Honza ‘Klokánek’ Šípek: Zásek do živýho (1999/2012) [Czech]
Filed under book | Tags: · cyberpunk, czech republic, hacking, security, surveillance

Jaké je české digitální podsvětí? Kdo jsou hackeři? Zbojníci či vandalové? Co dovedou? Proč dělají své odvážné kousky? Jací jsou policisté, kteří je pronásledují? Firmy, vlády, velké společnosti, špionážní služby, státní správa, banky, komunikační satelity – je vubec něco v bezpečí?
“Tenhle text jsem napsal na gymplu v roce 1999 z okouzlení ‘jánošíkovskou’ hackerskou scénou. Plánoval jsem ‘jednou’ ji rozšířit do podoby knihy, ale jak tomu bývá, to ‘jednou’ jsem odkládal tak dlouho, až nikdy nepřišlo. Neboť po webu kolujou různé verze tohoto textu, a navíc se zdá, že o hackerské scéně v daném období toho dneska už moc dohledat nejde (zvláště o skupinách SERT a CzERT), zveřejňuju ji aspoň v nejucelenější dobové podobě, i když je možné, že se věci staly jinak, než píšu, a že bych se dneska za text v jeho naivitě už styděl, nebo se nad ním minimálně poušklíbal. Ale stejně asi stojí za existenci.
As is, no warranty, own risk, atd.
V roce 2012 byl text připraven k webovému vydání a doplněny některé Pajkusovy poznámky s odstupem let.” (author)
119 pages
via gnd
PDF
View online (HTML)
T. F. Peterson: Nightwork: A History of Hacks and Pranks at MIT (2003/2011)
Filed under book | Tags: · education, hacking, technology

An MIT “hack” is an ingenious, benign, and anonymous prank or practical joke, often requiring engineering or scientific expertise and often pulled off under cover of darkness—instances of campus mischief sometimes coinciding with April Fool’s Day, final exams, or commencement. (It should not be confused with the sometimes nonbenign phenomenon of computer hacking.) Noteworthy MIT hacks over the years include the legendary Harvard–Yale Football Game Hack (when a weather balloon emblazoned “MIT” popped out of the ground near the 50-yard line), the campus police car found perched on the Great Dome, the apparent disappearance of the Institute president’s office, and a faux cathedral (complete with stained glass windows, organ, and wedding ceremony) in a lobby. Hacks are by their nature ephemeral, although they live on in the memory of both perpetrators and spectators. Nightwork, drawing on the MIT Museum’s unique collection of hack-related photographs and other materials, describes and documents the best of MIT’s hacks and hacking culture.
This generously illustrated updated edition has added coverage of such recent hacks as the cross-country abduction of rival Caltech’s cannon (a prank requiring months of planning, intricate choreography, and last-minute improvisation), a fire truck on the Dome that marked the fifth anniversary of 9/11, and numerous pokes at the celebrated Frank Gehry-designed Stata Center, and even a working solar-powered Red Line subway car on the Great Dome.
Hacks have been said to express the essence of MIT, providing, as alumnus Andre DeHon observes, “an opportunity to demonstrate creativity and know-how in mastering the physical world.” What better way to mark the 150th anniversary of MIT’s founding than to commemorate its native ingenuity with this new edition of Nightwork?
Revised edition, originally published in 2003
With a new essay by Eric Bender
Publisher MIT Press; in association with the MIT Museum, 2011
ISBN 0262515849, 9780262515849
232 pages
th3 pr0ph3tz 0f GoD: GoD zERo (2011)
Filed under e-zine | Tags: · hacking, internet, privacy, security, software
.GoD.zERo...................................... . . . ######### . . ################# . . ##################### . . ######## ####### . . ##### ### . . ### ## . . ### ## . . ## ## . . ## ## # . . #### ## ## . . ############### ###### . . ############# ###### . . ######### . . . . ###### . . ############ . . ############### . . ## ### . . ## # . O . ## 0 ----> < \==- - - - - - - --- . ## # . / \ _/\_\O <-- internet . ## ### . . ############### . . ############ . . ###### . . ## ## . . ## Your lord and owner ## . . ############################### . . ## ## . . ## ## . . ### ### . . #### #### . . ######## ######## . . ####################### . . ################# . . ######### . . 0 . .....................................GoD.zERo..
tHE t3n c0MM4NDMeNTZ 4 CRiMiN4LZ |_~]0-.-0[~_|
1. th0u sh4ll n3v3r r4T 0N ThY tEAM MaTEZ oR aNUTHEr, diReKTLy oR iNDiREKTLy.
