亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? the baudy world of the byte bandit-a postmodernist interpreta.txt

?? 1000 HOWTOs for various needs [WINDOWS]
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
            intrusions on privacy (Marx, 1988a: 208-211;  Marx and Reichman,          1985).  This has contributed to a:               . . .  richly confused and hugely verbal age, energized               by a multitude of competing discourses,  the very pro-               liferation and plasticity of  which increasingly deter-               mine what we defensively refer  to as our reality (New-               man, 1985: 15).               By Postmodernism we mean a reaction against "cultural moder-          nity" and a destruction of the  constraints of the present "maxi-          mum security society" (Marx,  1988b)  that reflect an attempt to          gain control of an alternative future. In the CU world, this con-          stitutes a conscious resistance to the  domination of but not the          fact of technological encroachment into  all realms of our social          existence.  The CU represents a reaction against modernism by of-          fering an ironic response to the primacy of a master technocratic          language,  the incursion of computers into realms once considered          private, the politics of techno-society,  and the sanctity of es-          tablished civil and state authority.  Postmodernism is character-          ized not so much by a single  definition as by a number of inter-          related characteristics, including, but not limited to:             1.  Dissent for dissent's sake (Lyotard, 1988).             2.  The collapse of the  hierarchical distinction between mass                 and popular culture (Featherstone, 1988: 203).             3.  A stylistic promiscuity favoring  eclecticism and the mix-                 ing of codes (Featherstone, 1988: 203).             4.  Parody, pastiche, irony,  playfulness and the celebration                 of the surface "depthlessness"  of culture (Featherstone,                 1988: 203).                                         - 7 -               5.  The decline of the originality/genius of the artistic pro-                 ducer and the assumption that  art can only be repetitious                 (Featherstone 1988: 203).             6.  The stripping  away of social and  perceptual coordinates                 that let one "know where one is" (Latimer, 1984: 121).             7.  A search for new ways  to make the unpresentable presenta-                 ble, and break down the barriers that keep the profane out                 of everyday life (Denzin, 1988: 471).             8.  The introduction of new moves  into old games or inventing                 new games  that are evaluated pragmatically  rather than                 from some uniform stand point  of "truth" or philosophical                 discourse (Callinicos, 1985: 86).             9.  Emphasis on the  visual over the literary  (Lash,  1988:                 314).             10. Devaluation of formalism and  juxtaposition of signifiers                 taken from the banalities of  everyday life (Lash,  1988:                 314).             11. Contesting of rationalist and/or  didactive views of cul-                 ture (Lash, 1988: 314).             12. Asking not what a cultural text  means,  but what it does                 (Lash, 1988: 314).             13. Operation through the spectator's immersion, the relative-                 ly unmediated investment of his/her desire in the cultural                 object (Lash, 1988: 314).             14. Acknowledgement of the decenteredness  of modern life and                 "plays with the apparent emptiness  of modern life as well                                         - 8 -                   as the lack of coherence  in modern symbol systems" (Man-                 ning, 1989: 8).               "Post-Modernism" in its positive  form constitutes an intel-          lectual attack upon the atomized,   passive and indifferent mass          culture which,  through the saturation of electronic technology,          has reached its zenith in Post-War American (Newman,  1985:  5).          It is this style of playful rebellion, irreverent subversion, and          juxtaposition of fantasy with high-tech reality that impels us to          interpret the computer underground as a postmodernist culture.                                   Data and Method               Obtaining data from any  underground culture requires tact.          BBS operators protect  the privacy of users and  access to elite          boards, or at least to their relevant security levels,  virtually          always requires  completion of a preliminary  questionnaire,  a          screening process, and occasional voice verification.   Research-          ers generally do not themselves  violate laws or dominant norms,          so they depend on their  informants for potentially "dirty infor-          mation" (Thomas and Marquart, 1988).   Our own data are no excep-          tion and derive from several sources.               First,  the bulk  of our data come  from computer bulletin          board systems.   BBSs are personal computers (PCs) that have been          equipped with a  telephone modem and special  software that con-          nects users to other PCs by  telephone.   After "logging in" by          supplying a valid user name and  password,  the user can receive          and leave messages to other users of the system.   These messages          are rarely private and anyone calling the BBS can freely read and                                         - 9 -            respond to them.  There is usually the capacity to receive (down-          load) or send (upload) text files ("G-philes")  or software pro-          grams between the caller and host system.               We logged the message section of CU BBSs to compile documen-          tary evidence of  the issues deemed important  for discussion by          participants.   Logs are "captured" (recorded using the computer          buffer)  messages left on the board by users.   Calculating the          quantity of logged data is  difficult because of formatting vari-          ance,  but we estimate that our logs exceed 10,000 printed pages.          The logs  cited here are verbatim  with the exception  of minor          editing changes in format and extreme typographical errors.               Identifying underground BBSs can be  difficult,  and to the          uninitiated they may appear to be licit chat or shareware boards.          For callers with sufficient access,  however,  there exist back-          stage realms in  which "cracking" information is  exchanged and          private text or  software files made available.    With current          technology,  establishing a BBS  requires little initial skill.          Most boards  are short-lived and  serve only local  or regional          callers.   Because of the generally poor quality and amateur na-          ture of these systems, we focused on national elite boards.   We          considered a board "elite" if it met all of the following charac-          teristics: At least one quarter of the users were registered out-          side the state of the board  called;  the phone line were exclu-          sively for  BBS use and  available 24  hours a day;   and the          information and files/warez  were current "state of  the field."          Elite CU members argue that there are less than ten "truly elite"          p/hacker boards nationally.                                       - 10 -                 We obtained the  names and numbers of BBSs  from the first          boards we called, and used a snowball technique to supplement the          list.   We obtained additional numbers from CU periodicals, and,          as we became more familiar with the culture,  users also added to          the list.   