Filename |
Size |
Description of the PDF |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
PINKMACHINEThe Pink Machine Papers | | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1167-speakinganonymously.pdf 865466 | Speaking Anonymously in Public: A Hacker's Guide, by Pope Alan Bradley I (The Space Pope)
| 173610409.pdf | 5911550 | Leave Any Noise at the Signal Participation Art Online, by Amber Frid-Jiminez (June 1997)
| 2003-05.pdf | 423081 | Copyright and Digital Media in a Post-Napster World, by GartnerG2 and The Berkman Center for Interney and Society at Harvard Law School (2003)
| 4chan.pdf | 3041201 | 4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community, by Michael S. Bernstein, Andres Monroy-Hernandez, Drew Harry, Paul Andre, Katrina Panovich and Greg Vargas (2011)
| 532882.pdf | 569426 | Copyright's Communication Policy, by Timothy Wu: Issues of 21st Century Copyright (2003)
| 573-paper_wargames_e.pdf | 552629 | Wargames - Hackers are Gaming: Male Identiry Construction and Playful Approaches to Computers, by Francis Hunger (May, 2005)
| 83.1.coleman.pdf | 635455 | Anthropological Perspectives on Knowledge in the Digital Age: The Hacker Conference: A Ritual Condensation and Celebration of a Lifeworld. By Gabriella Coleman, New York University. (2010)
| bell_origin_of_the_computer_history_museum_v2.pdf | 471283 | Out of a Closet: The Early Years of the Computer Museum, by Gordon Bell (April 4, 2011)
| bestpractices.pdf | 160659 | Why Phishing Works, by Rachna Dhamija, J.D. Tygar, and Marti Hearst (2006)
| bogost_montfort_dac_2009.pdf | 1366071 | Platform Studies: Frequently Question Answers, by Ian Bogost and Nick Montfort (2009)
| bush04.pdf | 1595682 | U.S. Commission on Civil Rights: Office of Civil Rights Evaluation: Redefining Rights in America: The Civil Rights Record of the George W. Bush Administration 2001-2004 (Redacted Negative Review of Bush Presidency) (2004)
| castronovavw.pdf | 400517 | Virtual Worlds: A First-Hand Account of Market and Society on the Cyberian Frontier, by Edward Castronova (December, 2001)
| coleman-code-is-speech.pdf | 2394756 | Code is Speech: Legal Tinkering, Expertise, and Protest among Free and Open Source Software Developers, by Gabriella Coleman
| compromising_voice_messaging.pdf | 136001 | Comprimising Voice Messaging Systems by Kingpin of @Stake Version 1.0
| conley.pdf | 371884 | Use of a Game Over: Emulation and the Video Game Industry, a White Paper, by James Conley, Ed Andros, Priti Chinai, Elise Lipkowitz and David Perez (Spring, 2004)
| copyright-wu.pdf | 569426 | Copyright's Communications Policy, by Timothy Wu (2004)
| cscw2004-swg.pdf | 971319 | The Social Side of Gaming: A Study of Interaction Patterns in a Massively Multiplayer Online Game, by Nicolas Ducheneaut and Robert J. Moore (2004)
| cyberinsecurity.pdf | 899959 | CyberInsecurity: The Cost of Monopoly - How the Dominance of Microsoft's Products Poses a Risk to Security, by Dan Geer, Rebecca Bace, Puter Gutmann, Perry Metzger, Charles P. Pfleeger, John S. Quarterman, and Bruce Schneier (September 24, 2003)
| ddr-case-history-chan.pdf | 382425 | CPR for the Arcade Culture: A Case History on the Development of the Dance Dance Revolution Community, by Alexander Chan (March 16, 2004)
| demoscene.pdf | 104498 | The Hacker Demo Scene and its Cultural Artifacts, by George Borzyskowski (1995)
| dopewars-gunday.pdf | 641044 | Dope Wars and PDAs: The Technophile Drug Dealers have Finally Found Their Platform - An STS/HCI/Business Review by Honor Gunday for STS145 (2004)
| elaine.pdf | 86333 | An Option Value Problem from Seinfeld by Avinash Dixit, Princeton University (June 12, 2010)
| groksteroa.pdf | 145725 | Trasncript of the Grokster Case, aka Metro-Goldwyn-Mayer Studios v. Grokster, No 04-480 (March, 2005)