2. th0U sh4LL n3v3R sT4y uP ph0R m0Re tHAn 72 HOuRz sTrAiT iN d4 sERcH 4 w4r3z & 0d4yZ.
3. th0w SHaLL NeVEr kuMMuNiCaTE 0R h4k G1bz0nz oVER iNSECuRE MEDiUMZ. eNCRyPT & BoUNce.
4. th0U sh4LL n3v3R d0 aNyTHiNG pHRUm a SYsTEM tHAt dUzNT ENCRyPT da rOOT diREKtoRY /.
5. THoW sh4LL 4LW4Yz TRuST tHY guT iNSTiNKt. wh3n th1gh sense m4juR he4t 0n a syst3m, j00 disappe4r. s|_|ck 1t up 4nd muV 0n d3r R pL3nTy 0V f1zh iN d4 Se4 0F w4r3Z wh3N th1gH s3ns3 ThY t4LKiNG 2 n4RqZ, g1Ve d3m PH4LsE iNpHo d3n DiSSaPPeAR.
6. th0u sh4LL n3v3R Le4v3 thY b0x3n uNENcRyPTeD oR LoGGeD iN wH3n tHy Le4v3 d4 MuDHuT, th1Z iZ wh3n da CiA SWooP iN.
7. th0W sh4LL n3V3R f0Ld wh3N iNt3r0G4T3d bY dUH L4W iNFORCEMeNT. St4Y sTRoNG, d4 FoRCE 0v 0d4y w4r3Z iZ sTr0NG w1Th1N jUr p33n.
8. th0u Sh4LL tRuZT nO 0n3.
9. ThOw SHaLL h4Ve PHuN iN tHE pRAIRe uV W4R3z. 10.exP3ri3Nce da RekuRsiON.
"j00 cre4t3 b0mbz, w3 cre4t3 f0rk b0mbz. j00 br1ng d0wn build1ngz, w3 br1ng d0wn juR int3rn3t k0nn3kti0n. j00 k1ll pe0pLe, w3 k1ll pr0c3ss33z. j00 vi0l4t3 p3rs0n4l lib3rt1ez, w3 g3n3r4t3 p4ge f4ult vi0lati0nz. j00 h4ve kuRRuPT p0Li7ic1anz, w3 kuRRuPT dUH st4ck. j00 k0ndukT dr0n3 att4x, w3 k0nDuKT p1nG att4kz. j00 r af7eR 0iL, w3 r af73r 0d4y w4r3z. j00 dec33v d4 p33p0le, w3 st1k R jUNK thRu d4 p33p h0Le. j00 trY & pr0gRaM dA m1ndZ 0v d4 p33p0le, w3 pr0gRaM dA w4R3z f0uR 0uR p33pl. j00 th1nk p33pL r sh33p, w3 m4ke JuR boX b33p wh3n w3 reBooT i7. j00 kuMiT w4r cr1m3z, w3 KuMiT PuT3r kRiMEz. j00 s3nd peo0pLe 2 sp4c3, w3 phr33 uP sp4c3 0n jUR h4rd DRiV3 wh3N w3 RM j00. th1z iZ 0ur m4ngiFezt0, 0uR kRiM3 iZ d4t 0v 0wn1Ng j00." -- OSaMa BiN LOGiN
*\o_ _c/*
/ * * \
< \ *\o/* />
)
c/* / > *\o
< \ />
__o */\ /\* c__
* /> GoD < \ *
/\* __o_ _c__ */\
* / * * \ *
<\ />
*\c/*
__)__
Chief editor: lee-0d4ynardo DeCoderio
PDF (TXT; dead link)
PDF (updated on 2012-7-27)