亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? the baudy world of the byte bandit-a postmodernist interpreta.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
            intrusions on privacy (Marx, 1988a: 208-211;  Marx and Reichman,          1985).  This has contributed to a:               . . .  richly confused and hugely verbal age, energized               by a multitude of competing discourses,  the very pro-               liferation and plasticity of  which increasingly deter-               mine what we defensively refer  to as our reality (New-               man, 1985: 15).               By Postmodernism we mean a reaction against "cultural moder-          nity" and a destruction of the  constraints of the present "maxi-          mum security society" (Marx,  1988b)  that reflect an attempt to          gain control of an alternative future. In the CU world, this con-          stitutes a conscious resistance to the  domination of but not the          fact of technological encroachment into  all realms of our social          existence.  The CU represents a reaction against modernism by of-          fering an ironic response to the primacy of a master technocratic          language,  the incursion of computers into realms once considered          private, the politics of techno-society,  and the sanctity of es-          tablished civil and state authority.  Postmodernism is character-          ized not so much by a single  definition as by a number of inter-          related characteristics, including, but not limited to:             1.  Dissent for dissent's sake (Lyotard, 1988).             2.  The collapse of the  hierarchical distinction between mass                 and popular culture (Featherstone, 1988: 203).             3.  A stylistic promiscuity favoring  eclecticism and the mix-                 ing of codes (Featherstone, 1988: 203).             4.  Parody, pastiche, irony,  playfulness and the celebration                 of the surface "depthlessness"  of culture (Featherstone,                 1988: 203).                                         - 7 -               5.  The decline of the originality/genius of the artistic pro-                 ducer and the assumption that  art can only be repetitious                 (Featherstone 1988: 203).             6.  The stripping  away of social and  perceptual coordinates                 that let one "know where one is" (Latimer, 1984: 121).             7.  A search for new ways  to make the unpresentable presenta-                 ble, and break down the barriers that keep the profane out                 of everyday life (Denzin, 1988: 471).             8.  The introduction of new moves  into old games or inventing                 new games  that are evaluated pragmatically  rather than                 from some uniform stand point  of "truth" or philosophical                 discourse (Callinicos, 1985: 86).             9.  Emphasis on the  visual over the literary  (Lash,  1988:                 314).             10. Devaluation of formalism and  juxtaposition of signifiers                 taken from the banalities of  everyday life (Lash,  1988:                 314).             11. Contesting of rationalist and/or  didactive views of cul-                 ture (Lash, 1988: 314).             12. Asking not what a cultural text  means,  but what it does                 (Lash, 1988: 314).             13. Operation through the spectator's immersion, the relative-                 ly unmediated investment of his/her desire in the cultural                 object (Lash, 1988: 314).             14. Acknowledgement of the decenteredness  of modern life and                 "plays with the apparent emptiness  of modern life as well                                         - 8 -                   as the lack of coherence  in modern symbol systems" (Man-                 ning, 1989: 8).               "Post-Modernism" in its positive  form constitutes an intel-          lectual attack upon the atomized,   passive and indifferent mass          culture which,  through the saturation of electronic technology,          has reached its zenith in Post-War American (Newman,  1985:  5).          It is this style of playful rebellion, irreverent subversion, and          juxtaposition of fantasy with high-tech reality that impels us to          interpret the computer underground as a postmodernist culture.                                   Data and Method               Obtaining data from any  underground culture requires tact.          BBS operators protect  the privacy of users and  access to elite          boards, or at least to their relevant security levels,  virtually          always requires  completion of a preliminary  questionnaire,  a          screening process, and occasional voice verification.   Research-          ers generally do not themselves  violate laws or dominant norms,          so they depend on their  informants for potentially "dirty infor-          mation" (Thomas and Marquart, 1988).   Our own data are no excep-          tion and derive from several sources.               First,  the bulk  of our data come  from computer bulletin          board systems.   BBSs are personal computers (PCs) that have been          equipped with a  telephone modem and special  software that con-          nects users to other PCs by  telephone.   After "logging in" by          supplying a valid user name and  password,  the user can receive          and leave messages to other users of the system.   These messages          are rarely private and anyone calling the BBS can freely read and                                         - 9 -            respond to them.  There is usually the capacity to receive (down-          load) or send (upload) text files ("G-philes")  or software pro-          grams between the caller and host system.               We logged the message section of CU BBSs to compile documen-          tary evidence of  the issues deemed important  for discussion by          participants.   Logs are "captured" (recorded using the computer          buffer)  messages left on the board by users.   Calculating the          quantity of logged data is  difficult because of formatting vari-          ance,  but we estimate that our logs exceed 10,000 printed pages.          The logs  cited here are verbatim  with the exception  of minor          editing changes in format and extreme typographical errors.               Identifying underground BBSs can be  difficult,  and to the          uninitiated they may appear to be licit chat or shareware boards.          For callers with sufficient access,  however,  there exist back-          stage realms in  which "cracking" information is  exchanged and          private text or  software files made available.    With current          technology,  establishing a BBS  requires little initial skill.          Most boards  are short-lived and  serve only local  or regional          callers.   Because of the generally poor quality and amateur na-          ture of these systems, we focused on national elite boards.   We          considered a board "elite" if it met all of the following charac-          teristics: At least one quarter of the users were registered out-          side the state of the board  called;  the phone line were exclu-          sively for  BBS use and  available 24  hours a day;   and the          information and files/warez  were current "state of  the field."          Elite CU members argue that there are less than ten "truly elite"          p/hacker boards nationally.                                       - 10 -                 We obtained the  names and numbers of BBSs  from the first          boards we called, and used a snowball technique to supplement the          list.   We obtained additional numbers from CU periodicals, and,          as we became more familiar with the culture,  users also added to          the list.   