| hackers_enemies.pdf | 9933 | Hackers are Indeed Enemies: A Rebuttal of Chris Goggans' 1992 Viewpoint, by M.E. Kabay, Ph.D. (1992)
| hiddencams.pdf | 264308 | How to Find Hidden Cameras, by Marc Roessler (March 25, 2002)
| iamcr2011_mckinnon.pdf | 178121 | What Teletex can Teach Us, by Jay McKinnon (June 3, 2011)
| infocom-paper.pdf | 9483228 | Down from the Top of Its Game: The Story of Infocom, Inc. by Hector Briceno, Wesley Chao, Andrew Glenn, Stanley Hu, Ashwin Krishnarmurthy, and Bruce Tsuchida (December 15, 2000)
| infocom.pdf | 56985 | Collecting and Preserving Infocom Interactive Fiction, by Adam Mathes (Theoretical Paper for the Rare Books and Special Collections Class, University of Illinois Urbana-Champaign) (Summer, 2004)
| iqp-dmo3263-paper.pdf | 582558 | Oral History Documentary: An Interview with Brian Moriarty (February 29, 2008)
| kiddon11.pdf | 163653 | That's What She Said: Double Entendre Identification, by Chlee Kiddon and Yuriy Brun, Computer Science & Engineering, University of Washington (2011)
| lakhaniwolf.pdf | 69376 | Why Hackers Do What They Do: Understanding Motivation and Effort in Free/Open Source Software Porjects, by Karim R. Lakhani and Robert G. Wolf (2005)
| liwenjin2008.pdf | 4633640 | Chinese Online BBS Sphere: What BBS Has Brought to China, by Liwen Jin (2005)
| lj56-2_mason_article.pdf | 109712 | Chinese Online BBS Sphere: What BBS Has Brought to China, by Liwen Jin (2005)
| longdistancelearning.pdf | 147793 | Bulletin Board Software suitable for Long Distance Learning, by Anneliese Sessa (1989) | This paper describes the advantages of using computer bulletin boards systems (BBS) for distance learning, including the use of the New York City Education Network (NYCENET) to access various databases and to communicate with individuals or the public. Questions to be answered in order to determine the most appropriate software for running a BBS are listed; and the following public domain and shareware BBS software packages suitable for setting up a BBS for long distance learning are reviewed: Magpie, QBBS, PC Board, RBBS, and Opus. One commercial program--The Bread Board System (TBBS)--is also considered. A 1992 update of the information presented in this paper is appended. (ALF) mhargadon-thesis.pdf | 3827814 | Like City Lights, Receding: ANSi Artwork and the Digital Underground, 1985-2000 by Michael A. Hargadon (October 23, 2010)
| mitchell_montfort_dac_2009.pdf | 3333857 | Shaping Stories and Building Worlds on Interactive Fiction Platforms, by Alex Mitchell, and Nick Montfort
| mk.pdf | 4048665 | Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks, by Matt Blaze, AT&T Labs - Research (September 15, 2002)
| moviesecvulnerable3.pdf | 312231 | Analysis of Security Vulnerabilites in the Movie Production and Distribution Process, by Simon Byers, Lorrie Cranor, Dave Kormann, Patrick McDaniel, and Eric Cronin (September 13, 2003)
| msj.pdf | 771541 | Measuring and Analyzing the Characteristics of Napster and Gnutella Hosts, by Stefan Sarofu, Krishna P. Gummadi, and Steven D. Gribble, Department of Computer Science and Engineering, University of Washington (November, 2003)
| online-software-piracy-of-the-last-millennium-1_0.pdf | 130355 | Online Software Piracy of the Last Millennium by Ben Garrett aka Ipggi
| online_underground.pdf | 475474 | Online, Underground: The Untold Story of the Original Social Media Revolution, by Mehan Jayasuriya (2014)
| pacman-tsiricos.pdf | 751046 | One Flew Over the Pacman's Nest: An Authoritative Study on Emulators and the Problems that they Pose in Relation to Intellectual Property Rights, by Takis Tsiricos (October 1, 2000)
| pauschacademicsfieldguidetoea.pdf | 288930 | An Academics' Guide to Electronic Arts: Observations based on a residency in the spring semester of 2004, by Randy Pausch (2004)
