Computer Terror and Distruction Issue #1 – BBS Infiltration _____By the Chamelion
>This article starts of the first issue of Computer Terror and Distruction. Each issue will deal with a particular area of computer distruction, dealing mostly with different ways to fuck over computers.
>A number of myths have popped up recently about the threat of computer “viruses”. There are myths about how widespread they are, how dangerous they are, and even myths about what a computer virus really is. We’d like the facts to be known.
Back in the mid-1960s, at the height of the cold war, the U. S. Department of Defense faced a tough question: How could orders be issued to the armed forces if the U.S. were ravaged by a nuclear assault? The communication hubs in place at the time the telephone switching offices and the radio and TV broadcast stations were not only vulnerable to attack, they would also probably be the first to go. The Pentagon needed a military command-and-control system that would continue to operate even if most of the phone lines were in tatters and the switches had melted down.
On March 1 1990, the offices of Steve Jackson Games, in Austin, Texas, were raided by the U.S. Secret Service as part of a nationwide investigation of data piracy. The initial news stories simply reported that the Secret Service had raided a suspected ring of hackers. Gradually, the true story emerged.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.