998:
568:
356:
543:
The magazine itself received a copyright claim for the ink spatter stock image featured on the Spring 2012 issue from Trunk
Archive, an image licensing agency, using an automated image tracking toolkit. While Trunk Archive identified its own image that featured the ink spatter as the source, it was
312:
hacking, which is generally understood to be any sort of technological utilization or manipulation of technology which goes above and beyond the capabilities inherent to the design of a given application. This usage attempts to maintain neutrality, as opposed to the politically charged and often
42:
730:
988:
1053:
1048:
428:
There are monthly meetings in over 24 countries. The meetings are listed in the back of the magazine, and are advertised as being open to anyone regardless of age or level of expertise.
1003:
883:
386:
in
Manhattan. The convention features events such as presentations, talks, concerts, and workshops. Speakers have included computer security figures and hackers such as
173:
is an
American seasonal publication of technical information and articles, many of which are written and submitted by the readership, on a variety of subjects including
1068:
1043:
987:
259:
as a place for hackers to share information and stories with each other. It was launched in
January 1984, coinciding with the book of the same name and the
406:
341:
and unnecessary designation, best suited for use by the media, and suggest that people who use hacking to commit crimes already have a label, that of
1063:
1073:
288:. The book, an 888-page hardcover, has been available from July 28, 2008, in the US and August 8, 2008, in the UK and is published by Wiley.
248:
that were not otherwise accessible. The magazine was given its name by David
Ruderman, who co-founded the magazine with his college friend,
1038:
329:
hacking – which some consider to be hacking motivated exclusively by malicious or selfish intentions, such as electronic theft,
756:
689:
213:
537:
244:– over a long-distance trunk connection gained access to "operator mode," and allowed the user to explore aspects of the
523:
908:
382:, in Manhattan, New York City, and has occurred every two years with the exception of the second HOPE in 1997, held at the
326:
314:
378:(Hackers on Planet Earth) conference in 1994, marking the publication's tenth anniversary. The conference is held at the
475:
462:
470:
shows. Both shows can be downloaded or streamed via the 2600 site, and are also broadcast on various radio stations:
305:
281:
is released on the first Friday of the month following a season change, usually
January, April, July, and October.
1058:
1022:
793:
205:
126:
528:
256:
1018:
676:
273:
317:
hacking (which some consider hacking motivated exclusively by good, benevolent intentions—such as
379:
338:
245:
178:
59:
954:
598:
160:
705:
236:
tone – which could be produced perfectly with a plastic toy whistle given away free with
950:
752:
685:
608:
544:
discovered that the original ink spatter was created by the
Finnish artist Jukka Korhonen, on
519:
155:
832:
637:
445:
395:
364:
322:
769:"'Hackers are necessary': Q&A with Emmanuel Goldstein of 2600: The Hacker's Quarterly"
504:
410:
260:
237:
503:, a character named Emmanuel Goldstein, also known as "Cereal Killer", was portrayed by
884:"Hacker magazine 2600 extorted for $ 714 over ink spot pic copyright troll doesn't own"
671:
603:
498:
414:
217:
209:
197:
186:
1032:
549:
440:
437:
403:
399:
387:
383:
268:
174:
916:
681:
572:
418:
986:
818:
768:
422:
391:
301:
249:
241:
41:
545:
467:
334:
233:
74:
1006:
was created from a revision of this article dated 13 September 2019
966:
a searchable index of 2600 The Hacker
Quarterly magazine article information.
612:
284:
Goldstein has published a compilation of articles from the magazine entitled
252:. Ruderman ended his direct involvement with the magazine three years later.
17:
490:
330:
212:, and the magazine has become a platform for speaking out against increased
193:
751:
Goldstein, E (July 28, 2008). The Best of 2600: A Hacker
Odyssey: Wiley.
