photog.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for your photos and banter. Photog first is our motto Please refer to the site rules before posting.

Administered by:

Server stats:

263
active users

#therealm

0 posts0 participants0 posts today
☮ ♥ ♬ 🧑‍💻<p>“<a href="https://ioc.exchange/tags/Underground" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Underground</span></a>, with <a href="https://ioc.exchange/tags/JulianAssange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JulianAssange</span></a>: Underground is the compelling true story of the rise of the computer underground and the crimes of an elite group of hackers who took on the forces of the establishment.</p><p>Tracing an international ring of computer hackers which spanned three continents and nearly a decade of computer crime, author <a href="https://ioc.exchange/tags/SueletteDreyfus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SueletteDreyfus</span></a> weaves a gripping tale against a backdrop of cutting edge technology. </p><p>Underground uncovers the previously hidden story behind hackers from <a href="https://ioc.exchange/tags/8LGM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>8LGM</span></a>, <a href="https://ioc.exchange/tags/TheRealm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TheRealm</span></a>, the publishers of International Subversive and other linked Internet hacking groups. These elite <a href="https://ioc.exchange/tags/hackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackers</span></a> were the cream of the international computer underground and broke into tens of thousands of computers, belonging to some of the world's most prestigious institutions including <a href="https://ioc.exchange/tags/Citibank" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Citibank</span></a>, the <a href="https://ioc.exchange/tags/Pentagon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentagon</span></a>, <a href="https://ioc.exchange/tags/NATO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NATO</span></a>, the <a href="https://ioc.exchange/tags/FT100" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FT100</span></a>, <a href="https://ioc.exchange/tags/NASA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NASA</span></a>, <a href="https://ioc.exchange/tags/LockheedMartin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LockheedMartin</span></a>, <a href="https://ioc.exchange/tags/DeutscheTelekom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DeutscheTelekom</span></a> and .AustralianTelecom. </p><p>After hacking the Defence Data Network's .NIC, some had total control over the most important computers on the Internet - computers which would let them stop communications across the entire net. They divised methods of making free and untraceable telephone calls to hide their activities, invented worms, stalked, hacked and thumbed their noses at security experts such as Eugene Spafford &amp; Cliff Stoll and reporters from the New York Times. </p><p>They monitored the police -- while the police monitored them. The hackers came from all walks of life, gathering on-line in Germany from Australia, Europe, the UK, the US and Canada, to pursue their targets with an obsessive fervour.”</p><p> &lt;<a href="https://underground-book.net/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">underground-book.net/</span><span class="invisible"></span></a>&gt;</p>