410:. He disappeared soon after sharing this fact with a close friend from the plant. Jack schedules a meeting with his ex-wife Kathy Spencer who works in Digitronix' hardware division, and who designed the security hardware that protects all Digitronix plants. Kathy gives Jack a device which should get him past a plant's electronic security. Jack goes to China intending to break into one of the assembly plants, but his arrival is anticipated by Sutcliffe. Due to a botched infiltration Jack and Yoshio and captured by Sutcliffe and thrown into a holding cell with Yi. While in that cell they begin to see the outlines of the
342:. The government uses the theft and publication of the document as an excuse to dismantle the Hacker subculture. They arrest Sue Denim of the Speed Metal Kids after copies of the document are planted on their personal computers, and Oracle (Barbara Gordon) who downloaded a copy from Phrack as part of an investigation. Barbara accidentally shoots a Federal agent who had burst into her bedroom, but his vest saves him, in federal prison she uses the alias
373:
251:
The
Digitronix PC's success and profits caused rapid growth in the company, and a new senior Vice President named Walter Sutcliffe denied Marshall any profit sharing from his invention, because said profit sharing was based on a handshake agreement between Marshall and Donny Travis. Sutcliffe was one
389:
Jack confronts his former co-worker Yoshio
Natsume. Yoshio is the nephew of Tohiro Natsume whose Japanese company originally supplied Digitronix with cheap computer chips he bought on the Black Market from the Yakuza, but he later built chip foundries on the Chinese mainland. Jack confronts Yoshio
492:
into the operating system of every
Digitronix PC. Jack uses this game to define the rules of the fight between himself and the AI. The AI makes sure there is no possible way for it to lose the game. Jack deliberately loses to the AI, allowing it to kill him in the game, because
220:, which he'd began developing in Summer 1978. That story dealt with a software programmer in his late-twenties named "Jack Marshall", who worked for a sinister Texas-based computer company. This in itself was inspired by Shiner's employment with
28:
628:
wasn't considered secure enough for government installation (in 1992), he decided that DROS would look like UNIX but would not exactly be UNIX. Kim
Fairchild, another series consultant, suggested that he use
260:
DROS (Digitronix
Resident Operating System) but was caught and summarily terminated. But since he is the only one who truly understands DROS, he is brought in by the United States government (specifically
907:
796:
678:
In issue #11 of the series
Digitronix technicians in Kazakhstan demonstrate an early prototype virtual reality computer interface that may be the same one later used by Barbara Gordon (Oracle).
416:
conspiracy, the true reason for the virus, and how the information retrieved from the computers would be routed by the virus and co-ordinated by Tohiro
Natsume's newest project a
252:
of five middle managers Donny Travis brought in from CompuTech. According to Jack, CompuTech went under due to incompetent middle management. Marshall attempted to steal his own
637:. In DROS file blocks are graphically represented as rows of stacked rectangular blocks. All commands shown when Jack interacts with DROS are Unix commands. As in UNIX,
472:
scouts the installation at superspeed and runs into a door knocking himself out, he is captured by
Digitronix security but escapes them when he wakes up. Jack uses the
689:
bulletin boards. Some of the letters were from computer industry professionals and enthusiasts who often corrected technical errors they had found in previous issues.
321:
crackdown on illegal computer hacking activities that took place in 1990. The operation is named after a decoy message board used by the
Federal Government called
390:
with evidence of his complicity in the
Pentagon Virus and the E911 document leak. Jack discovers that Yoshio was framed by Sutcliffe who has been using his
452:
buses. They figure out that Digitronix is building a working globally networked artificial intelligence which they intend to use to process a few million
282:
818:
468:, and offers them a cure for the Pentagon virus. When he gets there he tells Hal Jordan and the rest of the JLE what Digitronix is really up to.
495:
There's a million ways to END the game by losing...but NONE to end it by WINNING. And since you CAN'T lose...you're going to be here a LONG time
774:
424:. They escape from the cell using Kathy's anti-security device, and sneak Yi out of China by shipping him to the US in an equipment box.
297:
which isolated itself the moment a virus was detected. The virus takes over the Cheyenne Mountain system and uses it to begin deploying
156:
47:
402:
in the machine he was working on, it automatically recorded all spoken conversation in its local environment and stored it in a hidden
298:
395:
620:, a free copy of DROS was bundled with every machine. Lewis Shiner gives detailed information on the inner workings of DROS in the
350:. Jack Marshall finds a copy on his own machine and deletes it, he's able to trace that copy back to Digitronix World Industries.