375:
343:
309:
264:
229:
185:
protocols and services, as well as general news concerning the computer "
182:
70:
567:
318:
263:. It is published and edited by its co-founder Emmanuel Goldstein (a
355:
533:
354:
963:
857:
518:
has been involved in many court cases related to technology and
480:
552:. Trunk Archive later retracted the claim and sent a letter to
959:
436:
2600 Films produced a feature-length documentary about famed
984:
794:"Plugging a security leak - Silicon Valley Business Journal"
706:"2600: The Hacker Quarterly : History of Information"
443:, the Free Kevin movement and the hacker world, entitled
943:
532:
involving the distribution of DVD copy protection tool
337:.) Other hackers believe that hat-color labels are an
536:, where courts upheld the constitutionality of the
154:
145:
140:
132:
122:
114:
106:
96:
88:
80:
66:
54:
1054:Quarterly magazines published in the United States
232:discovery in the 1960s that the transmission of a
1049:Computer magazines published in the United States
8:
631:
629:
333:, hijacking of websites, and other types of
32:
592:
590:
588:
27:American underground technology publication
31:
449:, and is currently working on one titled
277:) and his company 2600 Enterprises, Inc.
255:The magazine traces its origins to early
1014:, and does not reflect subsequent edits.
997:
1069:Magazines published in New York (state)
1044:1984 establishments in New York (state)
584:
909:"AN APOLOGY FROM TRUNK ARCHIVE | 2600"
597:Niarchos, Nicolas (October 24, 2014).
882:Storm, Darlene (September 10, 2015).
7:
417:, and countercultural figures like
228:The magazine's name comes from the
208:transitioned to coverage of modern
286:The Best of 2600: A Hacker Odyssey
267:of Corley which is an allusion to
25:
833:"Copyright fight comes to an end"
240:cereal, discovered by friends of
996:
566:
538:Digital Millennium Copyright Act
196:community and late 20th-century
40:
798:Silicon Valley Business Journal
548:, who had released it into the
540:anti-circumvention provisions.
599:"A Print Magazine for Hackers"
524:Electronic Frontier Foundation
1:
1064:Magazines established in 1984
661:interview with David Ruderman
556:apologizing for the mistake.
526:, perhaps most significantly
216:and advocacy of personal and
1074:Works about computer hacking
710:www.historyofinformation.com
638:"2600: The Hacker Quarterly"
179:telephone switching systems
1090:
1039:2600: The Hacker Quarterly
733:. Appext20. March 19, 1984
300:and affiliates, the often
170:2600: The Hacker Quarterly
34:2600: The Hacker Quarterly
39:
351:Conferences and meetings
819:"Off the Hook 09/12/06"
642:Encyclopædia Britannica
456:Corley is also host of
127:Middle Island, New York
992:
972:Listen to this article
773:www.crime-research.org
529:Universal v. Reimerdes
368:
257:Bulletin Board Systems
991:
358:
206:associated conference
92:2600 Enterprises Inc.
46:Spring 2012 issue of
1023:More spoken articles
677:The Hacker Crackdown
274:Nineteen Eighty-Four
261:break-up of AT&T
214:digital surveillance
192:With origins in the
58:Emmanuel Goldstein (
821:. 2600 Enterprises.
