Back to Results

HOUSE_OVERSIGHT_018327.jpg

Source: HOUSE_OVERSIGHT  •  other  •  Size: 0.0 KB  •  OCR Confidence: 85.0%
Download Original Image

Extracted Text (OCR)

wilderness. They fused often fantastic technical skill with the hacker’s instinct for control - admixed with a criminal’s hunger for profit. The first computer viruses and worms were part of what they sold. These had appeared in the 1980s, mostly as curious intellectual exercises. There was a desire among computer engineers, a scientific sort of craving, to see what might be done on the systems they had built. It was not unlike those whistling telephone tones that had so fascinated Cap’n Crunch and Steve Jobs and Woz. Could you make the big room-sized machines twitch in ways no one had imagined? Absolute, undeniable thrill ran through this sort of activity. I can still recall returning to my office one day in the mid-1990s with a Ziploc-bag that contained a floppy disk marked “Viruses” which I used to promptly break my computer so completely it had to be reformatted. Twice. Such adventures, however, were also producing some of the best programmers of my generation. Managing tricks inside those early systems required then, as it does now, a profound intimacy with the code defining their electrical operations. (Computer programs are called “code”; people who write and test them are “coders”.) But the secret moves behind those early cracks and exploits were rarely secret for long. The informal culture of stapled together magazines like 2600 told you what you needed to know about this band: It was a group that liked to share, to brag, to indulge each other in stories about systems they had cracked open, to play with a bit of light paranoia about who might be watching you and who might care. Computers. Systems. That’s my bag. You might as well spread some of the adrenaline rush of your adventure with others. The sense of a “shared alternate reality” most of us had first experienced in games like Dungeons and Dragons or the pages of Dune fit nicely into the digital world. This open, friendly temperament animated most of the people spread across that Amsterdam field, jumping into the lake instead of showers, talking math, buzzing at each other like a fridge. We had the programmer’s raw fascination about what a machine might be made to do, even in ways that were deeply unintended. We were harmless. The Warez Dudes, however, were different. Their fascination was a greedy, nasty obsession. 2. The business of playing with and inside of connected computer systems was, even as we sat on that Amsterdam summer lawn, shifting. It was slipping from earnest hobbyists and system managers to something a bit more sinister. We had just begun using a new phrase, “malware,” to describe the malicious software that took advantage of Postel’s “be liberal” instinct in order to devastate connected systems that were filled with too many trusting, unlocked doors. It wasn’t merely the relaxed system design of the early ‘net or computer systems that made exploitation easy. It was also that the networks and machines themselves were slipping with a kind of frictionless momentum towards increasing complexity. This meant, invariably, that popular programs often shipped to users with mistakes or programming oversights that invited hijack. The year before the Amsterdam conference, for instance, a cruel program known as “Michelangelo”, which would overwrite the data on hard disk 95 HOUSE_OVERSIGHT_018327

Document Preview

HOUSE_OVERSIGHT_018327.jpg

Click to view full size

Document Details

Filename HOUSE_OVERSIGHT_018327.jpg
File Size 0.0 KB
OCR Confidence 85.0%
Has Readable Text Yes
Text Length 3,332 characters
Indexed 2026-02-04T16:34:43.428031

Related Documents

Documents connected by shared names, same document type, or nearby in the archive.

Ask the Files