{"title":"Downloads","description":"","products":[{"product_id":"the-hacker-digest-volume-30-pdf","title":"The Hacker Digest - Volume 30 (PDF)","description":"\u003cp\u003eThis is a compendium of articles from Volume 30 of 2600 Magazine (2013), rearranged in book form and totaling nearly 300 pages of material.\u003c\/p\u003e\n\u003cp\u003eThe PDF version contains all of the graphics, along with enhanced cover pages, a full payphone photo spread in the middle, and a collection of all of the back cover photos.\u003c\/p\u003e\n\u003cp\u003eFor the PDF version, click the order button above.\u003c\/p\u003e\n\u003cp\u003eTo get the Kindle and Nook versions of this volume, click \u003ca href=\"http:\/\/www.2600.com\/magazine\/digital-digests.html\"\u003ehere.\u003c\/a\u003e\u003c\/p\u003e\nWant to get ALL of the digests, past, present, and future? Consider the \u003ca href=\"\/collections\/pdf\/products\/the-hacker-digest-lifetime-pdf\"\u003elifetime plan.\u003c\/a\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1222915501,"sku":"","price":9.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/cover_Vol_30.jpg?v=1429828638"},{"product_id":"the-hacker-digest-volume-29-pdf","title":"The Hacker Digest - Volume 29 (PDF)","description":"\u003cp\u003eThis is a compendium of articles from Volume 29 of 2600 Magazine (2012), rearranged in book form and totaling nearly 300 pages of material.\u003c\/p\u003e\n\u003cp\u003eThe PDF version contains all of the graphics, along with enhanced cover pages, a full payphone photo spread in the middle, and a collection of all of the back cover photos.\u003c\/p\u003e\n\u003cp\u003eFor the PDF version, click the order button above.\u003c\/p\u003e\n\u003cp\u003eTo get the Kindle and Nook versions of this volume, click \u003ca href=\"http:\/\/www.2600.com\/magazine\/digital-digests.html\"\u003ehere.\u003c\/a\u003e\u003c\/p\u003e\nWant to get ALL of the digests, past, present, and future? Consider the \u003ca href=\"\/collections\/pdf\/products\/the-hacker-digest-lifetime-pdf\"\u003elifetime plan.\u003c\/a\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1222922005,"sku":"","price":9.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/cover_Vol_29_small_a6e9b9e5-ddf8-4795-b851-3a48300fa114.jpg?v=1429830054"},{"product_id":"the-hacker-digest-volume-28-pdf","title":"The Hacker Digest - Volume 28 (PDF)","description":"\u003cp\u003eThis is a compendium of articles from Volume 28 of 2600 Magazine (2011), rearranged in book form and totaling nearly 300 pages of material.\u003c\/p\u003e\n\u003cp\u003eThe PDF version contains all of the graphics, along with enhanced cover pages, a full payphone photo spread in the middle, and a collection of all of the back cover photos.\u003c\/p\u003e\n\u003cp\u003eFor the PDF version, click the order button above.\u003c\/p\u003e\n\u003cp\u003eTo get the Kindle and Nook versions of this volume, click \u003ca href=\"http:\/\/www.2600.com\/magazine\/digital-digests.html\"\u003ehere.\u003c\/a\u003e\u003c\/p\u003e\n\u003cp\u003eWant to get ALL of the digests, past, present, and future? Consider the \u003ca href=\"\/collections\/pdf\/products\/the-hacker-digest-lifetime-pdf\"\u003elifetime plan.\u003c\/a\u003e\u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1222923065,"sku":"","price":9.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/2600__The_Hacker_Digest_-_Volume_28_-_2600_Enterprises.jpg?v=1429830320"},{"product_id":"the-hacker-digest-volume-27-pdf","title":"The Hacker Digest - Volume 27 (PDF)","description":"\u003cp\u003eThis is a compendium of articles from Volume 27 of 2600 Magazine (2010), rearranged in book form and totaling nearly 300 pages of material.\u003cbr\u003e\u003cbr\u003eThe PDF version contains all of the graphics, along with enhanced cover pages, a full payphone photo spread in the middle, and a collection of all of the back cover photos.\u003c\/p\u003e\n\u003cp\u003eFor the PDF version, click the order button above.\u003c\/p\u003e\n\u003cp\u003eTo get the Kindle and Nook versions of this volume, click \u003ca href=\"http:\/\/www.2600.com\/magazine\/digital-digests.html\"\u003ehere.\u003c\/a\u003e\u003c\/p\u003e\n\u003cp\u003eWant to get ALL of the digests, past, present, and future? Consider the \u003ca href=\"\/collections\/pdf\/products\/the-hacker-digest-lifetime-pdf\"\u003elifetime plan.\u003c\/a\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1222923797,"sku":"","price":9.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/2600__The_Hacker_Digest_-_Volume_27_-_2600_Enterprises.jpg?v=1429830774"},{"product_id":"the-hacker-digest-volume-26-pdf","title":"The Hacker Digest - Volume 26 (PDF)","description":"\u003cp\u003eThis is a compendium of articles from Volume 26 of 2600 Magazine (2009), rearranged in book form and totaling nearly 300 pages of material.