Description of the PDF
PINKMACHINEThe Pink Machine Papers
1167-speakinganonymously.pdf 865466
Speaking Anonymously in Public: A Hacker's Guide, by Pope Alan Bradley I (The Space Pope)
173610409.pdf 5911550
Leave Any Noise at the Signal Participation Art Online, by Amber Frid-Jiminez (June 1997)
2003-05.pdf 423081
Copyright and Digital Media in a Post-Napster World, by GartnerG2 and The Berkman Center for Interney and Society at Harvard Law School (2003)
4chan.pdf 3041201
4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community, by Michael S. Bernstein, Andres Monroy-Hernandez, Drew Harry, Paul Andre, Katrina Panovich and Greg Vargas (2011)
532882.pdf 569426
Copyright's Communication Policy, by Timothy Wu: Issues of 21st Century Copyright (2003)
573-paper_wargames_e.pdf 552629
Wargames - Hackers are Gaming: Male Identiry Construction and Playful Approaches to Computers, by Francis Hunger (May, 2005)
83.1.coleman.pdf 635455
Anthropological Perspectives on Knowledge in the Digital Age: The Hacker Conference: A Ritual Condensation and Celebration of a Lifeworld. By Gabriella Coleman, New York University. (2010)
bell_origin_of_the_computer_history_museum_v2.pdf 471283
Out of a Closet: The Early Years of the Computer Museum, by Gordon Bell (April 4, 2011)
bestpractices.pdf 160659
Why Phishing Works, by Rachna Dhamija, J.D. Tygar, and Marti Hearst (2006)
bogost_montfort_dac_2009.pdf 1366071
Platform Studies: Frequently Question Answers, by Ian Bogost and Nick Montfort (2009)
bush04.pdf 1595682
U.S. Commission on Civil Rights: Office of Civil Rights Evaluation: Redefining Rights in America: The Civil Rights Record of the George W. Bush Administration 2001-2004 (Redacted Negative Review of Bush Presidency) (2004)
castronovavw.pdf 400517
Virtual Worlds: A First-Hand Account of Market and Society on the Cyberian Frontier, by Edward Castronova (December, 2001)
coleman-code-is-speech.pdf 2394756
Code is Speech: Legal Tinkering, Expertise, and Protest among Free and Open Source Software Developers, by Gabriella Coleman
compromising_voice_messaging.pdf 136001
Comprimising Voice Messaging Systems by Kingpin of @Stake Version 1.0
conley.pdf 371884
Use of a Game Over: Emulation and the Video Game Industry, a White Paper, by James Conley, Ed Andros, Priti Chinai, Elise Lipkowitz and David Perez (Spring, 2004)
copyright-wu.pdf 569426
Copyright's Communications Policy, by Timothy Wu (2004)
cscw2004-swg.pdf 971319
The Social Side of Gaming: A Study of Interaction Patterns in a Massively Multiplayer Online Game, by Nicolas Ducheneaut and Robert J. Moore (2004)
cyberinsecurity.pdf 899959
CyberInsecurity: The Cost of Monopoly - How the Dominance of Microsoft's Products Poses a Risk to Security, by Dan Geer, Rebecca Bace, Puter Gutmann, Perry Metzger, Charles P. Pfleeger, John S. Quarterman, and Bruce Schneier (September 24, 2003)
ddr-case-history-chan.pdf 382425
CPR for the Arcade Culture: A Case History on the Development of the Dance Dance Revolution Community, by Alexander Chan (March 16, 2004)
demoscene.pdf 104498
The Hacker Demo Scene and its Cultural Artifacts, by George Borzyskowski (1995)
dopewars-gunday.pdf 641044
Dope Wars and PDAs: The Technophile Drug Dealers have Finally Found Their Platform - An STS/HCI/Business Review by Honor Gunday for STS145 (2004)
elaine.pdf 86333
An Option Value Problem from Seinfeld by Avinash Dixit, Princeton University (June 12, 2010)
groksteroa.pdf 145725
Trasncript of the Grokster Case, aka Metro-Goldwyn-Mayer Studios v. Grokster, No 04-480 (March, 2005)
hackers_enemies.pdf 9933
Hackers are Indeed Enemies: A Rebuttal of Chris Goggans' 1992 Viewpoint, by M.E. Kabay, Ph.D. (1992)