Our aggregate data include no less than 300 Bulletin          board systems,  of which at least 50 attract phreaks and hackers,          and voice or on-line interviews with  no less than 45 sysops (op-          erators of BBS systems) and other active CU participants.               A second data source included  open-ended voice and on-line          interviews with hackers, phreaks and pirates.   The data include          no less than 25 face-to-face, 25 telephone, and 60 on-line inter-          views obtained as we became familiar with our informants.               Third,  data acquisition included  as much participation as          legally possible in CU activities[3].  This served to justify our          presence in the culture and  provided information about the mun-          dane activity of the CU.               Finally,  we obtained back and current issues of the primary          underground computerized magazines,  which are distributed on na-          tional BBSs as text files.  These contain information relevant to          the particular subculture,  and included PHRACK,  Activist Times          Incorporated (ATI), P/Hun, 2600 Magazine, PIRATE, TAP, and Legion          of Doom (LoD/H).   We also draw  data from national and interna-          tional electronic mail (e-mail) systems on which an active infor-          mation-sharing CU network has developed and spread.               Assessing the validity and reliability  of data obtained in          this manner creates special problems.   One is that of sampling.          The number of boards,  their often ephemeral existence,  and the                                       - 11 -            problem of obtaining access all make conventional sampling impos-          sible.   We focused on national boards and engaged in theoretical          sampling (Glaser and Strauss, 1967: 45-77).  We consider our sam-          ple representative, and accept Bordieu's observation that:               If, following the canon dictated by orthodox methodolo-               gy, you take a random sample, you mutilate the very ob-               ject you have set out to construct.  If, in a study of               the field of lawyers, for instance, you do not draw the               President of the Supreme Court,  or if,  in an inquiry               into the French intellectual field  of the 1950s,  you               leave out Jean-Paul Sartre,  or Princeton University in               a study of American academics, your field is destroyed,               insofar as these personas or  institutions alone mark a               crucial position--there are positions  in a field which               command the whole structure  (Bordieu,  interviewed in               Wacquant, 1989: 38).               We judge our  sample of participants adequate  for several          reasons.   First,  we presume that the members with whom we have          had contact comprise the elite members of the culture,  as deter-          mined by the nature of the  boards they were on,  references to          them on national  boards,  the level of  expertise displayed in          their messages, and their appearance in the "user lists" of elite          boards.   We consider the BBSs to be "typical exemplars" because          of their status in the culture, because of the level of sophisti-          cation both of users and of message content,  and because of ref-          erences to these boards as "elite" in CU periodicals.                              The Computer Underground               The computer underground is both a  life style and a social          network.   As a lifestyle, it provides identity and roles, an op-          erational ideology,  and guides daily routine.  As a social net-          work,  it functions as a  communications channel between persons          engaged in one of three basic activities:   Hacking,  phreaking,                                        - 12 -            and pirating[4].   