After a short period during the mid-nineties, the "short summer of the Internet", with its utopian promises, rising commercialism and radical cybercultures, a massification of the Net set in. The period of dotcom.mania is one of hyper growth with users turned into click rates generating "eyeballs". Open, decentralized "citizen" networks are of no use anymore in this environment. Potential customers are only interesting because of their market profile.
|
10 Commandments of Website Accessibility |
by Chris P. Bohn |
| Helpful tips and suggestions to web designers. |
|
A CNN Debate with Senator Exon |
by Senator Exon & Marc Rotenberg |
| A transcript of the debate on CNN between Senator Exon & Marc Rotenberg, director of the Electronic Privacy Information Center in Washington. |
|
Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy |
by Dorothy E. Denning |
| Government and non-government actors alike used the Net to disseminate information, spread propaganda, demonize opponents, and solicit support for their positions. Hackers used it to voice their objections to both Yugoslav and NATO aggression by disrupting service on government computers and taking over their Web sites. |
|
Blocking Unwanted Ads From Websites |
by White Taipan |
| Are you tired of going to your favorite websites only to see banners at the top, and boxes on the sides? Tired of seeing those ads flashing their bright colors and moving objects? This is most likely the easiest way to rid yourself of these nuisances. The best part is you don't need to download anything. |
|
Bypass Internet Censorship |
by Freerk |
| Getting around filters and blocked ports. |
|
Censorship in a Box: Why Blocking Software is Wrong |
by ACLU |
| Like any technology, blocking software can be used for constructive or destructive purposes. In the hands of parents and others who voluntarily use it, it is a tool that can be somewhat useful in blocking access to some inappropriate material online. But in the hands of government, blocking software is nothing more than censorship in a box. |
|
China and the Internet: A Chronicle of Repression |
| Arrests, banned sites, threats against operators, censorship of newsgroups and the shutting-down of cybercaf?s are many techniques used in this daily repression. To accomplish this goal, about twenty provinces now have special police brigades trained in pursuing "subversive" Internet users. |
|
Civil Liberties In Cyberspace |
by Mitchell Kapor |
| Our society has made a commitment to openness and to free communication. But if our legal and social institutions fail to adapt to new technology, basic access to the global electronic media could be seen as a privilege, granted to those who play by the strictest rules, rather than as a right held by anyone who needs to communicate. |
|
Closed Networks in an Open Society |
by Geert Lovink |
| After a short period during the mid-nineties, the "short summer of the Internet", with its utopian promises, rising commercialism and radical cybercultures, a massification of the Net set in. The period of dotcom.mania is one of hyper growth with users turned into click rates generating "eyeballs". Open, decentralized "citizen" networks are of no use anymore in this environment. Potential customers are only interesting because of their market profile. |
|
Closing the Net |
by Greg Costikyan |
| The arrest of Neidorf and Riggs was only the beginning. The Secret Service, which has authority over crimes involving government computers, had embarked on a vast, nationwide investigation of hacker activity: Operation Sun Devil. |
|
Company E-mail Policy |
by David R. Johnson and John Podesta |
| Formulating A Company Policy on Access to and Use and Disclosure of
Electronic Mail on Company Computer Systems. |
|
Comprehensive Guide to Noobs |
by olliemaster13 |
| A guide to all things about noobs/n00bs. |
|
Congressional Testimony of Emmanuel Goldstein |
| Edward J. Markey (D-MA) and Jack Fields (R-TX) launched into a tirade against the evils of computer hackers and generally demonstrated their ignorance on the subject and their unwillingness to listen to anything that didn't match their predetermined conclusions. Those conclusions are basically that 2600 Magazine is a manual for criminals and that hackers are a blight on civilization. |
|
Copyright and Globalization in the Age of Computer Networks |
by Richard Stallman |
| The Soviet Union treated it as very important. There this unauthorized copying and re-distribution was known as Samizdat and to stamp it out, they developed a series of methods: First, guards watching every piece of copying equipment to check what people were copying to prevent forbidden copying. Second, harsh punishments for anyone caught doing forbidden copying. Third, soliciting informers, asking everyone to rat on their neighbors and co-workers to the information police. |
|
Crime and Puzzlement |
by John Perry Barlow |
| Is transmission through an otherwise unused data channel really theft? Is
the track-less passage of a mind through TRW's mainframe the same as
the passage of a pickup through my Back 40? What is a place if Cyberspace
is everywhere? What are data and what is free speech? How does one treat property which has no physical form and can be infinitely reproduced? |
|
Cyberocracy is Coming |
by David Ronfeldt |
| Optimism about the information revolution should be tempered by a constant, anticipatory awareness of its potential dark side... |
|
Cyberpunk Manifesto |
by Gareth Branwyn |
| The future has imploded onto the present. There was no nuclear Armageddon. There's too much Real Estate to lose. The new battlefield is people's minds.