725:
554:
638:
293:
and recounts his history with Digitronix after a confrontation with Sutcliffe. He's able to cure the virus everywhere except
240:. Fascinated with computers ever since he was a child, he grew up alongside the industry and eventually ended up working at
355:
318:
936:
332:
which details how the national emergency response system works, and then they put the document online in a real world
221:
513:
Kids are teenage hackers who worship internet personalities like Hacker and Oracle, and who serve as his assistants:
893:
931:
926:
294:
432:
Yoshio discovers a massive mobilization of Digitronix personnel and hardware being sent to a secret facility at
237:
206:
624:
section at the back of the first two issues. Because series consultant Alan Wexelblat had warned him that
248:. Maverick company president Donny Travis worked alongside Marshall to invent the Digitronix Desktop PC.
585:
461:
573:
485:
399:
565:
302:
212:
At the end of issue 1 in the 'letters pages' section, author Lewis Shiner reveals that he'd based
766:
758:
441:
421:
314:
290:
681:
The letters printed in issues #3-12 were taken from online letter columns that Shiner setup on
394:
account and password. Yoshio introduces Jack to Yan Qing a Chinese exile and a survivor of the
301:. Jack uncovers a traitor in Cheyenne Mountain who dies while trying to escape, he later stops
882:
780:
770:
557:
521:
403:
273:
The first Story arc SoftWar dealt with a virus infecting the Digitronix computers used by the
541:
351:
257:
369:
is able to prove that the file originated at Digitronix and all the detainees are set free.
897:
597:
473:
501:. Yoshio is put in charge of Digitronix, and no charges are filed against the company.
366:
198:
99:
476:
interface to hack the AI which looks like Sutcliffe, he confronts it inside a game of
398:, her fiance Yi who worked at a Digitronix assembly plant in China, had discovered an
285:(Advanced Research Projects Agency), Securenet (connects to bombers and missiles) and
920:
449:
417:
359:
347:
245:
205:
computer company, a fictitious computer brand which would continue to show up in the
194:
600:, as well as advanced digital audio and video editing capacity on-chip, possibly as
327:
305:
from accidentally launching a nuclear strike on Russia and prevents World War III.
274:
174:
132:
118:
902:
634:
601:
561:
510:
489:
262:
103:
372:
686:
469:
457:
437:
407:
377:
362:
178:
144:
122:
27:
784:
705:
701:
569:
531:
498:
391:
190:
170:
139:
52:
807:
890:
581:
453:
433:
278:
253:
216:
story and comic book protagonist Jack Marshall on his unpublished novel
697:
365:
on behalf of Sue Denim and Oracle, but Jack Marshall gets there first.
173:
mini-series published from August 1992 to July 1993. It was written by
903:
Computer underground Digest: Volume 4 Issue 38, Sunday August 23, 1992
730:
717:
465:
445:
338:
286:
193:
novelist Lewis Shiner, is notable for the first appearance of a post-
700:
drive), with a 40 megabyte to 2 gigabyte storage capacity and a DTX
456:
of stolen government and industrial secrets. Jack uses a Digitronix
682:
642:
630:
605:
412:
371:
225:
151:
709:
693:
625:
589:
577:
333:
713:
593:
480:. Jack had designed a compact videogame for the DTX PC called
265:) as a freelance troubleshooter whenever there is a problem.
236:
Jack Marshall (Hacker) is a freelance systems analyst from
313:
The Operation Moonwitch storyline was based on real world
761:(2008), "Hacker Files, The", in Dougall, Alastair (ed.),
729:
entry, Digitronix computers are supposedly used by both
696:
optical storage disk (possibly a hybrid magneto-optical/
580:
monitor and optical disk storage, possibly based on the
553:
The Digitronix PC (DTX PC) of 1992 is an inexpensive
256:
for a new updated version of Digitronix' proprietary
228:
who produced the Centurion family of minicomputers.
891:
Phrack: Volume 4 Issue 40 File 2 of 14 July 9, 1992
150:
138:
128:
114:
109:
93:
82:
74:
66:
58:
46:
41:
18:
497:". He leaves the AI playing the game, stuck in a
819:Bitsavers.org: Centurion Business Computers PDF
692:The cover to issue #8 shows a DTX (Digitronix)
808:Lewis Shiner Autobiography: Life As We Know It
201:(Oracle), as well as the introduction of the
8:
912:, mostly: by Johanna Draper, October 23 1992
704:. The optical storage disk is labeled as "
588:. It also had built in compatibility with
560:that can also serve as a business capable
26:
15:
753:
751:
749:
747:
645:, there are user and superuser accounts.
