Taki Homosoto, silver haired Chairman of Japan’s huge OSO Industries, survived Hiroshima; his family didn’t. Homosoto promises revenge against the United States before he dies. His passionate, almost obsessive hatred of everything American finally comes to a head when he acts upon his desires.
Author: Winn Schwartau
Wordcount: 212,617 / 650 pg
Flesch-Kincaid Reading Ease: 67
Added to site: 2007.12.01
More Info: massis.lcs.mit.edu
Genres: Post-1930, Computers, Fiction and Literature
pter every few days throughout its E-Mail system as a combination of security aware- ness and employee ‘perc’. Try it; it works and your employees will appreciate it. Why? Because they’ll all talk about it – bringing security awareness to the forefront of discussion.
Distribution for up to 100 people on a single network: $ 500 (Includes 1 Year subscription to “Security Insider Report.”)
Distribution for up to 1000 people on a single network: $ 3000 (Includes 10 1 Year subscriptions to “Security Insider Report.”)
Distribution for up to 2500 people on a single network: $ 6250 (Includes 1 Year electronic Corporate site license to “Security Insider Report.”)
Distribution for up to 5000 people on a single network: $ 10000 (Includes 1 Year electronic Corporate site license to “Security Insider Report.”)
Distribution for up to 10000 people on a single network: $ 15000 (Includes 1 Year electronic Corporate site license to “Security Insider Report.”)
Underground is the compelling true story of the rise of the computer underground and the crimes of an elite group of hackers who took on the forces of the establishment. Copyright (c) 1997, 2001 Suelette Dreyfus & Julian Assange.
Author: Suelette Dreyfus
Wordcount: 153,921 / 464 pg
Flesch-Kincaid Reading Ease: 65.4
Genres: Non-fiction, Computers, Post-1930
frosted glass so the reader can peer into that hazy world. `Underground’ belongs on the Net, in their ephemeral landscape.
The critics have been good to `Underground’, for which I am very grateful. But the best praise came from two of the hackers detailed in the book. Surprising praise, because while the text is free of the narrative moralising that plague other works, the selection of material is often very personal and evokes mixed sympathies. One of the hackers, Anthrax dropped by my office to say `Hi’. Out of the blue, he said with a note of amazement, `When I read those chapters, it was so real, as if you had been right there inside my head’. Not long after Par, half a world away, and with a real tone of bewildered incredulity in his voice made exactly the same observation. For a writer, it just doesn’t get any better than that.
By releasing this book for free on the Net, I’m hoping more people will not only enjoy the story of how the international computer underground rose to power, but also make
L’internet et les technologies numériques sont en train de bouleverser le monde du livre. Imprimé sous de multiples formes depuis plus de cinq siècles, le livre se convertit. Si le livre imprimé a toujours sa place, et pour longtemps encore, d’autres supports se développent, et les habitudes de travail changent. Quelles sont les implications pour tous les professionnels du livre? Quelles sont les perspectives pour les prochaines années?
Author: Marie Lebert
Wordcount: 48,736 / 183 pg
LoC Category: TX
Added to site: 2008.11.18
Genres: Computers, Non-fiction
; web, ou encore WWW ou W3, le World Wide Web est conçu par Tim Berners-Lee en 1989 au CERN (Laboratoire européen pour la physique des particules) à Genève. Mis au point en 1990, le web devient opérationnel en 1991. Il révolutionne la consultation de l’internet en permettant la publication de documents utilisant le système hypertexte, à savoir un ensemble de liens hypertextes reliant les documents textuels et visuels entre eux au moyen d’un simple clic de souris. Désormais interactive, l’information devient beaucoup plus attractive.
Le web est très postérieur à l’internet, réseau informatique global créé en 1974 et connectant gouvernements, sociétés, universités, etc., depuis 1983. Même si, improprement, on les considère souvent comme synonymes, le web n’est qu’un des secteurs de l’internet, qui englobe de nombreux autres services: courrier électronique, foru
c. 1992 Jean Armour Polly. Material quoted from other authors was compiled from public Internet posts by those authors. No copyright claims are made for those compiled quotes. Permission to reprint is granted for nonprofit educational purposes.
Author: Jean Armour Polly
Flesch-Kincaid Reading Ease: 61.5
Genres: Computers, Post-1930, Instructional
OIT.UNC.EDU or 18.104.22.168. Type launch at the login message. It’s a must. Not only can you read Usenet Newsfeeds, but you can use LibTel, a scripted telnet gateway to access both US and international libraries plus such things as Data Research Associates Library of Congress catalog, the Ham Radio Call Book, the National Science Foundation, the Weather Server, Webster’s dictionary and thesaurus, and more.
