Jump to ratings and reviews
Rate this book

Computer Underground

Rate this book
Computer crime is a serious and growing problem for businesses, governments and individuals. The standard way of dealing with this problem is to ignore it and hope it goes away. In The Computer Underground, M. Harry takes a different approach, blowing the lid off an underground network of computer criminals.

M. Harry has gone deep into the computer underground to find the networks and bulletin boards where high-tech criminals trade secrets and boast of their crimes. This book is a result of that search -- a detailed description of who’s doing what, why they’re doing it, and HOW they’re doing it.

You’ll learn about phreaking, the techniques used to break into phone lines for free long-distance service. You’ll learn about piracy, the theft of software and other valuable information. And you’ll learn all about hacking, breaking into “secure” computer systems for mayhem or personal gain.

The Computer Underground is a fascinating, frightening "behind-the- screens” look into the murky world of computer crime.

"The Computer Underground is a highly detailed and close-up look at computer hacking, piracy, phreaking and crime." -- Popular Communications

"Provides valuable insight into how the computer underground fosters itself" -- Computer Book Review

257 pages, Paperback

First published December 1, 1985

25 people want to read

About the author

M. Harry

4 books

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
0 (0%)
4 stars
1 (100%)
3 stars
0 (0%)
2 stars
0 (0%)
1 star
0 (0%)
Displaying 1 of 1 review
Profile Image for David.
1,173 reviews64 followers
December 11, 2021
Computer Underground is a nostalgic trip back to the days when server and telephony security was lax, and having a two-hour thought lead over others was all it took to gain access to a box, and increase your access once there. The book is gloriously out-of-date, and is as useless today as it is detailed and specific (so... many... phone numbers...). Even at time of publishing (1985), the days of blue box'n were numbered (if not gone).

The author wrote the first 50 pages, which has terms and definitions, transcripts of ARPANET and TELENET logins, etc. But the remaining 80% of the pages consist of documents that were posted online, many of which are presented in all-caps, dot-matrix print. The Flying Penguin's "BULLSH*TTING THE OPERATOR!" guide to social engineering is a good read (which he wrote using Bank Street Writer :D ). There's even some Apple II type-in modem hacking programs towards the end.
Displaying 1 of 1 review

Can't find what you're looking for?

Get help and learn more about the design.