hiddencams.pdf 264308
How to Find Hidden Cameras, by Marc Roessler (March 25, 2002)
iamcr2011_mckinnon.pdf 178121
What Teletex can Teach Us, by Jay McKinnon (June 3, 2011)
infocom-paper.pdf 9483228
Down from the Top of Its Game: The Story of Infocom, Inc. by Hector Briceno, Wesley Chao, Andrew Glenn, Stanley Hu, Ashwin Krishnarmurthy, and Bruce Tsuchida (December 15, 2000)
infocom.pdf 56985
Collecting and Preserving Infocom Interactive Fiction, by Adam Mathes (Theoretical Paper for the Rare Books and Special Collections Class, University of Illinois Urbana-Champaign) (Summer, 2004)
iqp-dmo3263-paper.pdf 582558
Oral History Documentary: An Interview with Brian Moriarty (February 29, 2008)
kiddon11.pdf 163653
That's What She Said: Double Entendre Identification, by Chlee Kiddon and Yuriy Brun, Computer Science & Engineering, University of Washington (2011)
lakhaniwolf.pdf 69376
Why Hackers Do What They Do: Understanding Motivation and Effort in Free/Open Source Software Porjects, by Karim R. Lakhani and Robert G. Wolf (2005)
liwenjin2008.pdf 4633640
Chinese Online BBS Sphere: What BBS Has Brought to China, by Liwen Jin (2005)
lj56-2_mason_article.pdf 109712
Chinese Online BBS Sphere: What BBS Has Brought to China, by Liwen Jin (2005)
longdistancelearning.pdf 147793
Bulletin Board Software suitable for Long Distance Learning, by Anneliese Sessa (1989)
This paper describes the advantages of using computer bulletin boards systems (BBS) for distance learning, including the use of the New York City Education Network (NYCENET) to access various databases and to communicate with individuals or the public. Questions to be answered in order to determine the most appropriate software for running a BBS are listed; and the following public domain and shareware BBS software packages suitable for setting up a BBS for long distance learning are reviewed: Magpie, QBBS, PC Board, RBBS, and Opus. One commercial program--The Bread Board System (TBBS)--is also considered. A 1992 update of the information presented in this paper is appended. (ALF)
mhargadon-thesis.pdf 3827814
Like City Lights, Receding: ANSi Artwork and the Digital Underground, 1985-2000 by Michael A. Hargadon (October 23, 2010)
mitchell_montfort_dac_2009.pdf 3333857
Shaping Stories and Building Worlds on Interactive Fiction Platforms, by Alex Mitchell, and Nick Montfort
mk.pdf 4048665
Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks, by Matt Blaze, AT&T Labs - Research (September 15, 2002)
moviesecvulnerable3.pdf 312231
Analysis of Security Vulnerabilites in the Movie Production and Distribution Process, by Simon Byers, Lorrie Cranor, Dave Kormann, Patrick McDaniel, and Eric Cronin (September 13, 2003)
msj.pdf 771541
Measuring and Analyzing the Characteristics of Napster and Gnutella Hosts, by Stefan Sarofu, Krishna P. Gummadi, and Steven D. Gribble, Department of Computer Science and Engineering, University of Washington (November, 2003)
online-software-piracy-of-the-last-millennium-1_0.pdf 130355
Online Software Piracy of the Last Millennium by Ben Garrett aka Ipggi
online_underground.pdf 475474
Online, Underground: The Untold Story of the Original Social Media Revolution, by Mehan Jayasuriya (2014)
pacman-tsiricos.pdf 751046
One Flew Over the Pacman's Nest: An Authoritative Study on Emulators and the Problems that they Pose in Relation to Intellectual Property Rights, by Takis Tsiricos (October 1, 2000)
pauschacademicsfieldguidetoea.pdf 288930
An Academics' Guide to Electronic Arts: Observations based on a residency in the spring semester of 2004, by Randy Pausch (2004)
pixelpaper.pdf 5287781