652:
743:
865:According to usr/hacker/mail page 25,
7:
797:The Hacker Files #1: usr/hacker/mail
618:Digitronix Resident Operating System
448:language modules, and experimental
14:
396:Tiananmen Square protests of 1989
277:, it had somehow spread over the
242:Digitronix World Industries (DTX)
110:Creative team as of August 1992
83:
1:
356:Justice League International
319:United States Secret Service
854:Summary of The Hacker Files
842:Summary of The Hacker Files
830:Summary of The Hacker Files
358:calls in the assistance of
953:
883:Streettech: A synopsis of
763:The DC Comics Encyclopedia
325:. Someone got hold of the
661:pent1.dod.com:/usr/share
596:formats and had built in
406:on the machine's optical
295:Cheyenne Mountain Complex
25:
723:According to the book's
896:April 10, 2011, at the
346:from her days with the
238:Raleigh, North Carolina
209:for years thereafter.
189:The series, written by
78:August 1992 - July 1993
42:Publication information
540:- a thirteen-year-old
381:
376:Jack Marshall, art by
36:#2, artist Tom Sutton.
649:Command line examples
586:magneto-optical drive
566:clustered file server
462:Justice League Europe
375:
309:"Operation Moonwitch"
244:, a small company in
222:Warrex Computer Corp.
400:undocumented feature
385:"Working-Class Hero"
759:Greenberger, Robert
598:composite video out
520:- fifteen-year-old
442:parallel processors
422:parallel processors
303:General Wade Eiling
289:. Jack compiles an
185:Publication history
177:and illustrated by
937:1992 comics debuts
767:Dorling Kindersley
633:as DROS' resident
382:
315:Operation Sundevil
169:is a twelve issue
908:Usenet archive -
776:978-0-7566-4119-1
670:
669:
568:. It boasted 100
558:personal computer
162:
161:
94:Main character(s)
944:
932:Cyberpunk comics
927:DC Comics titles
910:The Hacker Files
885:The Hacker Files
870:
867:The Hacker Files
863:
857:
851:
845:
839:
833:
827:
821:
816:
810:
805:
799:
794:
788:
787:
755:
653:
544:video game buff.
542:African-American
505:Speed Metal Kids
482:Code of the West
478:Code of the West
464:headquarters in
352:Catherine Cobert
258:operating system
214:The Hacker Files
166:The Hacker Files
85:
75:Publication date
30:
20:The Hacker Files
16:
952:
951:
947:
946:
945:
943:
942:
941:
917:
916:
898:Wayback Machine
879:
874:
873:
864:
860:
852:
848:
840:
836:
828:
824:
817:
813:
806:
802:
795:
791:
777:
769:, p. 152,
757:
756:
745:
740:
675:
651:
622:usr/hacker/mail
614:
604:similar to the
551:
532:phone phreaking
528:Phreaky Phreddy
507:
484:, it is also a
474:virtual reality
430:
387:
311:
271:
234:
187:
157:Mark Buckingham
102:
98:
37:
12:
11:
5:
950:
948:
940:
939:
934:
929:
919:
918:
915:
914:
905:
900:
888:
878:
877:External links
875:
872:
871:
858:
846:
834:
822:
811:
800:
789:
775:
742:
741:
739:
736:
735:
734:
721:
690:
679:
674:
671:
668:
667:
663:
662:
658:
657:
650:
647:
613:
610:
550:
547:
546:
545:
538:Master Blaster
535:
525:
506:
503:
499:recursive loop
429:
426:
386:
383:
310:
307:
270:
267:
233:
230:
199:Barbara Gordon
186:
183:
160:
159:
154:
148:
147:
142:
136:
135:
130:
126:
125:
116:
112:
111:
107:
106:
100:Barbara Gordon
95:
91:
90:
87:
80:
79:
76:
72:
71:
68:
64:
63:
60:
56:
55:
50:
44:
43:
39:
38:
31:
23:
22:
13:
10:
9:
6:
4:
3:
2:
949:
938:
935:
933:
930:
928:
925:
924:
922:
