Turner, corporate mercenary, wakes in a reconstructed body, a beautiful woman by his side. Then …
William Gibson is a lot more surehanded in this one than in Neuromancer. The foundation of the world was laid in that first work, so here Gibson is better able to focus on the characters and story.
We've got a (mostly) different cast than book one, and steps are taken to characterize them differently right away. About 2/11 hours into the audiobook and the stakes are slowly coming into focus.
If they were a hall of fame or shame for computer hackers, a Kevin Mitnick …
A Legend in His Own Words
4 stars
Kevin Mitnick was one of the big names in 90's/00's hacking culture. This is his story.
It begins as a plodding biography of a young man who frequently gets into trouble for his pranks and curiosity. There are too many things he wants to know and he will circumvent procedural or technical barriers to find out. He begins to hack compulsively.
As the story continues Kevin gets into progressively more trouble as a result of his hacks. He also suffers betrayals at the hands of friends, hacking partners, rivals, and even a girlfriend. The story begins to take on the character of an espionage thriller as the net closes around him and he succeeds in increasingly more narrow escapes. He is eventually caught and the story enters its falling action from there.
Unfortunately Kevin is obviously a douchebag and it bleeds through in a dozen ways during your listen. Minus …
Kevin Mitnick was one of the big names in 90's/00's hacking culture. This is his story.
It begins as a plodding biography of a young man who frequently gets into trouble for his pranks and curiosity. There are too many things he wants to know and he will circumvent procedural or technical barriers to find out. He begins to hack compulsively.
As the story continues Kevin gets into progressively more trouble as a result of his hacks. He also suffers betrayals at the hands of friends, hacking partners, rivals, and even a girlfriend. The story begins to take on the character of an espionage thriller as the net closes around him and he succeeds in increasingly more narrow escapes. He is eventually caught and the story enters its falling action from there.
Unfortunately Kevin is obviously a douchebag and it bleeds through in a dozen ways during your listen. Minus one star! But, if anyone has earned the right to be arrogant, maybe it's the guy who evaded the entire FBI so handily for years that they had to break the law to catch him.
Well worth the time if you've heard his name or wondered what all those "Free Kevin!" stickers were about so long ago. Possibly worth the time all on its own.
If they were a hall of fame or shame for computer hackers, a Kevin Mitnick …
Audiobook again, makes things hard to quote. Shout out to the Libby app for libraries. Lets me keep reading even when I have other things that need doing.
Picked this one off the DefCon reading list on a whim. At first it feels like you're reading a book by the kind of person who would eventually tell you that COVID-19 isn't real.
But as the book goes on the authors compassion and expertise begin to shine through and it becomes something special. I'm already nearly done with it.
Here's one straight from the Underground Culture section of the DEF CON reading list. This was (supposedly) the first book to document the hacker ethic with its original release in 1984.
Looking forward to this one. I hope it lives up to the hype.
“To my taste, the greatest American myth of cosmogenesis features the maladjusted, antisocial, genius teenage …
A Tale of Two Hackers as a Rock Biography
4 stars
The story of John Carmack and John Romero, archetypes of the hacker and the gamer. The book follows a similar arc to many rock biographies.
There is a steady rise to rock star status, a life of fame, the price of hubris, and its aftermath. Carmack comes across as a brilliant programmer, but obsessed with work and lacking in empathy. Romero is written as a man with an intimate understanding of what makes games fun, but a tendency to try and do everything at once all the time. The story is like a tragedy where you watch these flaws become their undoing.
Worth a read if you've never heard the story. It was all news to me. The whole thing feels a little too neat and I have to wonder what was left out, but that's an Internet search for another time.
This book feels really dense at first, but once you get into the flow it becomes pretty easy to understand. In chapter 1 (Programming), the author will explain a programming concept, show some C code illustrating the concept, then disassemble the code, and then show process in memory with gdb. He repeats that process for several concepts and you can follow along in a VM with a provided .ISO.
The initial explanation of some concepts (like CPU registers) feels incomplete, but as he layers things on he explains more about those concepts. I can see a full picture coming together as the chapter winds on.
I wish I had an explanation of pointers this succinct when I was in school.
The intro chapter suggests a book that will explain the mechanics of hacking at a low level. I already work as a penetration tester, but I'm hoping to learn the fundamentals of computing at a deeper level so I can discover more exploits on my own.
Twenty five years ago, it didn't exist. Today, twenty million people worldwide are surfing the …
"The idea on which Lick's worldview pivoted was that technological progress would save humanity. The political process was a favorite example of his. In a McLuhanesque view of the power of electronic media, Lick saw a future in which, thanks in large part to the reach of computers, most citizens would be "informed about, and interested in, and involved in, the process of government." He imagined what he called "home computer consoles" and television sets linked together in a massive network. "The political process," he wrote, "would essentially be a giant teleconference, and a cam- paign would be a months-long series of communications among candidates, propagandists, commentators, political action groups, and voters. The key is the self-motivating exhilaration that accom- panies truly effective interaction with information through a good console and a good network to a good computer.""