|
|
Cyberpunks |
by Dr. Timothy Leary |
| The opening moments of the movie WARGAMES provide a classic
example of Cypberpunk warning. It is a foggy night. A jeep
carries a captain and a lieutenant up a winding Colorado mountain
road to secret nuclear-missile launching silos. The captain tells
the lieutenant that he and his wife planted a cultivated grade of
marijuana seeds in their garden, and, to ensure their growth,
invoked the Tibetan Buddhist prayer for enlightenment... |
|
Drug Use and The Internet |
by U.S. Department of Justice |
| Advocates of an expanded freedom of expression are purveyors of information with yet another agenda. These individuals and groups publish information on the Internet to push the boundaries of self-expression and the First Amendment. The information they provide may induce minors and young adults to break drug laws or to become a danger to themselves or to others by abusing illegal drugs. |
|
E-mail |
by Norman A. Rubin |
| Some of the erotic material one receives in the E-mail as advertisements. |
|
Economic FAQ about the Internet from 1994 |
by Jeffrey K. MacKie-Mason and Hal Varian |
| This is a set of Frequently Asked Questions (and answers)
about the economic, institutional, and technological structure of the
Internet. We describe the current state of the Internet, discuss
some of the pressing economic and regulatory problems, and speculate
about future developments. |
|
Electronic Fascism |
by William F. Jasper |
| For all it's disingenuous bows to the "market" and "private sector initiative," the Clinton Administration is determined to dictate the development of the exciting new frontier of interactive, multimedia communications. It doesn't trust consumers and producers to work out solutions to the challenges
presented by the new technologies. |
|
Fahrenheit 451.2: Is Cyberspace Burning? |
by ACLU |
| How rating and blocking proposals may torch free speech on the Internet. |
|
Freedom Or Copyright? |
by Richard Stallman |
| Computers can be powerful tools of domination when a few people control what other people's computers do. The publishers realized that by forcing people to use specially designated software to read e-books, they can gain unprecedented power: they can compel readers to pay, and identify themselves, every time they read a book! |
|
From Crossbows to Cryptography: Thwarting the State via Technology |
by Chuck Hammill |
| Technology represents one of the most promising avenues available for re-capturing our freedoms from those who have stolen them. By its very nature, it favors the bright over the dull. It favors the adaptable over the sluggish. And what two better words are there to describe government bureaucracy than "dull" and "sluggish"?
|
|
Getting Porn on Linspire Without A Trace |
by LINPIRE CNR WHIZ |
| Using Linspire CNR gave me an advantage of one-click downloads. But, I discovered it could give me more... |
|
Google Syntax |
by Satatik |
| Explaining how www.google.com 's syntax commands work. |
|
Heroic AOL CD Destruction Guide |
by Spirit Hero |
| Remember...Everytime you destroy an AOL CD another person somewhere is saved from the evilness that is America Online.
But how you destroy them is a different method...