| pixelpaper.pdf | 5287781 | Pixel Patchwork: Quilting in Time Online, by Brenda Danet (2003)
| politicscc-rehn.pdf | 112075 | The Politics of Contraband: The Honor Economies of the Warez Scene, by Alf Rehn, Department of Industrial Management, Royal Institute of Technology, Stockholm, Sweden (December, 2003)
| pvw.finalreport.pdf | 23002480 | Preserving Virtual Worlds: Final Report, by Jerome McDonough & Robert Olendorf (August 31, 2010)
| reunanen-licthesis.pdf | 16933116 | Computer Demos: What Makes them Tick? by Markku Reunanen (April 23, 2010)
| rhizome-dpp.pdf | 1008980 | Digital Preservation Practices and the Rhizome Artbase by Ben Fino-Radin, Digital Conservator, Rhizome at the New Museum (2011)
| safelocks.pdf | 2744004 | Safecracking for the Computer Scientist, by Matt Blaze, Department of Computer and Information Science, University of Pennsylvania (December 20, 2004)
| sessa-artcitybbs.pdf | 106019 | Results of the Art in the City Project - Art in the City and Telecommunications, by Anneliese Sessa. (September, 1990)This student project involved publishing the author's log of art museum and gallery visits, undertaken as part of a liberal arts class, on some of the computer bulletin boards in the New York City area. Purposes of the project were to share what was learned in the class, to acquire experience with online group interaction, and to determine what is available in the areas of art or culture on these bulletin boards or online services. Five systems were investigated: (1) NYCENET (New York City Educational Network); (2) Learning Link, run by WNET channel 13 educational services; (3) CompuServe, a commercial database service; (4) Design Line, a private local bulletin board for graphic designers and artists; and (5) ECHO, a private bulletin board message base. (ALF)
| shoulderdrift.pdf | 174860 | Shoulder Rumble Strips: A Method to Alert "Drifting" Drivers, by Neal E. Wood, P.E. Bridge Engineer (Retired) (January, 1994) | Academic Paper from Neal Wood, inventor of the "Rumble Strip", those indentations in the sides of roads that cause a loud noise if the car drifts over them. I know that my own life has been saved by this invention, and there must be many others. Mr. Wood's contribution is much appreciated. sigis_d04_2.01_ntnu1.pdf | 489390 | The Gathering: Computer Parties as Means for Gender Inclusion, by Hege Nordli (July 31, 2003)
| ssrn-id1760151.pdf | 867371 | Sealand, HavenCo, and the Rule of Law by James Grimmelmann
| ssrn-id805287.pdf | 2372223 | Three Ethical Moments in Debian by E. Gabriella Coleman
| stig.pdf | 1881759 | The Hackers of New York City, by Stig Lennart Sørensen (May, 2003)
| the_human_impact_on_planet_earth.pdf | 7005947 | The Human Impact on Planet Earth, from Foundation for the Future
| thephotographersright.pdf | 143964 | The Photographer's Rights
| warezchallenges.pdf | 50312 | The Challenges of Regulating Warez Trading by Eric Goldman, Marquette University Law School (2005)
| warezcriminalcopyright.pdf | 620755 | Warez Trading and Criminal Copyright Infringement, by Eric Goldman (February 10, 2004)
| whowrotesobig.pdf | 304386 | Who Wrote Sobig? Version 1.3 ("Sanitized for Public Release") (Anonymous Authors) (November 1, 2004)
| why_phishing_works.pdf | 871645 | Why Phishing Works, by Rachna Dhamija, J.D. Tygar, and Marti Hearst (2006)
| wifibedouin.pdf | 1474432 | WiFi.Bedouin, by Julian Bleecker: The Portable Wi-Fi Network (March, 2004)
| willfairusesurvive.pdf | 2226124 | Will Fair Use Survive? Free Expression in the Age of Copyright Control by Marjorie Heins and Tricia Beckles of the Brennan Center for Justice (2005)
| wilyhacker.pdf | 209648 | Stalking the Wily Hacker, by Clifford Stoll, ACM (May, 1988)
| |
There are 64 files for a total of 120,222,881 bytes. |
There is 1 directory. |