History Hacking


Book Description

History analyst and author Mario Arndt writes about topics you won't find in traditional history books. His analyses of official history reveal how the Middle Ages, the ancient world, and the associated chronologies were fabricated and forged. This is a book like no other! Hack #0: History Hacking - Anything goes Hack #1: The made-up lists of kings in the Middle Ages Hack #2: The made-up chronology of antiquity Hack #3: The numerical code of the Bible in history Hack #4: The 800-year cycle in history Hack #5: Charlemagne - the made-up Emperor Hack #6: Augustus - the made-up first Roman Emperor Hack #7: The new dating of the astronomical reports of antiquity Hack #8: Jesus Christ on the imperial throne Hack #9: The made-up list of popes Hack #10: An new chronology of the history of mankind This book is so intelligent and entertaining at the same time that it is a must read.




Hacking Life


Book Description

In an effort to keep up with a world of too much, life hackers sometimes risk going too far. Life hackers track and analyze the food they eat, the hours they sleep, the money they spend, and how they're feeling on any given day. They share tips on the most efficient ways to tie shoelaces and load the dishwasher; they employ a tomato-shaped kitchen timer as a time-management tool.They see everything as a system composed of parts that can be decomposed and recomposed, with algorithmic rules that can be understood, optimized, and subverted. In Hacking Life, Joseph Reagle examines these attempts to systematize living and finds that they are the latest in a long series of self-improvement methods. Life hacking, he writes, is self-help for the digital age's creative class. Reagle chronicles the history of life hacking, from Benjamin Franklin's Poor Richard's Almanack through Stephen Covey's 7 Habits of Highly Effective People and Timothy Ferriss's The 4-Hour Workweek. He describes personal outsourcing, polyphasic sleep, the quantified self movement, and hacks for pickup artists. Life hacks can be useful, useless, and sometimes harmful (for example, if you treat others as cogs in your machine). Life hacks have strengths and weaknesses, which are sometimes like two sides of a coin: being efficient is not the same thing as being effective; being precious about minimalism does not mean you are living life unfettered; and compulsively checking your vital signs is its own sort of illness. With Hacking Life, Reagle sheds light on a question even non-hackers ponder: what does it mean to live a good life in the new millennium?




Historical Ontology


Book Description

In this text, Ian Hacking offers his reflections on the philosophical uses of history. The focus is the historical emergence of concepts and objects.




Hack Attacks Encyclopedia


Book Description

CD-ROM contains: "10,000 pages containing the full texts, tools, and exploits described and previewed in the book."




Pirate Killers


Book Description

One hundred and fifty years ago the Royal Navy fought a daring campaign against ruthless pirates and won. On West African shores they killed The King of the Pirates, Bartholomew Roberts and captured his fleet. Scores of his men were executed by the Admiralty Court.




Intercept


Book Description

The computer was born to spy, and now computers are transforming espionage. But who are the spies and who is being spied on in today's interconnected world? This is the exhilarating secret history of the melding of technology and espionage. Gordon Corera's compelling narrative, rich with historical details and characters, takes us from the Second World War to the internet age, revealing the astonishing extent of cyberespionage carried out today. Drawing on unique access to intelligence agencies, heads of state, hackers and spies of all stripes, INTERCEPT is a ground-breaking exploration of the new space in which the worlds of espionage, geopolitics, diplomacy, international business, science and technology collide. Together, computers and spies are shaping the future. What was once the preserve of a few intelligence agencies now matters for us all.




Free as in Freedom [Paperback]


Book Description

Free as in Freedom interweaves biographical snapshots of GNU project founder Richard Stallman with the political, social and economic history of the free software movement. It examines Stallman's unique personality and how that personality has been at turns a driving force and a drawback in terms of the movement's overall success. Free as in Freedom examines one man's 20-year attempt to codify and communicate the ethics of 1970s era "hacking" culture in such a way that later generations might easily share and build upon the knowledge of their computing forebears. The book documents Stallman's personal evolution from teenage misfit to prescient adult hacker to political leader and examines how that evolution has shaped the free software movement. Like Alan Greenspan in the financial sector, Richard Stallman has assumed the role of tribal elder within the hacking community, a community that bills itself as anarchic and averse to central leadership or authority. How did this paradox come about? Free as in Freedom provides an answer. It also looks at how the latest twists and turns in the software marketplace have diminished Stallman's leadership role in some areas while augmenting it in others. Finally, Free as in Freedom examines both Stallman and the free software movement from historical viewpoint. Will future generations see Stallman as a genius or crackpot? The answer to that question depends partly on which side of the free software debate the reader currently stands and partly upon the reader's own outlook for the future. 100 years from now, when terms such as "computer," "operating system" and perhaps even "software" itself seem hopelessly quaint, will Richard Stallman's particular vision of freedom still resonate, or will it have taken its place alongside other utopian concepts on the 'ash-heap of history?'