Our aggregate data include no less than 300 Bulletin          board systems,  of which at least 50 attract phreaks and hackers,          and voice or on-line interviews with  no less than 45 sysops (op-          erators of BBS systems) and other active CU participants.               A second data source included  open-ended voice and on-line          interviews with hackers, phreaks and pirates.   The data include          no less than 25 face-to-face, 25 telephone, and 60 on-line inter-          views obtained as we became familiar with our informants.               Third,  data acquisition included  as much participation as          legally possible in CU activities[3].  This served to justify our          presence in the culture and  provided information about the mun-          dane activity of the CU.               Finally,  we obtained back and current issues of the primary          underground computerized magazines,  which are distributed on na-          tional BBSs as text files.  These contain information relevant to          the particular subculture,  and included PHRACK,  Activist Times          Incorporated (ATI), P/Hun, 2600 Magazine, PIRATE, TAP, and Legion          of Doom (LoD/H).   We also draw  data from national and interna-          tional electronic mail (e-mail) systems on which an active infor-          mation-sharing CU network has developed and spread.               Assessing the validity and reliability  of data obtained in          this manner creates special problems.   One is that of sampling.          The number of boards,  their often ephemeral existence,  and the                                       - 11 -            problem of obtaining access all make conventional sampling impos-          sible.   We focused on national boards and engaged in theoretical          sampling (Glaser and Strauss, 1967: 45-77).  We consider our sam-          ple representative, and accept Bordieu's observation that:               If, following the canon dictated by orthodox methodolo-               gy, you take a random sample, you mutilate the very ob-               ject you have set out to construct.  If, in a study of               the field of lawyers, for instance, you do not draw the               President of the Supreme Court,  or if,  in an inquiry               into the French intellectual field  of the 1950s,  you               leave out Jean-Paul Sartre,  or Princeton University in               a study of American academics, your field is destroyed,               insofar as these personas or  institutions alone mark a               crucial position--there are positions  in a field which               command the whole structure  (Bordieu,  interviewed in               Wacquant, 1989: 38).               We judge our  sample of participants adequate  for several          reasons.   First,  we presume that the members with whom we have          had contact comprise the elite members of the culture,  as deter-          mined by the nature of the  boards they were on,  references to          them on national  boards,  the level of  expertise displayed in          their messages, and their appearance in the "user lists" of elite          boards.   We consider the BBSs to be "typical exemplars" because          of their status in the culture, because of the level of sophisti-          cation both of users and of message content,  and because of ref-          erences to these boards as "elite" in CU periodicals.                              The Computer Underground               The computer underground is both a  life style and a social          network.   As a lifestyle, it provides identity and roles, an op-          erational ideology,  and guides daily routine.  As a social net-          work,  it functions as a  communications channel between persons          engaged in one of three basic activities:   Hacking,  phreaking,                                        - 12 -            and pirating[4].   