In my guide you'll learn ways that make it less a chore...And more fun. |
|
Hiding Crimes in Cyberspace |
by Dorothy E. Denning and William E. Baugh, Jr. |
| We address here the use of encryption and other information technologies to hide criminal activities. We first examine encryption and the options available to law enforcement for dealing with it. Next we discuss a variety of other tools for concealing information: passwords, digital compression, steganography, remote storage, and audit disabling. Finally we discuss tools for hiding crimes through anonymity: anonymous remailers, anonymous digital cash, computer penetration and looping, cellular phone cloning, and cellular phone cards. |
|
Howard Bloom's Big Bang Tango Media Lab |
by unknown |
| The Big Bang Tango Media Lab's first step is an animation that tells the tale of the cosmos' history from the first instant of the big bang to the emotions in your brain as you read this page. The group's next task is to tackle bit by bit the expression of a Grand Unified Theory of Everything In the Universe Including the Human Soul. |
|
ICML Prologue |
by IC Metadata Sub-Working Group |
| The IC Metadata Sub-Working Group (MSWG) has developed the Intelligence Community Markup Language (ICML) as part of the ICCIO Executive Council and Working Group commitment to IC inter-organization interoperability. ICML is based on a number of data modeling activities that have occurred in the IC over the last ten years, all of which have been used in one way or another to develop ICML. |
|
If They Knew What You Know |
by Peter J. Celano |
| Here on the internet, we enjoy what is probably the freest speech in history. We are not just free from censorship - we are free of the constraints of time, distance, borders, politics, ideology, philosophy and religion. We are even free of the monetary burden of mass communication and publication! |
|
It's the Context, Stupid by Paul Saffo (1994) |
|
Legal and Ethical Considerations for Dealing with Electronic Files |
by Harvey A. Silverglate and Thomas C. Viles |
| This small sampling of cases demonstrates the unequivocal
determination of the government to conduct investigative seizures of
entire computer systems, even when only a few files may be relevant to an
investigation or prosecution. Such seizures can have immediate and
catastrophic effects on computer users who have no connection to the
conduct being investigated. |
|
Media Conglomerate Threatens Suit Against Gamer Community |
by EFF |
| On behalf of its Blizzard Entertainment division, Vivendi sent a "cease and desist" letter to Internet Gateway Inc., the Internet Service Provider (ISP) host of a free software project called "bnetd" that emulates Blizzard's Battle.net gaming service. Blizzard game purchasers can meet online or on a local area network to chat, find competition, and start multiplayer games using the bnetd software. |
|
Microsoft: It's Even Worse than You Think |
by Tom Paine |
| If I told you that there was a web site that advocates the cloning of
human beings, calls the 10 commandments "1st century rules is a
21st century world," and portrays Adolph Hitler as a loveable
cartoon character, you probably wouldn't be surprised. After all, the
Web is an equal opportunity medium and even the twisted are
allowed their opportunity for free expression. |
|
Old Freedoms and New Technologies: The Evolution of Community Networking |
by Jay Weston |
| The Internet is less about information or content, and more about relations. For the mass media, it is always just the opposite. The mass media are almost pure content that insulates the few content producers or information providers from their audiences. |
|
Our Underground World: Hackers United |
by Atomic |
| An article which states the truth about hackers. But we must remember, is there a truth? Or is everything one giant lie? This is the opinion of a fellow hacker. |
|
Sabotage in Cyberspace: The Coming Electronic Pearl Harbor |
by Mark Ward |
| The threat to national security from computer "terrorists" is vastly
overblown. Most hackers are after nothing more than an intellectual
thrill. |
|
Testimony of Mark M. Ishikawa CEO BayTSP.com |
| Adult webmasters often risk obscenity prosecution in those areas that have more restrictivelocal standards. BayTSP.com has developed a product to address this very issue. 2257 FilterSM allows webmasters to make specific files available based on the geographic location ofthe user. Webmasters who utilize this "electronic stop light" that has been embedded in online graphic, video, text, and audio files can automatically filter out "obscene" material, as defined by the user's local community standards, and have this material replaced by content that is more acceptable. |
