亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? the baudy world of the byte bandit-a postmodernist interpreta.txt

?? 黑客培訓教程
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
            intrusions on privacy (Marx, 1988a: 208-211;  Marx and Reichman,          1985).  This has contributed to a:               . . .  richly confused and hugely verbal age, energized               by a multitude of competing discourses,  the very pro-               liferation and plasticity of  which increasingly deter-               mine what we defensively refer  to as our reality (New-               man, 1985: 15).               By Postmodernism we mean a reaction against "cultural moder-          nity" and a destruction of the  constraints of the present "maxi-          mum security society" (Marx,  1988b)  that reflect an attempt to          gain control of an alternative future. In the CU world, this con-          stitutes a conscious resistance to the  domination of but not the          fact of technological encroachment into  all realms of our social          existence.  The CU represents a reaction against modernism by of-          fering an ironic response to the primacy of a master technocratic          language,  the incursion of computers into realms once considered          private, the politics of techno-society,  and the sanctity of es-          tablished civil and state authority.  Postmodernism is character-          ized not so much by a single  definition as by a number of inter-          related characteristics, including, but not limited to:             1.  Dissent for dissent's sake (Lyotard, 1988).             2.  The collapse of the  hierarchical distinction between mass                 and popular culture (Featherstone, 1988: 203).             3.  A stylistic promiscuity favoring  eclecticism and the mix-                 ing of codes (Featherstone, 1988: 203).             4.  Parody, pastiche, irony,  playfulness and the celebration                 of the surface "depthlessness"  of culture (Featherstone,                 1988: 203).                                         - 7 -               5.  The decline of the originality/genius of the artistic pro-                 ducer and the assumption that  art can only be repetitious                 (Featherstone 1988: 203).             6.  The stripping  away of social and  perceptual coordinates                 that let one "know where one is" (Latimer, 1984: 121).             7.  A search for new ways  to make the unpresentable presenta-                 ble, and break down the barriers that keep the profane out                 of everyday life (Denzin, 1988: 471).             8.  The introduction of new moves  into old games or inventing                 new games  that are evaluated pragmatically  rather than                 from some uniform stand point  of "truth" or philosophical                 discourse (Callinicos, 1985: 86).             9.  Emphasis on the  visual over the literary  (Lash,  1988:                 314).             10. Devaluation of formalism and  juxtaposition of signifiers                 taken from the banalities of  everyday life (Lash,  1988:                 314).             11. Contesting of rationalist and/or  didactive views of cul-                 ture (Lash, 1988: 314).             12. Asking not what a cultural text  means,  but what it does                 (Lash, 1988: 314).             13. Operation through the spectator's immersion, the relative-                 ly unmediated investment of his/her desire in the cultural                 object (Lash, 1988: 314).             14. Acknowledgement of the decenteredness  of modern life and                 "plays with the apparent emptiness  of modern life as well                                         - 8 -                   as the lack of coherence  in modern symbol systems" (Man-                 ning, 1989: 8).               "Post-Modernism" in its positive  form constitutes an intel-          lectual attack upon the atomized,   passive and indifferent mass          culture which,  through the saturation of electronic technology,          has reached its zenith in Post-War American (Newman,  1985:  5).          It is this style of playful rebellion, irreverent subversion, and          juxtaposition of fantasy with high-tech reality that impels us to          interpret the computer underground as a postmodernist culture.                                   Data and Method               Obtaining data from any  underground culture requires tact.          BBS operators protect  the privacy of users and  access to elite          boards, or at least to their relevant security levels,  virtually          always requires  completion of a preliminary  questionnaire,  a          screening process, and occasional voice verification.   Research-          ers generally do not themselves  violate laws or dominant norms,          so they depend on their  informants for potentially "dirty infor-          mation" (Thomas and Marquart, 1988).   Our own data are no excep-          tion and derive from several sources.               First,  the bulk  of our data come  from computer bulletin          board systems.   BBSs are personal computers (PCs) that have been          equipped with a  telephone modem and special  software that con-          nects users to other PCs by  telephone.   After "logging in" by          supplying a valid user name and  password,  the user can receive          and leave messages to other users of the system.   These messages          are rarely private and anyone calling the BBS can freely read and                                         - 9 -            respond to them.  There is usually the capacity to receive (down-          load) or send (upload) text files ("G-philes")  or software pro-          grams between the caller and host system.               We logged the message section of CU BBSs to compile documen-          tary evidence of  the issues deemed important  for discussion by          participants.   Logs are "captured" (recorded using the computer          buffer)  messages left on the board by users.   Calculating the          quantity of logged data is  difficult because of formatting vari-          ance,  but we estimate that our logs exceed 10,000 printed pages.          The logs  cited here are verbatim  with the exception  of minor          editing changes in format and extreme typographical errors.               Identifying underground BBSs can be  difficult,  and to the          uninitiated they may appear to be licit chat or shareware boards.          For callers with sufficient access,  however,  there exist back-          stage realms in  which "cracking" information is  exchanged and          private text or  software files made available.    With current          technology,  establishing a BBS  requires little initial skill.          Most boards  are short-lived and  serve only local  or regional          callers.   Because of the generally poor quality and amateur na-          ture of these systems, we focused on national elite boards.   We          considered a board "elite" if it met all of the following charac-          teristics: At least one quarter of the users were registered out-          side the state of the board  called;  the phone line were exclu-          sively for  BBS use and  available 24  hours a day;   and the          information and files/warez  were current "state of  the field."          Elite CU members argue that there are less than ten "truly elite"          p/hacker boards nationally.                                       - 10 -                 We obtained the  names and numbers of BBSs  from the first          boards we called, and used a snowball technique to supplement the          list.   We obtained additional numbers from CU periodicals, and,          as we became more familiar with the culture,  users also added to          the list.   