Each subgroup possesses an explicit style that          includes an ethic and "code  of honor," cohesive norms,  career          paths,  and other characteristics that  typify a culture (Meyer,          1989a, 1989b; Meyer and Thomas, 1989).               Hebdige (1982:  113-117) used the concept of homology to de-          scribe the structural unity that  binds participants and provides          the "symbolic fit between the values  and life-styles of a group"          and how it expresses or reinforces its focal concerns.   Homology          refers to the affinity and similarities  members of a group share          that give it the particular cultural identity.   These shared al-          ternative values and actions connect CU members to each other and          their culture,  and create a celebration of "otherness" from the          broader culture.          Hackers                (Tune: "Put Another Nickel in")                Put another password in,                Bomb it out, and try again,                Try to get past logging in,                Were hacking, hacking, hacking.                Try his first wife's maiden name,                This is more than just a game,                It's real fun, but just the same                It's hacking, hacking, hacking.                Sys-call, let's try sys-call.                Remember, that great bug from Version 3,                Of R S X, It's here!  Whoopee!                Put another sys-call in,

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91久久国产最好的精华液| 欧美电视剧在线看免费| 亚洲欧洲综合另类| kk眼镜猥琐国模调教系列一区二区| 手机精品视频在线观看| 欧美亚洲综合久久| 亚洲第一福利视频在线| 欧美日韩综合一区| 亚洲高清不卡在线观看| 欧美日韩综合一区| 石原莉奈在线亚洲二区| 欧美一区二区三区免费| 美国十次综合导航| 欧美变态口味重另类| 精品系列免费在线观看| 久久精品欧美日韩精品| 成人免费看的视频| 中文字幕日韩av资源站| 91色porny在线视频| 亚洲精选视频免费看| 欧美视频一二三区| 日韩一区精品字幕| 精品国产1区二区| 国产成人一区在线| 中文字幕亚洲成人| 欧美午夜精品一区| 免费人成黄页网站在线一区二区| 欧美成人一级视频| 成人一区二区三区视频在线观看 | 在线观看91精品国产入口| 亚洲一区在线观看视频| 欧美一区二区三区喷汁尤物| 激情综合网天天干| 国产精品国产三级国产普通话99 | 欧美视频你懂的| 日韩av不卡在线观看| 久久久久久久综合狠狠综合| 成人精品国产一区二区4080| 亚洲狠狠丁香婷婷综合久久久| 欧美日韩二区三区| 久久99精品国产91久久来源| 亚洲国产成人在线| 91国产成人在线| 蜜桃久久精品一区二区| 国产精品网站在线播放| 欧美性大战久久| 国产在线不卡一区| 亚洲视频每日更新| 日韩一区二区三区在线| 国产69精品久久99不卡| 亚洲一区二区三区三| 欧美成人一区二区三区片免费 | 国产91精品在线观看| 亚洲一区在线看| 久久蜜桃av一区精品变态类天堂 | 最近日韩中文字幕| 亚洲国产日韩一区二区| 欧美一二区视频| 成人99免费视频| 日产欧产美韩系列久久99| 日本一区二区高清| 欧美高清你懂得| 成人午夜在线播放| 日本不卡一区二区三区| 中文字幕欧美一| 日韩视频免费直播| 色婷婷激情久久| 韩国女主播一区二区三区| 一区二区三区日韩欧美| 久久久亚洲精品石原莉奈| 欧美亚洲综合另类| 成人午夜视频在线观看| 蜜桃在线一区二区三区| 亚洲免费在线观看视频| 久久综合久色欧美综合狠狠| 欧美三级电影网| 波多野结衣精品在线| 奇米精品一区二区三区在线观看一 | 日本高清不卡在线观看| 国产在线国偷精品产拍免费yy| 欧洲一区在线电影| 欧美三片在线视频观看 | 日本人妖一区二区| 亚洲三级在线播放| 精品久久久久久综合日本欧美 | 欧美午夜电影网| 成人白浆超碰人人人人| 麻豆精品在线播放| 亚洲午夜久久久久久久久电影院 | 国产精品久久福利| 欧美va亚洲va在线观看蝴蝶网| 在线观看亚洲一区| 国产福利精品一区| 久久国产免费看| 午夜一区二区三区视频| 亚洲精品中文在线| 国产精品欧美经典| www国产亚洲精品久久麻豆| 91精品欧美一区二区三区综合在 | 一本色道亚洲精品aⅴ| 国产91丝袜在线播放0| 黄色资源网久久资源365| 日产精品久久久久久久性色| 亚洲一区二区高清| 亚洲精品视频观看| 中文字幕一区二区三区不卡| 亚洲国产岛国毛片在线| 国产亚洲成年网址在线观看| 日韩欧美的一区| 日韩一区二区三区视频在线观看| www.欧美日韩国产在线| 56国语精品自产拍在线观看| 91国偷自产一区二区开放时间| 成人app在线观看| 成人国产视频在线观看| 国产经典欧美精品| 国产一区二区三区在线观看免费视频| 免费在线观看视频一区| 日本不卡视频一二三区| 日韩精品视频网站| 日韩精品电影在线| 日韩国产欧美视频| 天堂一区二区在线| 日本午夜一本久久久综合| 日韩激情视频在线观看| 日韩国产在线观看一区| 免费成人小视频| 美女网站色91| 久久99国产精品久久99果冻传媒| 免费成人av在线播放| 香蕉影视欧美成人| 首页欧美精品中文字幕| 美日韩黄色大片| 久久精品国产99| 国产精品资源网站| 国产mv日韩mv欧美| bt7086福利一区国产| 99re亚洲国产精品| 在线视频亚洲一区| 欧美精品乱码久久久久久| 欧美一区二区三区成人| 日韩欧美久久一区| 久久久亚洲高清| 亚洲制服欧美中文字幕中文字幕| 另类人妖一区二区av| 美女诱惑一区二区| 国模无码大尺度一区二区三区| 狠狠色狠狠色综合| 成人性生交大合| 91麻豆国产在线观看| 欧美午夜片在线看| 欧美一区二区三区不卡| 久久天天做天天爱综合色| 亚洲国产高清在线| 亚洲美女屁股眼交3| 亚洲成av人在线观看| 久久国内精品自在自线400部| 韩国v欧美v日本v亚洲v| 成人午夜电影久久影院| 91丨porny丨蝌蚪视频| 欧美日韩在线三级| 日韩欧美一区二区免费| 国产欧美一二三区| 亚洲精品日韩一| 男人的天堂亚洲一区| 国产成人综合在线观看| 色就色 综合激情| 日韩一区二区三区精品视频| 久久精品亚洲精品国产欧美 | 婷婷久久综合九色国产成人| 免费观看91视频大全| 成人亚洲精品久久久久软件| 欧洲色大大久久| 精品欧美黑人一区二区三区| 亚洲欧洲性图库| 天涯成人国产亚洲精品一区av| 国内精品国产成人| 色呦呦网站一区| 337p日本欧洲亚洲大胆精品| 日韩视频免费观看高清在线视频| 国产欧美一区二区精品性色| 夜夜夜精品看看| 久久av资源网| 91丨porny丨户外露出| 欧美一二区视频| 亚洲色欲色欲www| 蜜桃久久久久久久| 91蝌蚪porny| 日韩精品一区二区三区swag| 日韩美女视频一区| 久久国产精品99久久人人澡| 91麻豆免费观看| 精品精品国产高清a毛片牛牛| 亚洲激情图片小说视频| 国产一区二区免费在线| 欧美制服丝袜第一页| 亚洲国产精品成人久久综合一区 | 视频一区中文字幕国产| 成人高清视频在线观看| 日韩手机在线导航|