The Hacker's Handbook

Last updated

The Hacker's Handbook is a non-fiction book in four editions, each reprinted numerous times between 1985 and 1990, and explaining how phone and computer systems of the period could be 'hacked'. It contains candid and personal comments from the book's British author, Hugo Cornwall, [1] a pseudonym of Peter Sommer who is now Professor of Digital Forensics at Birmingham City University, and frequently appears in the United Kingdom courts as an expert on digital evidence and computer forensics for both prosecution and defence as well as being a media pundit and author on information security topics. He advised the UK Parliament on the Investigatory Powers Act, 2016.

Contents

One popular aspect of the book is the apparently salacious printouts of actual hacking attempts (although confidential details, such as passwords, are blacked out).[ citation needed ]

The first edition, the version most easily available for download, was published in 1985. The last of four editions ISBN   0-7126-3454-1, edited by Steve Gold appeared in 1989 with reprints running into 1990. [2] In 1990, the UK Parliament passed the Computer Misuse Act. Publication of additional editions might have been construed to be incitement to commit an offence under that Act.

The book is now largely of historic interest. Cornwall / Sommer wrote two other books: DataTheft in 1987 and Industrial Espionage Handbook in 1992.

See also

Related Research Articles

<i>Hackers: Heroes of the Computer Revolution</i> 1984 non-fiction book by Steven Levy

Hackers: Heroes of the Computer Revolution (ISBN 0-385-19195-2) is a book by Steven Levy about hacker culture. It was published in 1984 in Garden City, New York by Doubleday. Levy describes the people, the machines, and the events that defined the Hacker Culture and the Hacker Ethic, from the early mainframe hackers at MIT, to the self-made hardware hackers and game hackers.

<span class="mw-page-title-main">David Langford</span> British writer, editor and critic

David Rowland Langford is a British author, editor, and critic, largely active within the science fiction field. He publishes the science fiction fanzine and newsletter Ansible, and holds the all-time record for most Hugo Awards, with a total of 29 wins.

<i>GURPS Cyberpunk</i>

GURPS Cyberpunk is a genre toolkit for cyberpunk-themed role-playing games set in a near-future dystopia, such as that envisioned by William Gibson in his influential novel Neuromancer. It was published in 1990 after a significant delay caused by the original draft being a primary piece of evidence in Steve Jackson Games, Inc. v. United States Secret Service.

<span class="mw-page-title-main">Computer forensics</span> Branch of digital forensic science

Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.

Clifford Paul "Cliff" Stoll is an American astronomer, author and teacher.

<i>Gold</i> (Asimov book)

Gold: The Final Science Fiction Collection is a 1995 collection of stories and essays by American writer Isaac Asimov. The stories, which comprise the volume's first half, are short pieces which had remained uncollected at the time of the author's death. "Cal" describes a robot that wishes to write, and the title story "Gold" expresses both Asimov's admiration of King Lear and his thoughts on cinema adaptations of his own stories. The story "Gold" won a Hugo Award.

Michael Joseph Kurland is an American author, best known for his works of science fiction and detective fiction. Kurland lives in San Luis Obispo, California.

<span class="mw-page-title-main">Computer Misuse Act 1990</span> United Kingdom legislation

The Computer Misuse Act 1990 is an Act of the Parliament of the United Kingdom, introduced partly in response to the decision in R v Gold & Schifreen (1988) 1 AC 1063. Critics of the bill complained that it was introduced hastily, was poorly thought out, and that intention was often difficult to prove, with the bill inadequately differentiating "joyriding" hackers like Gold and Schifreen from serious computer criminals. The Act has nonetheless become a model from which several other countries, including Canada and the Republic of Ireland, have drawn inspiration when subsequently drafting their own information security laws, as it is seen "as a robust and flexible piece of legislation in terms of dealing with cybercrime”. Several amendments have been passed to keep the Act up to date.

Robert Jonathan Schifreen is a former UK-based computer hacker and magazine editor, and the founder of IT security awareness training programme SecuritySmart.co.uk. He was the first person charged with illegally accessing a computer system, but was acquitted because there was no such specific criminal offence at the time. Later in life he became a computer security consultant, speaking at many conferences on information security and training banks, large companies and universities in the UK on IT security. In 2014 he began developing the software on which SecuritySmart runs from scratch which reached completion and product launch in June 2016.