Our aggregate data include no less than 300 Bulletin          board systems,  of which at least 50 attract phreaks and hackers,          and voice or on-line interviews with  no less than 45 sysops (op-          erators of BBS systems) and other active CU participants.               A second data source included  open-ended voice and on-line          interviews with hackers, phreaks and pirates.   The data include          no less than 25 face-to-face, 25 telephone, and 60 on-line inter-          views obtained as we became familiar with our informants.               Third,  data acquisition included  as much participation as          legally possible in CU activities[3].  This served to justify our          presence in the culture and  provided information about the mun-          dane activity of the CU.               Finally,  we obtained back and current issues of the primary          underground computerized magazines,  which are distributed on na-          tional BBSs as text files.  These contain information relevant to          the particular subculture,  and included PHRACK,  Activist Times          Incorporated (ATI), P/Hun, 2600 Magazine, PIRATE, TAP, and Legion          of Doom (LoD/H).   We also draw  data from national and interna-          tional electronic mail (e-mail) systems on which an active infor-          mation-sharing CU network has developed and spread.               Assessing the validity and reliability  of data obtained in          this manner creates special problems.   One is that of sampling.          The number of boards,  their often ephemeral existence,  and the                                       - 11 -            problem of obtaining access all make conventional sampling impos-          sible.   We focused on national boards and engaged in theoretical          sampling (Glaser and Strauss, 1967: 45-77).  We consider our sam-          ple representative, and accept Bordieu's observation that:               If, following the canon dictated by orthodox methodolo-               gy, you take a random sample, you mutilate the very ob-               ject you have set out to construct.  If, in a study of               the field of lawyers, for instance, you do not draw the               President of the Supreme Court,  or if,  in an inquiry               into the French intellectual field  of the 1950s,  you               leave out Jean-Paul Sartre,  or Princeton University in               a study of American academics, your field is destroyed,               insofar as these personas or  institutions alone mark a               crucial position--there are positions  in a field which               command the whole structure  (Bordieu,  interviewed in               Wacquant, 1989: 38).               We judge our  sample of participants adequate  for several          reasons.   First,  we presume that the members with whom we have          had contact comprise the elite members of the culture,  as deter-          mined by the nature of the  boards they were on,  references to          them on national  boards,  the level of  expertise displayed in          their messages, and their appearance in the "user lists" of elite          boards.   We consider the BBSs to be "typical exemplars" because          of their status in the culture, because of the level of sophisti-          cation both of users and of message content,  and because of ref-          erences to these boards as "elite" in CU periodicals.                              The Computer Underground               The computer underground is both a  life style and a social          network.   As a lifestyle, it provides identity and roles, an op-          erational ideology,  and guides daily routine.  As a social net-          work,  it functions as a  communications channel between persons          engaged in one of three basic activities:   Hacking,  phreaking,                                        - 12 -            and pirating[4].   