Nightwork, updated edition


Book Description

A lively introduction to MIT hacks, from the police car on the Great Dome to the abduction of the Caltech cannon. An MIT "hack" is an ingenious, benign, and anonymous prank or practical joke, often requiring engineering or scientific expertise and often pulled off under cover of darkness—instances of campus mischief sometimes coinciding with April Fool's Day, final exams, or commencement. (It should not be confused with the sometimes non-benign phenomenon of computer hacking.) Noteworthy MIT hacks over the years include the legendary Harvard–Yale Football Game Hack (when a weather balloon emblazoned “MIT” popped out of the ground near the 50-yard line), the campus police car found perched on the Great Dome, the apparent disappearance of the Institute president's office, and a faux cathedral (complete with stained glass windows, organ, and wedding ceremony) in a lobby. Hacks are by their nature ephemeral, although they live on in the memory of both perpetrators and spectators. Nightwork, drawing on the MIT Museum's unique collection of hack-related photographs and other materials, describes and documents the best of MIT's hacks and hacking culture. This generously illustrated updated edition has added coverage of such recent hacks as the cross-country abduction of rival Caltech's cannon (a prank requiring months of planning, intricate choreography, and last-minute improvisation), a fire truck on the Dome that marked the fifth anniversary of 9/11, and numerous pokes at the celebrated Frank Gehry-designed Stata Center, and even a working solar-powered Red Line subway car on the Great Dome. Hacks have been said to express the essence of MIT, providing, as alumnus Andre DeHon observes, "an opportunity to demonstrate creativity and know-how in mastering the physical world." What better way to mark the 150th anniversary of MIT's founding than to commemorate its native ingenuity with this new edition of Nightwork?




Teaching Machines


Book Description

How ed tech was born: Twentieth-century teaching machines--from Sidney Pressey's mechanized test-giver to B. F. Skinner's behaviorist bell-ringing box. Contrary to popular belief, ed tech did not begin with videos on the internet. The idea of technology that would allow students to "go at their own pace" did not originate in Silicon Valley. In Teaching Machines, education writer Audrey Watters offers a lively history of predigital educational technology, from Sidney Pressey's mechanized positive-reinforcement provider to B. F. Skinner's behaviorist bell-ringing box. Watters shows that these machines and the pedagogy that accompanied them sprang from ideas--bite-sized content, individualized instruction--that had legs and were later picked up by textbook publishers and early advocates for computerized learning. Watters pays particular attention to the role of the media--newspapers, magazines, television, and film--in shaping people's perceptions of teaching machines as well as the psychological theories underpinning them. She considers these machines in the context of education reform, the political reverberations of Sputnik, and the rise of the testing and textbook industries. She chronicles Skinner's attempts to bring his teaching machines to market, culminating in the famous behaviorist's efforts to launch Didak 101, the "pre-verbal" machine that taught spelling. (Alternate names proposed by Skinner include "Autodidak," "Instructomat," and "Autostructor.") Telling these somewhat cautionary tales, Watters challenges what she calls "the teleology of ed tech"--the idea that not only is computerized education inevitable, but technological progress is the sole driver of events.




Underground


Book Description

Suelette Dreyfus and her co-author, WikiLeaks founder Julian Assange, tell the extraordinary true story of the computer underground, and the bizarre lives and crimes of an elite ring of international hackers who took on the establishment. Spanning three continents and a decade of high level infiltration, they created chaos amongst some of the world's biggest and most powerful organisations, including NASA and the US military. Brilliant and obsessed, many of them found themselves addicted to hacking and phreaking. Some descended into drugs and madness, others ended up in jail. As riveting as the finest detective novel and meticulously researched, Underground follows the hackers through their crimes, their betrayals, the hunt, raids and investigations. It is a gripping tale of the digital underground.