Pixel Patchwork: Quilting in Time Online, by Brenda Danet (2003)
politicscc-rehn.pdf 112075
The Politics of Contraband: The Honor Economies of the Warez Scene, by Alf Rehn, Department of Industrial Management, Royal Institute of Technology, Stockholm, Sweden (December, 2003)
pvw.finalreport.pdf 23002480
Preserving Virtual Worlds: Final Report, by Jerome McDonough & Robert Olendorf (August 31, 2010)
reunanen-licthesis.pdf 16933116
Computer Demos: What Makes them Tick? by Markku Reunanen (April 23, 2010)
rhizome-dpp.pdf 1008980
Digital Preservation Practices and the Rhizome Artbase by Ben Fino-Radin, Digital Conservator, Rhizome at the New Museum (2011)
safelocks.pdf 2744004
Safecracking for the Computer Scientist, by Matt Blaze, Department of Computer and Information Science, University of Pennsylvania (December 20, 2004)
sessa-artcitybbs.pdf 106019
Results of the Art in the City Project - Art in the City and Telecommunications, by Anneliese Sessa. (September, 1990)This student project involved publishing the author's log of art museum and gallery visits, undertaken as part of a liberal arts class, on some of the computer bulletin boards in the New York City area. Purposes of the project were to share what was learned in the class, to acquire experience with online group interaction, and to determine what is available in the areas of art or culture on these bulletin boards or online services. Five systems were investigated: (1) NYCENET (New York City Educational Network); (2) Learning Link, run by WNET channel 13 educational services; (3) CompuServe, a commercial database service; (4) Design Line, a private local bulletin board for graphic designers and artists; and (5) ECHO, a private bulletin board message base. (ALF)
shoulderdrift.pdf 174860
Shoulder Rumble Strips: A Method to Alert "Drifting" Drivers, by Neal E. Wood, P.E. Bridge Engineer (Retired) (January, 1994)
Academic Paper from Neal Wood, inventor of the "Rumble Strip", those indentations in the sides of roads that cause a loud noise if the car drifts over them. I know that my own life has been saved by this invention, and there must be many others. Mr. Wood's contribution is much appreciated.
sigis_d04_2.01_ntnu1.pdf 489390
The Gathering: Computer Parties as Means for Gender Inclusion, by Hege Nordli (July 31, 2003)
ssrn-id1760151.pdf 867371
Sealand, HavenCo, and the Rule of Law by James Grimmelmann
ssrn-id805287.pdf 2372223
Three Ethical Moments in Debian by E. Gabriella Coleman
stig.pdf 1881759
The Hackers of New York City, by Stig Lennart Sørensen (May, 2003)
the_human_impact_on_planet_earth.pdf 7005947
The Human Impact on Planet Earth, from Foundation for the Future
thephotographersright.pdf 143964
The Photographer's Rights
warezchallenges.pdf 50312
The Challenges of Regulating Warez Trading by Eric Goldman, Marquette University Law School (2005)
warezcriminalcopyright.pdf 620755
Warez Trading and Criminal Copyright Infringement, by Eric Goldman (February 10, 2004)
whowrotesobig.pdf 304386
Who Wrote Sobig? Version 1.3 ("Sanitized for Public Release") (Anonymous Authors) (November 1, 2004)
why_phishing_works.pdf 871645
Why Phishing Works, by Rachna Dhamija, J.D. Tygar, and Marti Hearst (2006)
wifibedouin.pdf 1474432
WiFi.Bedouin, by Julian Bleecker: The Portable Wi-Fi Network (March, 2004)
willfairusesurvive.pdf 2226124
Will Fair Use Survive? Free Expression in the Age of Copyright Control by Marjorie Heins and Tricia Beckles of the Brennan Center for Justice (2005)
wilyhacker.pdf 209648
Stalking the Wily Hacker, by Clifford Stoll, ACM (May, 1988)

There are 64 files for a total of 120,222,881 bytes.
There is 1 directory.