Each subgroup possesses an explicit style that          includes an ethic and "code  of honor," cohesive norms,  career          paths,  and other characteristics that  typify a culture (Meyer,          1989a, 1989b; Meyer and Thomas, 1989).               Hebdige (1982:  113-117) used the concept of homology to de-          scribe the structural unity that  binds participants and provides          the "symbolic fit between the values  and life-styles of a group"          and how it expresses or reinforces its focal concerns.   Homology          refers to the affinity and similarities  members of a group share          that give it the particular cultural identity.   These shared al-          ternative values and actions connect CU members to each other and          their culture,  and create a celebration of "otherness" from the          broader culture.          Hackers                (Tune: "Put Another Nickel in")                Put another password in,                Bomb it out, and try again,                Try to get past logging in,                Were hacking, hacking, hacking.                Try his first wife's maiden name,                This is more than just a game,                It's real fun, but just the same                It's hacking, hacking, hacking.                Sys-call, let's try sys-call.                Remember, that great bug from Version 3,                Of R S X, It's here!  Whoopee!                Put another sys-call in,

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
在线视频一区二区免费| 91九色最新地址| 日韩精品三区四区| 一区二区久久久久久| 亚洲图片激情小说| 亚洲人成小说网站色在线| 亚洲国产精品高清| 国产精品福利影院| 亚洲靠逼com| 亚洲在线视频网站| 日本成人在线电影网| 亚洲v日本v欧美v久久精品| 五月天久久比比资源色| 日韩avvvv在线播放| 麻豆国产精品777777在线| 蜜桃传媒麻豆第一区在线观看| 日韩和欧美一区二区| 久久精品国产99久久6| 国产真实乱子伦精品视频| 国产成人夜色高潮福利影视| 成人激情小说网站| 欧美日韩亚洲高清一区二区| 欧美变态凌虐bdsm| 成人欧美一区二区三区白人| 夜夜嗨av一区二区三区四季av| 一区二区三区久久久| 男女男精品视频网| 国产精品一区二区三区99| 91在线无精精品入口| 欧美丰满一区二区免费视频| 欧美精品一区二区久久久| **欧美大码日韩| 日韩av中文字幕一区二区三区| 麻豆成人在线观看| 成人a免费在线看| 在线不卡免费欧美| 欧美国产97人人爽人人喊| 亚洲国产综合人成综合网站| 国产一区二区三区在线观看免费视频| 99久久婷婷国产综合精品电影 | 国产精品色哟哟网站| 亚洲电影你懂得| 国产成人高清视频| 制服丝袜一区二区三区| 亚洲视频免费看| 久久成人综合网| 欧美撒尿777hd撒尿| 国产精品视频一二| 国产综合久久久久影院| 欧美性大战久久久久久久蜜臀| 26uuu成人网一区二区三区| 亚洲一区二区三区免费视频| 成人午夜激情影院| 日韩欧美中文一区| 亚洲国产精品麻豆| 99国产精品久久久久久久久久久| 日韩欧美的一区二区| 亚洲综合视频在线观看| aaa亚洲精品| 欧美激情艳妇裸体舞| 久久99日本精品| 777午夜精品免费视频| 日韩理论片在线| 99国产精品99久久久久久| 国产日韩欧美制服另类| 国产一区二区不卡在线| 日韩欧美精品在线视频| 天天操天天干天天综合网| 91免费视频网址| 中文字幕一区二区在线观看| 国产91精品欧美| 国产女人水真多18毛片18精品视频| 青青草国产成人99久久| 欧美一级久久久| 美女视频第一区二区三区免费观看网站| 一本色道亚洲精品aⅴ| 亚洲欧洲美洲综合色网| 99久久精品99国产精品| 亚洲天天做日日做天天谢日日欢| 成人va在线观看| 综合网在线视频| 91久久线看在观草草青青 | 一区二区在线观看视频| 99久久精品费精品国产一区二区| 国产精品蜜臀av| av色综合久久天堂av综合| 中文字幕一区二区三区四区不卡 | 欧美午夜一区二区三区 | 日韩视频不卡中文| 久久精品国产一区二区三区免费看| 欧美一区二视频| 精东粉嫩av免费一区二区三区| 精品国产凹凸成av人导航| 国产真实乱子伦精品视频| 国产精品嫩草影院av蜜臀| 99精品久久久久久| 五月天久久比比资源色| 精品美女在线观看| heyzo一本久久综合| 亚洲综合免费观看高清完整版在线| 欧美日本视频在线| 国产综合色视频| 有码一区二区三区| 精品欧美一区二区三区精品久久| 国产一区在线视频| 亚洲另类春色国产| 欧美v日韩v国产v| 91美女片黄在线观看91美女| 日韩国产精品久久久久久亚洲| 久久久久久久久一| 欧美影视一区二区三区| 极品少妇xxxx精品少妇| 亚洲欧美日韩小说| 精品理论电影在线| 色综合久久88色综合天天免费| 毛片av中文字幕一区二区| 日韩理论片网站| 久久影视一区二区| 欧洲一区二区三区在线| 国产精品资源在线| 午夜欧美2019年伦理| 中文字幕中文乱码欧美一区二区| 在线观看91精品国产麻豆| 国产成人av自拍| 理论电影国产精品| 亚洲高清免费一级二级三级| 国产欧美视频一区二区三区| 欧美丰满少妇xxxbbb| 一本一道久久a久久精品综合蜜臀 一本一道综合狠狠老 | 亚洲二区视频在线| 中文字幕欧美区| 精品日韩欧美一区二区| 在线观看视频一区二区欧美日韩| 国产乱码一区二区三区| 香蕉久久一区二区不卡无毒影院 | 韩国三级电影一区二区| 亚洲福利视频导航| 国产精品久久久久久福利一牛影视 | 一区二区三区久久| 国产精品久久久久久久久免费相片| 88在线观看91蜜桃国自产| 在线视频一区二区三区| caoporen国产精品视频| 东方aⅴ免费观看久久av| 精品一区二区三区av| 奇米一区二区三区av| 天天影视网天天综合色在线播放| 亚洲欧洲精品天堂一级| 国产欧美精品一区二区色综合| 欧美不卡一二三| 欧美岛国在线观看| 日韩一二在线观看| 欧美成人三级在线| 欧美大片在线观看一区| 欧美xfplay| 久久这里只有精品视频网| 精品99一区二区| 精品裸体舞一区二区三区| 精品日韩一区二区三区| wwwwxxxxx欧美| 久久久久久亚洲综合影院红桃| 精品国产一二三| 久久婷婷久久一区二区三区| 久久视频一区二区| 亚洲国产精品精华液2区45| 国产欧美精品区一区二区三区| 欧美激情一区二区三区蜜桃视频 | 国产精品久久免费看| 成人欧美一区二区三区视频网页| 亚洲免费观看高清完整版在线观看 | 成人av网站在线| 色婷婷久久99综合精品jk白丝| 91久久精品日日躁夜夜躁欧美| 欧美日韩一级黄| 日韩精品一区二区三区视频| 久久久久久久免费视频了| 国产精品久久久久久亚洲伦| 亚洲综合视频网| 麻豆精品在线观看| 不卡一区中文字幕| 欧美日韩国产精品自在自线| 日韩视频在线一区二区| 久久精品欧美一区二区三区不卡| 国产精品久久久久久亚洲毛片| 亚洲一卡二卡三卡四卡五卡| 免费成人在线播放| 99热精品国产| 日韩一级成人av| 国产精品不卡一区二区三区| 日韩经典一区二区| 丁香天五香天堂综合| 欧美日韩国产首页| 国产欧美在线观看一区| 亚洲成人免费在线| 成人动漫av在线| 日韩美女天天操| 亚洲一区二区美女| 成人黄色在线视频| 日韩三区在线观看| 亚洲一区二区3|