\u003cbr\u003e\u003cbr\u003eThe PDF version contains all of the graphics, along with enhanced cover pages, a full payphone photo spread in the middle, and a collection of all of the back cover photos.\u003c\/p\u003e\n\u003cp\u003eFor the PDF version, click the order button above.\u003c\/p\u003e\n\u003cp\u003eTo get the Kindle and Nook versions of this volume, click \u003ca href=\"http:\/\/www.2600.com\/magazine\/digital-digests.html\"\u003ehere.\u003c\/a\u003e\u003c\/p\u003e\nWant to get ALL of the digests, past, present, and future? Consider the \u003ca href=\"\/collections\/pdf\/products\/the-hacker-digest-lifetime-pdf\"\u003elifetime plan.\u003c\/a\u003e\n\u003cp\u003e \u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1222925153,"sku":"","price":9.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/digest_2010_cover_kindle4.jpg?v=1429831015"},{"product_id":"the-hacker-digest-volume-25-pdf","title":"The Hacker Digest - Volume 25 (PDF)","description":"\u003cp\u003eThis is a compendium of articles from Volume 25 of 2600 Magazine (2008), rearranged in book form and totaling nearly 300 pages of material.\u003cbr\u003e\u003cbr\u003eThe PDF version contains all of the graphics, along with enhanced cover pages, a full payphone photo spread in the middle, and a collection of all of the back cover photos.\u003c\/p\u003e\n\u003cp\u003eFor the PDF version, click the order button above.\u003c\/p\u003e\n\u003cp\u003eTo get the Kindle and Nook versions of this volume, click \u003ca href=\"http:\/\/www.2600.com\/magazine\/digital-digests.html\"\u003ehere.\u003c\/a\u003e\u003c\/p\u003e\n\u003cp\u003eWant to get ALL of the digests, past, present, and future? Consider the \u003ca href=\"\/collections\/pdf\/products\/the-hacker-digest-lifetime-pdf\"\u003elifetime plan.\u003c\/a\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1222926073,"sku":"","price":9.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/cover_Vol_25.jpg?v=1429831237"},{"product_id":"the-hacker-digest-volume-6-pdf","title":"The Hacker Digest - Volume 06 (PDF)","description":"\u003cp\u003eThis is a compendium of articles from Volume 6 of 2600 Magazine, originally published in 1989.\u003cbr\u003e\u003cbr\u003eThe PDF version contains all of the original articles, graphics, lists of data, along with never before published explanations of the cover pages, and what significant events were going on at the time.\u003cbr\u003e\u003cbr\u003eWe've done this at very high quality, which means the file size is around 84 megs. This allows you to zoom in on some of our microscopic type and find the occasional hidden message, as well as be assured of never having a crappy looking scan.\u003c\/p\u003e\n\u003cp\u003eWant to get ALL of the digests, past, present, and future? Consider the \u003ca href=\"\/collections\/pdf\/products\/the-hacker-digest-lifetime-pdf\"\u003elifetime plan.\u003c\/a\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1222927089,"sku":"","price":6.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/Volume6cover.jpg?v=1429831617"},{"product_id":"the-hacker-digest-volume-5-pdf","title":"The Hacker Digest - Volume 05 (PDF)","description":"\u003cp\u003eThis is a compendium of articles from Volume 5 of 2600 Magazine, originally published in 1988. This was the first year that we went quarterly.\u003cbr\u003e\u003cbr\u003eThe PDF version contains all of the original articles, graphics, lists of data, along with never before published explanations of the cover pages, and what significant events were going on at the time.\u003cbr\u003e\u003cbr\u003eWe've done this at very high quality, which means the file size is around 92 megs. This allows you to zoom in on some of our microscopic type and find the occasional hidden message, as well as be assured of never having a crappy looking scan.\u003c\/p\u003e\n\u003cp\u003eWant to get ALL of the digests, past, present, and future? Consider the \u003ca href=\"\/collections\/pdf\/products\/the-hacker-digest-lifetime-pdf\"\u003elifetime plan.\u003c\/a\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1222927893,"sku":"","price":6.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/Volume5_cover.jpg?v=1429832171"},{"product_id":"the-hacker-digest-volume-4-pdf","title":"The Hacker Digest - Volume 04 (PDF)","description":"\u003cp\u003eThis is a compendium of articles from Volume 4 of 2600 Magazine, originally published in 1987. This was the first year that we used the current digest format and it was the only year where that format was monthly.