  wrongdoers?  A  computer
security  expert  points  out  the  differences and similarities-and offers
preventative  tips.  A  major  concern of most data processors today is the
threat  of  'The  Hacker'. This article attempts to de-mystify the breed by
examining  hacker  psychology.  The  focus  is  on  the distinction between
frivolous  and  serious,  or  benign  and  malicious,  hackers.  While  the
distinction  is valid, it is equally important to recognize the fundamental
similarities  between the two. In addition, no matter how benign the hacker
who  penetrates  a  system,  if  he or she has done so a more malicious one
presumably  could  too.  The  author goes on to list the different types of
hacker  and provides a detailed analysis of each one. Finally, some lessons
for owners and operators of computer systems are offered.


Haight, R.C.: "My life as a hacker" Conference  Title:  ACC  '84.  Proceedings
 of  the  Australian  Computer Conference; pp.205-12 Editor(s): Clarke, R.
 Publisher: Austr. Comput. Soc, Sydney, NSW, Australia; 1984; xx+672 pp.
 Conference date: 4-9  Nov. 1984; Location: Sydney, NSW, Australia Abstract:
 The  author  has  been programming and supervising programmers since 1961.
 His experiences and personal viewpoint are described.

Downloaded From P-80 International Information Systems 304-744-2253