|
The Case for Public Subsidy of the Internet |
by Sandra Schickele |
| A particular good, such as the Internet, can only be efficiently produced through the free market, according to the theory of price, if the good's production and consumption meet the first nine conditions listed below. If the production or consumption of the good does not meet these conditions the good cannot be efficiently produced through a free unregulated market. |
|
The Constitution in Cyberspace: Law and Liberty Beyond the Electronic Frontier |
by Laurence H. Tribe |
| My topic is how to "map" the text and structure of our Constitution onto the texture and topology of "cyberspace". That's the term coined by cyberpunk novelist William Gibson, which many now use to describe the "place" -- a place without physical walls or even physical dimensions. |
|
The Digital Revolution |
by John Sculley |
| John Sculley's speech on The Digital Revolution at the 1992 Seybold Conference. |
|
The Electronic Discourse of the Computer Underground |
by Dr. Steven Mizrach |
| From an emic perspective, many of our subjects do not distinguish between "real" life and "virtual" life. As good ethnographers and participant observers, we should not make such seemingly "etic" distinctions, in the face of our informants. If they spend more of their waking time in cyberspace than in "real life," who is doing the more honest ethnography? |
|
The Feminization of Cyberspace |
by Doctress Neutopia |
| During the final year of my doctoral work I discovered the new
world of Cyberspace. Having been involved in utopian thought for
more than fifteen years, inventing my own utopia from the ideas of
such futurists and architects as Charlotte Perkins Gilman,
Starhawk, Eiane Eisler, Paolo Soleri, Buckminster Fuller, etc,
which I call Neutopia, I find the world of virtual reality is the
perfect place for my Neutopian imagination be to born into reality.
The central nervous system of Neutopia is the evolving Global Brain
which we are now seeing come about through information technologies
and the world of Cyberspace. |
|
The International Legal Implications of Information Warfare |
by Richard W. Aldrich |
| One initial hurdle posed by the breadth and uniqueness of certain aspects of information warfare is the question of what constitutes an armed attack in the information age? The answer is less than clear, but appears to revolve around the threat the action poses to a government's authority over its people. |
|
The Internet & the Anti- Net by Nick Arnett |
|
The Shocking Truth About Digital Signatures and Internet Commerce |
by Jane K. Winn |
| It has been an article of faith for several years now among many observers that digital signatures will be the "next big thing" for Internet commerce. That unrealized potential is consistently mistaken for actual use in the marketplace, however, leading to countless wildly inaccurate journalistic accounts of digital signatures as the "most popular" or "most important" system for Internet contract formation. |
|
The Social Organization of the Computer Underground |
by Gordon R. Meyer |
| This paper examines the social organization of the
"computer underground" (CU). The CU is composed of
actors in three roles, "computer hackers," "phone
phreaks," and "software pirates." These roles have
frequently been ignored or confused in media and other
accounts of CU activity. By utilizing a data set culled
from CU channels of communication this paper provides
an ethnographic account of computer underground
organization. It is concluded that despite the
widespread social network of the computer underground,
it is organized primarily on the level of colleagues,
with only small groups approaching peer relationships.
|
|
Why Software Should Not Have Owners |
by Richard Stallman |
| Owners often describe the current state of the law, and the harsh penalties they can threaten us with. Implicit in this approach is the suggestion that today's law reflects an unquestionable view of morality---yet at the same time, we are urged to regard these penalties as facts of nature that can't be blamed on anyone. |
|
Why Your 'Movable Type' Blog Must Die |
by James A C Joyce |
| In the past, blogging was an interesting pastime. Now, with the advent of the ridiculously popular weblog package Movable Type, the Web is in risk of drowning under a tidal wave of morons who throttle search engines with writing that has no purpose and such PageRank-destroying features as "TrackBack". |