323:penetration testing
224:Publication history
36:
993:
497:In the 1995 movie
380:Hotel Pennsylvania
369:
365:New York Telephone
339:oversimplification
313:contentious terms
60:Eric Gordon Corley
989:
964:2600 Index mirror
731:"NYS Corporation"
520:freedom of speech
166:
165:
97:Total circulation
16:(Redirected from
1081:
1059:Hacker magazines
1013:
1011:
1000:
999:
990:
980:
978:
973:
947:
946:
944:Official website
929:
928:
926:
924:
915:. Archived from
905:
899:
898:
896:
894:
879:
873:
872:
870:
868:
854:
848:
847:
845:
843:
829:
823:
822:
815:
809:
808:
806:
804:
790:
784:
783:
781:
779:
765:
759:
749:
743:
742:
740:
738:
727:
721:
720:
718:
716:
702:
696:
695:
668:
662:
659:
653:
652:
650:
648:
633:
624:
623:
621:
619:
594:
573:Media portal
571:
570:
489:is broadcast on
479:is broadcast on
446:Freedom Downtime
396:Richard Stallman
374:established the
363:van, a modified
319:hardware modding
296:In the usage of
246:telephone system
218:digital freedoms
150:
147:
44:
37:
21:
1089:
1088:
1084:
1083:
1082:
1080:
1079:
1078:
1029:
1028:
1027:
1026:
1015:
1009:
1007:
1004:This audio file
1001:
994:
985:
982:
976:
975:
971:
942:
941:
938:
933:
932:
922:
920:
919:on May 23, 2016
907:
906:
902:
892:
890:
881:
880:
876:
866:
864:
856:
855:
851:
841:
839:
831:
830:
826:
817:
816:
812:
802:
800:
792:
791:
787:
777:
775:
767:
766:
762:
750:
746:
736:
734:
729:
728:
724:
714:
712:
704:
703:
699:
692:
670:
669:
665:
660:
656:
646:
644:
635:
634:
627:
617:
615:
596:
595:
586:
581:
565:
562:
513:
505:Matthew Lillard
466:, two New York
451:Speakers' World
434:
411:Daniel Ellsberg
353:
294:
226:
194:phone phreaking
144:
98:
50:
28:
23:
22:
15:
12:
11:
5:
1087:
1085:
1077:
1076:
1071:
1066:
1061:
1056:
1051:
1046:
1041:
1031:
1030:
1016:
1002:
995:
983:
970:
969:
968:
967:
957:
948:
937:
936:External links
934:
931:
930:
900:
874:
849:
824:
810:
785:
760:
744:
722:
697:
690:
672:Bruce Sterling
663:
654:
636:Jack Bratich.
625:
604:The New Yorker
583:
582:
580:
577:
576:
575:
561:
558:
522:alongside the
512:
509:
495:
494:
484:
433:
432:In other media
430:
415:Edward Snowden
407:William Binney
404:whistleblowers
352:
349:
293:
290:
225:
222:
210:hacker culture
198:counterculture
164:
163:
158:
152:
151:
142:
138:
137:
134:
130:
129:
124:
120:
119:
116:
112:
111:
108:
104:
103:
100:
94:
93:
90:
86:
85:
82:
78:
77:
68:
64:
63:
56:
52:
51:
45:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
1086:
1075:
1072:
1070:
1067:
1065:
1062:
1060:
1057:
1055:
1052:
1050:
1047:
1045:
1042:
1040:
1037:
1036:
1034:
1024:
1020:
1005:
965:
961:
958:
956:
952:
949:
945:
940:
939:
935:
918:
914:
910:
904:
901:
889:
888:Computerworld
885:
878:
875:
863:
859:
853:
850:
838:
834:
828:
825:
820:
814:
811:
799:
795:
789:
786:
774:
770:
764:
761:
758:
757:0-470-29419-1
754:
748:
745:
732:
726:
723:
711:
707:
701:
698:
693:
691:0-553-56370-X
687:
683:
679:
678:
673:
667:
664:
658:
655:
643:
639:
632:
630:
626:
614:
610:
606:
605:
600:
593:
591:
589:
585:
578:
574:
569:
564:
563:
559:
557:
555:
551:
550:public domain
547:
541:
539:
535:
531:
530:
525:
521:
517:
510:
508:
506:
502:
501:
492:
488:
485:
482:
478:
477:
473:
472:
471:
469:
465:
464:
459:
454:
452:
448:
447:
442:
441:Kevin Mitnick
439:
431:
429:
426:
424:
420:
416:
412:
408:
405:
402:, as well as
401:
400:Steve Wozniak
397:
393:
389:
388:Kevin Mitnick
385:
384:Puck Building
381:
377:
373:
366:
362:
357:
350:
348:
346:
345:
340:
336:
332:
328:
324:
320:
316:
311:
307:
303:
299:
292:"Hacker" term
291:
289:
287:
282:
280:
276:
275:
270:
269:George Orwell
266:
262:
258:
253:
251:
247:
243:
239:
235:
231:
223:
221:
219:
215:
211:
207:
203:
199:
195:
190:
188:
184:
180:
176:
172:
171:
162:
159:
157:
153:
149:
143:
139:
135:
131:
128:
125:
121:
118:United States
117:
113:
109:
105:
101:
95:
91:
87:
83:
79:
76:
72:
69:
65:
61:
57:
53:
49:
43:
38:
35:
30:
19:
18:2600 Magazine
921:. Retrieved
917:the original
913:www.2600.com
912:
903:
891:. Retrieved
887:
877:
865:. Retrieved
861:
852:
840:. Retrieved
836:
827:
813:
801:. Retrieved
797:
788:
776:. Retrieved
772:
763:
747:
735:. Retrieved
725:
715:December 26,
713:. Retrieved
709:
700:
682:Bantam Books
675:
666:
657:
647:December 17,
645:. Retrieved
641:
616:. Retrieved
602:
553:
542:
527:
515:
514:
499:
496:
487:Off The Wall
486:
476:Off the Hook
474:
463:Off the Hook
461:
458:Off The Wall
457:
455:
450:
444:
435:
427:
419:Jello Biafra
371:
370:
360:
342:
308:" refers to
297:
295:
285:
283:
278:
272:
254:
238:Cap'n Crunch
227:
201:
191:
169:
168:
167:
47:
33:
29:
867:January 10,
511:Court cases
423:The Yes Men
392:Steven Levy
302:loaded term
250:Eric Corley
242:John Draper
187:underground
1033:Categories
1019:Audio help
1010:2019-09-13
960:2600 Index
862:DeviantArt
579:References
546:DeviantArt
493:(90.1 FM).
468:talk radio
335:cybercrime
234:2600 hertz
75:technology
67:Categories
955:0749-3851
613:0028-792X
483:(99.5 FM)
331:vandalism
327:black hat
315:white hat
161:0749-3851
89:Publisher
84:Quarterly
81:Frequency
71:Computers
1021: ·
858:"Loadus"
674:(1993).
560:See also
376:H.O.P.E.
344:criminal
310:grey hat
265:pen name
230:phreaker
204:and its
183:Internet
133:Language
123:Based in
1008: (
979:minutes
923:May 28,
893:May 28,
842:June 5,
803:June 5,
778:June 5,
737:June 7,
618:June 5,
500:Hackers
367:vehicle
325:), and
306:hacking
175:hacking
141:Website
136:English
115:Country
107:Founded
953:
755:
688:
611:
438:hacker
413:, and
398:, and
102:52,250
99:(2009)
55:Editor
534:DeCSS
951:ISSN
925:2016
895:2016
869:2018
844:2016
837:CNET
805:2016
780:2016
753:ISBN
739:2014
717:2022
686:ISBN
649:2015
620:2016
609:ISSN
554:2600
516:2600
491:WUSB
481:WBAI
460:and
421:and
372:2600
361:2600
359:The
298:2600
279:2600
202:2600
156:ISSN
148:.com
146:2600
110:1984
48:2600
962:or
321:or
271:'s
189:."
1035::
911:.
886:.
860:.
835:.
796:.
771:.
708:.
684:.
680:.
640:.
628:^
607:.
601:.
587:^
507:.
453:.
425:.
409:,
394:,
390:,
347:.
220:.
200:,
181:,
177:,
73:,
1025:)
1017:(
1012:)
981:)
977:7
974:(
927:.
897:.
871:.
846:.
807:.
782:.
741:.
719:.
694:.
651:.
622:.
304:"
62:)
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.