Remote Access to Files (FTP)
FTP or File Transfer Protocol is what to use to retrieve a text file, software, or other item from a remote host. Normal practice is to ftp to the host you want and login as “anonymous”. Some sites use the password “guest” while others require that you put in your network address as the password. Some popular ftp sites follow:
This archive at Stanford (sumex-aim.stanford.edu or 22.214.171.124) houses a plethora of Macintosh applications, utilities, graphics and sound files.
(simtel20.army.mil or 126.96.36.199) at the White Sands Missile Rang
Copyright 1996 Richard Stallman. Verbatim copying and distribution of this entire article is permitted in any medium, provided this notice is preserved.
Author: Richard M. Stallman
Wordcount: 1,226 / 11 pg
Flesch-Kincaid Reading Ease: 42.9
LoC Category: J
Genres: Computers, Politics, Essays, Post-1930
asingly set up to give absentee operators control over the people actually using the computer system.
The SPA, which actually stands for Software Publisher’s Association, is not today an official police force. Unofficially, it acts like one. It invites people to inform on their coworkers and friends; like the Clinton Administration, it advocates a policy of collective responsibility whereby computer owners must actively enforce copyright or be punished.
The SPA is currently threatening small Internet service providers, demanding they permit the SPA to monitor all users. Most ISPs surrender when threatened, because they cannot afford to fight back in court. (Atlanta Journal-Constitution, 1 Oct 96, D3.) At least one ISP, Community ConneXion in Oakland CA, refused the demand and was actually sued. The SPA is said to have dropped this suit recently, but they are sure to continue the campaign in various other ways.
The university security policies described above are not imaginary. For example, a
This document provides Linux software developers with guidelines and test cases for developing accessible Linux applications.
Author: Sharon Snider
Wordcount: 2,052 / 9 pg
Flesch-Kincaid Reading Ease: 121.2
LoC Category: T
Series: Linux Documentation Project HOWTO
Added to site: 2008.05.10
Genres: Computers, Instructional, Post-1930
2.1. Principles for Developing Accessible Applications
Developers need to consider the following needs of disabled users when developing an accessible application:
* Choice of input methods. Support should be available for various types of input, such as, keyboard, mouse and adaptive technologies. Pay close attention to keyboard navigation. * Choice of output methods. Support should be available for various types of output, such as, visual display, audio, and print. The main focus is that text labels are provided for all user interface elements and objects, graphics, and icons. * Consistency and flexibil
This document is a collection of slang terms used by various subcultures of computer hackers. Though some technical material is included for background and flavor, it is not a technical dictionary; what we describe here is the language hackers use among themselves for fun, social communication, and technical debate. [20 Aug 2000]
Author: Eric S. Raymond
Wordcount: 244,714 / 836 pg
Flesch-Kincaid Reading Ease: 57.3
LoC Categories: QA, AG
Added to site: 2007.01.24
Genres: Computers, Reference, Post-1930, Creative Commons
ele-1983, but external conditions caused the `temporary’ freeze to become permanent.
The AI Lab culture had been hit hard in the late 1970s by funding cuts and the resulting administrative decision to use vendor-supported hardware and software instead of homebrew whenever possible. At MIT, most AI work had turned to dedicated LISP Machines. At the same time, the commercialization of AI technology lured some of the AI Lab’s best and brightest away to startups along the Route 128 strip in Massachusetts and out West in Silicon Valley. The startups built LISP machines for MIT; the central MIT-AI computer became a TWENEX system rather than a host for the AI hackers’ beloved ITS.
The Stanford AI Lab had effectively ceased to exist by 1980, although the SAIL computer continued as a Computer Science Department resource until 1991. Stanford became a major TWENEX site, at one point operating more than a dozen TOPS-20 systems; but by the mid-1980s most of the interesting software work was being
Comment le monde de l’imprimé accepte-t-il ce nouvel outil d’information et decommunication qu’est Internet? De quelle manière Internet prend-il en compte lesdifférents secteurs de l’imprimé? Une étude datée de mars 1999 et basée sur denombreux entretiens.
Author: Marie Lebert
Wordcount: 78,396 / 309 pg
LoC Category: TX
Added to site: 2008.10.26
Genres: Computers, Post-1930, Non-fiction
e tollé. Les concurrents de Microsoft accusaient la société de vouloir créer une situation de quasi-monopole, mettant ainsi en péril la libre concurrence alors qu’il existe une législation anti-trust dans le domaine de la haute technologie. Depuis plusieurs mois, les médias couvrent abondamment les démêlés de Bill Gates, patron de Microsoft, avec le ministère américain de la Justice sur la commercialisation d’Internet Explorer avec ou sans Windows 98 – qui succède à Windows 95.
Chaque serveur web est accessible au moyen d’une adresse qui lui est propre, plus précisément appelée URL (uniform resource locator). De par leur complexité, un grand nombre d’adresses Internet sont difficiles à retenir, si bien que les navigateurs proposent des favoris, également appelés signets. Ces favoris permettent à chacun de constituer son propre ré