Konrad Becker: Die Politik der Infosphäre: World-Information.Org (2003) [German]

2 March 2010, dusan

Wir leben in einer Zeit des Übergangs zwischen einem Zeitalter, das auf industrieller Produktion basiert, und einer Gesellschaft, in der die Schaffung und der Austausch von Informationen den Mittelpunkt bilden. Mit der Entwicklung von Informations- und Kommunikationstechnologien ist eine neue, globalisierte Wirtschaft auf dem Vormarsch, die nicht nur aktuelle politische Vorgänge beeinflusst. Gleichfalls hinterfragt sie den inneren Zusammenhalt der Gesellschaft, die traditionellen Werte und das bisherige Verständnis von Arbeit und Kultur.

“Die Politik der Infosphäre World-Information.Org” untersucht diese dramatischen Veränderungen und zeigt aktuelle Tendenzen dieses gesellschaftlichen Wandels auf.

Editors Konrad Becker, Institut für Neue Kulturtechnol
Publisher VS Verlag, 2003
ISBN 3810038660, 9783810038661
Length 272 pages

publisher
google books

PDF (PDF by chapter)

FlossManuals.net: Circumvention Tools. How to Bypass Internet Censorship (2009/2011)

10 January 2010, dusan

A book describes circumvention tools and explains why you might want to use them, and honestly describes the risks you must consider before circumventing blockers or monitors. Blockers and monitors restrict access to areas of the Internet, and this book describes simple techniques for bypassing those restrictions.

The growth of the Internet has been paralleled by attempts to control how people use it, motivated by a desire to protect children, businesses, personal information, the capacity of networks, or moral interests, for example. Some of these concerns involve allowing people to control their own experience of the Internet (for instance, letting people use spam-filtering tools to prevent spam from being delivered to their own e-mail accounts), but others involve restricting how other people can use the Internet and what those other people can and can’t access. The latter case causes significant conflicts and disagreements when the people whose access is restricted don’t agree that the blocking is appropriate or in their interest. Problems also arise when blocking mechanisms and filters reduce access to useful business, health, educational, and other information.

Because of concerns about the effect of internet blocking mechanisms, and the implications of censorship, many individuals and groups are working hard to ensure that the Internet, and the information on it, are freely available to everyone who wants it. There is a vast amount of energy, from commercial, non-profit and volunteer groups, devoted to creating tools and techniques to bypass Internet censorship. Some techniques require no special software, just a knowledge of where to look for the same information. Programmers have developed a variety of more capable tools, which address different types of filtering and blocking. These tools, often called “circumvention tools” help Internet users access information that they might not otherwise be able to see. This book documents simple circumvention techniques such as a cached file or web proxy, and also describes more complex methods using Tor, which stands for The Onion Router, involving a sophisticated network of proxy servers.

This manual has content that was largely written at a Book Sprint. The Book Sprint was held in the beautiful hills of Upper New York State in the US. Eight people worked together over an intensive five-day period to produce the book. It is a living document of course and is available online for free, where you can also edit it and improve it.

Published FlossManuals.net, 2011-03-10
240 pages
GNU General Public License version 2

project website (added on 28-5-2011)
FlossManuals page (updated on 28-5-2011)

PDF (updated on 28-5-2011)
PDF (lightweight Quickstart PDF, 8 pages; added on 28-5-2011)

Douglas Thomas: Hacker Culture (2003)

29 December 2009, dusan

A provocative look at the subculture that has shaped our changing attitudes toward the digital age.

Demonized by governments and the media as criminals, glorified within their own subculture as outlaws, hackers have played a major role in the short history of computers and digital culture-and have continually defied our assumptions about technology and secrecy through both legal and illicit means. In Hacker Culture, Douglas Thomas provides an in-depth history of this important and fascinating subculture, contrasting mainstream images of hackers with a detailed firsthand account of the computer underground.

Programmers in the 1950s and ’60s—”old school” hackers—challenged existing paradigms of computer science. In the 1960s and ’70s, hacker subcultures flourished at computer labs on university campuses, making possible the technological revolution of the next decade. Meanwhile, on the streets, computer enthusiasts devised ingenious ways to penetrate AT&T, the Department of Defense, and other corporate entities in order to play pranks (and make free long-distance telephone calls). In the 1980s and ’90s, some hackers organized to fight for such causes as open source coding while others wreaked havoc with corporate Web sites.

Even as novels and films (Neuromancer, WarGames, Hackers, and The Matrix) mythologized these “new school” hackers, destructive computer viruses like “Melissa” prompted the passage of stringent antihacking laws around the world. Addressing such issues as the commodification of the hacker ethos by Silicon Valley entrepreneurs, the high-profile arrests of prominent hackers, and conflicting self-images among hackers themselves, Thomas finds that popular hacker stereotypes reflect the public’s anxieties about the information age far more than they do the reality of hacking.

Publisher U of Minnesota Press, 2003
ISBN 0816633460, 9780816633463
Length 266 pages

publisher
google books

PDF