Each subgroup possesses an explicit style that          includes an ethic and "code  of honor," cohesive norms,  career          paths,  and other characteristics that  typify a culture (Meyer,          1989a, 1989b; Meyer and Thomas, 1989).               Hebdige (1982:  113-117) used the concept of homology to de-          scribe the structural unity that  binds participants and provides          the "symbolic fit between the values  and life-styles of a group"          and how it expresses or reinforces its focal concerns.   Homology          refers to the affinity and similarities  members of a group share          that give it the particular cultural identity.   These shared al-          ternative values and actions connect CU members to each other and          their culture,  and create a celebration of "otherness" from the          broader culture.          Hackers                (Tune: "Put Another Nickel in")                Put another password in,                Bomb it out, and try again,                Try to get past logging in,                Were hacking, hacking, hacking.                Try his first wife's maiden name,                This is more than just a game,                It's real fun, but just the same                It's hacking, hacking, hacking.                Sys-call, let's try sys-call.                Remember, that great bug from Version 3,                Of R S X, It's here!  Whoopee!                Put another sys-call in,

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
99久久精品国产精品久久| av中文字幕在线不卡| 久久黄色级2电影| 亚洲成av人片| 激情综合网最新| 99在线精品视频| 欧美日本一区二区| 久久婷婷国产综合精品青草| 国产精品电影一区二区| 亚洲福利电影网| 亚洲成人手机在线| 国产一区二区三区电影在线观看| 91网址在线看| 日韩欧美国产一二三区| 亚洲男同性恋视频| 国产一区二区在线电影| 欧美亚洲动漫精品| 欧美激情综合五月色丁香小说| 一区二区三区免费看视频| 日本在线不卡一区| 91啪亚洲精品| 久久精品亚洲一区二区三区浴池| 亚洲乱码国产乱码精品精小说 | 国产精品香蕉一区二区三区| 色综合天天综合网国产成人综合天 | 欧美丰满一区二区免费视频| 亚洲精品中文字幕乱码三区| 97久久超碰精品国产| 欧美国产1区2区| 丁香五精品蜜臀久久久久99网站 | 亚洲精品水蜜桃| 91片在线免费观看| 一区二区三区精品久久久| 91亚洲永久精品| 亚洲日本va在线观看| 91蜜桃在线免费视频| 亚洲欧美综合网| 色综合天天综合色综合av| 亚洲嫩草精品久久| 欧美性大战久久久久久久蜜臀| 亚洲综合一二区| 欧美日韩国产天堂| 日本aⅴ精品一区二区三区| 欧美不卡一区二区三区四区| 国产一区视频网站| 中文字幕在线不卡一区| 91久久国产综合久久| 亚洲一区视频在线| 日韩欧美一级在线播放| 国产成人精品亚洲777人妖| 日本一区二区三区电影| 91国产精品成人| 日韩高清电影一区| 久久综合一区二区| 91网页版在线| 美女视频黄免费的久久| 久久久久久久久久久电影| av一二三不卡影片| 丝袜诱惑制服诱惑色一区在线观看 | 捆绑调教美女网站视频一区| 国产视频一区二区在线| 欧美在线观看视频在线| 日韩激情一二三区| 亚洲国产精品传媒在线观看| 在线观看亚洲一区| 另类小说一区二区三区| 综合av第一页| 精品国产露脸精彩对白| 91在线精品一区二区三区| 日韩国产欧美在线观看| 国产精品久久久久久久久久久免费看 | 在线日韩国产精品| 国产一区福利在线| 亚洲精品美腿丝袜| 久久综合五月天婷婷伊人| 91麻豆福利精品推荐| 看片网站欧美日韩| 有码一区二区三区| 国产亚洲精品超碰| 91精品在线观看入口| 成人av集中营| 久久精品国产免费| 亚洲视频一二区| 精品理论电影在线观看| 欧美色视频在线观看| 国产黄色精品视频| 蜜乳av一区二区三区| 亚洲女厕所小便bbb| 亚洲国产精品二十页| 日韩免费观看高清完整版| 欧美午夜视频网站| 91在线丨porny丨国产| 国产福利精品一区| 精品中文字幕一区二区小辣椒| 亚洲最大成人综合| 综合色中文字幕| 国产色91在线| 精品理论电影在线| 日韩一区二区中文字幕| 欧美午夜精品久久久| 偷拍一区二区三区四区| 日韩毛片视频在线看| 欧美国产日韩一二三区| 国产欧美日产一区| 久久精品一区二区三区不卡牛牛| 欧美成人福利视频| 精品国产91乱码一区二区三区 | 婷婷久久综合九色综合伊人色| 精品国产成人在线影院| 这里只有精品电影| 欧美视频日韩视频| 欧美性色黄大片手机版| 在线观看中文字幕不卡| 99久久精品国产麻豆演员表| 成人app在线| 成人免费看片app下载| 国产成人精品亚洲日本在线桃色| 国产麻豆精品久久一二三| 老司机一区二区| 精品一区二区久久| 激情都市一区二区| 国产一区二区电影| 国产成人在线视频网站| 成人美女视频在线看| va亚洲va日韩不卡在线观看| 成人黄色片在线观看| 色综合天天综合色综合av | 欧美一区二区二区| 精品久久一区二区三区| 久久综合色鬼综合色| 国产亚洲婷婷免费| 亚洲欧美日韩一区二区三区在线观看 | 亚洲国产精品人人做人人爽| 日韩激情视频网站| 久久国产精品99精品国产| 韩国三级电影一区二区| 国产91在线看| 在线免费观看一区| 欧美精品自拍偷拍动漫精品| 精品欧美一区二区三区精品久久| 国产日韩视频一区二区三区| 亚洲免费观看高清完整| 免费国产亚洲视频| 成人免费视频国产在线观看| 欧美在线短视频| 日韩免费看的电影| 亚洲人妖av一区二区| 午夜久久久久久久久| 国产999精品久久| 在线观看视频一区| 久久伊人中文字幕| 亚洲乱码日产精品bd| 国产专区欧美精品| 欧美性极品少妇| 欧美经典三级视频一区二区三区| 亚洲一区二区三区在线看| 国产乱对白刺激视频不卡| 色诱亚洲精品久久久久久| 欧美大片拔萝卜| 亚洲精选视频免费看| 久久aⅴ国产欧美74aaa| 91婷婷韩国欧美一区二区| 欧美一级高清大全免费观看| 欧美精彩视频一区二区三区| 五月婷婷色综合| 成人免费看视频| 欧美一区二视频| 亚洲国产日韩精品| 亚欧色一区w666天堂| 成人免费电影视频| 欧美一级精品在线| 亚洲摸摸操操av| 国产乱人伦精品一区二区在线观看 | 国产999精品久久久久久| 91精品国产全国免费观看| 亚洲色图视频网站| 国产精品中文字幕欧美| 91.com在线观看| 亚洲精品国产成人久久av盗摄 | 欧美亚洲动漫另类| 中文字幕永久在线不卡| 国内精品久久久久影院薰衣草 | 99国产麻豆精品| 久久久不卡影院| 精品一区二区三区不卡| 欧美日韩色一区| 一区二区不卡在线播放| 不卡的看片网站| 国产色产综合色产在线视频| 国模娜娜一区二区三区| 日韩精品一区二区三区蜜臀| 亚洲va中文字幕| 日本韩国欧美三级| 国产精品久久久久久久久免费丝袜| 国产一区视频导航| 久久久久久久网| 国产精品一级片在线观看| 精品国产免费视频| 久久99久久久欧美国产| 欧美精品一区视频|