913:
911:
906:
904:
901:
899:
895:
892:
889:
887:
886:
881:
880:
876:
868:
862:
859:
856:issues #11-12
855:
850:
847:
843:
838:
835:
831:
826:
823:
820:
815:
812:
809:
804:
801:
798:
793:
790:
786:
782:
778:
772:
768:
764:
760:
754:
752:
750:
748:
744:
737:
732:
728:
727:
722:
719:
715:
711:
707:
703:
699:
695:
691:
688:
684:
680:
677:
676:
672:
665:
664:
660:
659:
655:
654:
648:
646:
644:
640:
636:
632:
627:
623:
619:
611:
609:
607:
603:
599:
595:
591:
587:
583:
579:
575:
571:
567:
563:
559:
556:
549:Digitronix PC
548:
543:
539:
536:
533:
529:
526:
523:
519:
516:
515:
514:
512:
504:
502:
500:
496:
491:
487:
483:
479:
475:
471:
467:
463:
459:
455:
451:
447:
443:
439:
435:
427:
425:
423:
419:
418:supercomputer
415:
414:
409:
405:
401:
397:
393:
384:
379:
374:
370:
368:
364:
361:
360:Green Lantern
357:
353:
349:
348:Suicide Squad
345:
341:
340:
335:
331:
329:
324:
320:
316:
308:
306:
304:
300:
296:
292:
288:
284:
281:and infected
280:
276:
268:
266:
264:
259:
255:
249:
247:
246:Dallas, Texas
243:
239:
231:
229:
227:
223:
219:
215:
210:
208:
204:
200:
196:
195:Suicide Squad
192:
184:
182:
180:
176:
172:
168:
167:
158:
155:
153:
149:
146:
143:
141:
137:
134:
131:
127:
124:
120:
117:
113:
108:
105:
101:
97:Jack Marshall
96:
92:
88:
81:
77:
73:
69:
65:
61:
57:
54:
51:
49:
45:
40:
35:
29:
24:
21:
17:
909:
884:
866:
861:
853:
849:
844:issues #7-10
841:
837:
829:
825:
814:
803:
792:
765:, New York:
762:
724:
720:compatible".
666:rm vcom.doc
621:
617:
616:DROS is the
615:
602:coprocessors
552:
537:
527:
517:
508:
494:
481:
477:
431:
411:
388:
343:
337:
326:
322:
312:
272:
250:
241:
235:
217:
213:
211:
202:
188:
175:Lewis Shiner
165:
164:
163:
140:Penciller(s)
133:Lewis Shiner
119:Lewis Shiner
34:Hacker Files
33:
19:
832:issues #1-4
733:and Oracle.
635:text editor
562:workstation
522:heavy metal
511:Speed Metal
460:to contact
450:fiber optic
344:Amy Beddoes
263:Sarge Steel
218:Red Weather
104:Sarge Steel
70:mini-series
921:Categories
738:References
687:CompuServe
656:/dev/sd0a
470:Wally West
458:videophone
438:Kazakhstan
428:"Showdown"
408:hard drive
378:Tom Sutton
363:Hal Jordan
323:Moon Witch
291:anti-virus
203:Digitronix
179:Tom Sutton
145:Tom Sutton
129:Written by
123:Tom Sutton
115:Created by
785:213309017
726:Who's Who
706:Macintosh
702:mainboard
570:megabytes
518:Sue Denim
490:hardcoded
488:which is
454:gigabytes
404:partition
392:superuser
269:"SoftWar"
191:cyberpunk
171:DC Comics
86:of issues
53:DC Comics
48:Publisher
32:Cover to
894:Archived
869:#1 and 2
582:NeXTcube
530:- as in
486:backdoor
434:Tyuratam
420:with 64
330:document
279:internet
275:Pentagon
254:codebase
152:Inker(s)
59:Schedule
698:DVD RAM
283:Arpanet
224:in the
197:member
62:monthly
783:
773:
731:Batman
718:Novell
466:London
446:Prolog
367:Oracle
339:Phrack
336:named
287:Milnet
67:Format
683:GEnie
673:Notes
643:Linux
631:emacs
606:Amiga
576:, an
564:or a
413:Aleph
299:ICBMs
232:Story
781:OCLC
771:ISBN
716:and
710:NeXT
694:SCSI
685:and
641:and
626:UNIX
612:DROS
590:NTSC
578:HDTV
524:fan.
509:The
334:zine
328:E911
317:, a
226:’70s
714:DOS
639:BSD
594:PAL
584:'s
574:ram
572:of
555:OEM
436:in
354:of
207:DCU
84:No.
923::
779:,
746:^
712:,
708:,
608:.
444:,
440:,
181:.
121:,
89:12
592:\
534:.
493:"
380:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.