Stephen Gold was a skilled hacker and journalist who in the mid-1980s was charged with, convicted and later acquitted of, 'uttering a forgery' in what became known to the popular press of the time as "The Great Prestel Hack". Gold, and fellow hacker Robert Schifreen, were said to have accessed, inter alia, the personal message account of Prince Philip. The facts as outlined in The Hacker's Handbook are that he was 'fitted' up, having tried, repeatedly and unsuccessfully, to warn BT's Prestel via Micronet of the security holes. Gold later became a "respected information security journalist".

<span class="mw-page-title-main">Richard A. Lupoff</span> American author (1935–2020)

Richard Allen Lupoff was an American science-fiction and mystery author, who also wrote humor, satire, nonfiction and reviews. In addition to his two dozen novels and more than 40 short stories, he also edited science-fantasy anthologies. He was an expert on the writing of Edgar Rice Burroughs, and had an equally strong interest in H. P. Lovecraft. He also co-edited the non-fiction anthology All in Color For a Dime, which has been described as "the very first published volume dedicated to comic book criticism"; as well as its sequel, The Comic-Book Book.

A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.

<span class="mw-page-title-main">Digital forensics</span> Branch of forensic science

Digital forensics is a branch of forensic science encompassing the recovery, investigation, examination, and analysis of material found in digital devices, often in relation to mobile devices and computer crime. The term "digital forensics" was originally used as a synonym for computer forensics but has expanded to cover investigation of all devices capable of storing digital data. With roots in the personal computing revolution of the late 1970s and early 1980s, the discipline evolved in a haphazard manner during the 1990s, and it was not until the early 21st century that national policies emerged.

Electron was the computer handle of Richard Jones, a member of an underground hacker community called The Realm. Jones, born in June 1969, was one of three members of the group arrested in simultaneous raids by the Australian Federal Police in Melbourne, Australia, on 2 April 1990. All three — Nahshon Even-Chaim, Electron and Nom — were convicted of a range of computer crimes involving the intrusion into US defense and government computer systems and the theft of an online computer security newsletter in the late 1980s and early 1990.

Susan Headley was a phreaker and early computer hacker during the late 1970s and early 1980s. A member of the so-called Cyberpunks, Headley specialized in social engineering, a type of hacking which uses pretexting and misrepresentation of oneself in contact with targeted organizations in order to elicit information vital to hacking those organizations.

Dialcom Inc. was a United States corporation which developed the world's first commercial electronic mail service. It was founded in 1970 by Robert F. Ryan and was sold to ITT Corporation in 1982, becoming ITT Dialcom. Dialcom's e-mail software ran on Prime minicomputers and was licensed to governmental telecommunications providers in over seventeen countries. Various extra features could be offered by Dialcom-based services, including gateways to telex and fax, and online information retrieval services. In 1986, British Telecom, who used Dialcom software for its Telecom Gold service, bought Dialcom from ITT.

The Jargon File is a glossary and usage dictionary of slang used by computer programmers. The original Jargon File was a collection of terms from technical cultures such as the MIT AI Lab, the Stanford AI Lab (SAIL) and others of the old ARPANET AI/LISP/PDP-10 communities, including Bolt, Beranek and Newman, Carnegie Mellon University, and Worcester Polytechnic Institute. It was published in paperback form in 1983 as The Hacker's Dictionary, revised in 1991 as The New Hacker's Dictionary.

The bibliography of American science fiction author Bruce Sterling comprises novels, short stories and non-fiction.

Eoghan Casey is a digital forensics professional, researcher, and author. Casey has conducted a wide range of digital investigations, including data breaches, fraud, violent crimes, identity theft, and on-line criminal activity. He is also a member of the Digital/Multimedia Scientific Area Committee of the Organization for Scientific Area Committees. He helps organize the digital forensic research DFRWS.org conferences each year, and is on the DFRWS Board of Directors. He has a B.S. in Mechanical Engineering from the University of California, Berkeley, an M.A. in Educational Communication and Technology from New York University, and a Ph.D. in Computer Science from University College Dublin.

Digital Forensics Framework (DFF) was a computer forensics open-source software. It is used by professionals and non-experts to collect, preserve and reveal digital evidence without compromising systems and data.

References

  1. Cornwall, Hugo (1986). The Hacker's Handbook. E. Arthur Brown. ISBN   978-0912579061.
  2. Gold, Steve (1989). Hugo Cornwall's New Hacker's Handbook. London: Century Hutchinson. ISBN   0-7126-3454-1.

Further reading