\u003c\/p\u003e\n\u003cp\u003eThe PDF version contains all of the original articles, graphics, lists of data, along with never before published explanations of the cover pages, and what significant events were going on at the time.\u003cbr\u003e\u003cbr\u003eWe've done this at very high quality, which means the file size is around 180 megs. This allows you to zoom in on some of our microscopic type and find the occasional hidden message, as well as be assured of never having a crappy looking scan.\u003c\/p\u003e\n\u003cp\u003eWant to get ALL of the digests, past, present, and future? Consider the \u003ca href=\"\/collections\/pdf\/products\/the-hacker-digest-lifetime-pdf\"\u003elifetime plan.\u003c\/a\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1222928813,"sku":"","price":6.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/Vol_4_cover_1987.jpg?v=1429832840"},{"product_id":"the-hacker-digest-volume-3-pdf","title":"The Hacker Digest - Volume 03 (PDF)","description":"\u003cp\u003eThis is a compendium of articles from Volume 3 of 2600 Magazine (originally published in 1986), rearranged in book form and totaling 100 pages of restored and new material.\u003cbr\u003e\u003cbr\u003eThe PDF version contains all of the original articles, graphics, lists of data, along with never before published explanations of the cover pages, and some other little known information about the early days of 2600. We've even reprinted the ads we ran, as part of our experimentation with the dark side of publishing.\u003cbr\u003e\u003cbr\u003eThis is not just a scan of some old back issues. We've literally gone through every article and every piece of data and arranged them in a brand new book form. Because of the good response to the first two volumes, we put in the time and effort to bring you Volume 3. Your continued support will ensure that this project continues and helps to preserve this history of the hacker world and the global technological revolution.\u003c\/p\u003e\n\u003cp\u003eFor the PDF version, click the order button above.\u003c\/p\u003e\n\u003cp\u003eTo get the Kindle and Nook versions of this volume, click \u003ca href=\"http:\/\/www.2600.com\/magazine\/digital-digests.html\"\u003ehere.\u003c\/a\u003e\u003c\/p\u003e\n\u003cp\u003eWant to get ALL of the digests, past, present, and future? Consider the \u003ca href=\"\/collections\/pdf\/products\/the-hacker-digest-lifetime-pdf\"\u003elifetime plan.\u003c\/a\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1222930461,"sku":"","price":3.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/the-hacker-digest-volume-3-pdf-7.gif?v=1429834678"},{"product_id":"the-hacker-digest-volume-2-pdf","title":"The Hacker Digest - Volume 02 (PDF)","description":"\u003cp\u003eThis is a compendium of articles from Volume 2 of 2600 Magazine (originally published in 1985), rearranged in book form and totaling 101 pages of restored and new material.\u003cbr\u003e\u003cbr\u003eThe PDF version contains all of the original articles, graphics, lists of data, along with never before published explanations of the cover pages, and some other little known information about the early days of 2600. We've even reprinted the ads we ran, as part of our experimentation with the dark side of publishing.\u003cbr\u003e\u003cbr\u003eThis is not just a scan of some old back issues. We've literally gone through every article and every piece of data and arranged them in a brand new book form, divided into articles, news stories, letters, and data. Because of the good response to the first volume, we put in the time and effort to bring you Volume 2. Your continued support will ensure that this project continues and helps to preserve this history of the hacker world and the global technological revolution.\u003c\/p\u003e\n\u003cp\u003eFor the PDF version, click the order button above.\u003c\/p\u003e\n\u003cp\u003eTo get the Kindle and Nook versions of this volume, click \u003ca href=\"http:\/\/www.2600.com\/magazine\/digital-digests.html\"\u003ehere.\u003c\/a\u003e\u003c\/p\u003e\n\u003cp\u003eWant to get ALL of the digests, past, present, and future? Consider the \u003ca href=\"\/collections\/pdf\/products\/the-hacker-digest-lifetime-pdf\"\u003elifetime plan.\u003c\/a\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1222931549,"sku":"","price":3.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/vol2.JPG?v=1429835072"},{"product_id":"the-hacker-digest-volume-1-pdf","title":"The Hacker Digest - Volume 01 (PDF)","description":"\u003cp\u003eThis is a compendium of articles from Volume 1 of 2600 Magazine (originally published in 1984), rearranged in book form and totaling 83 pages of restored and new material.\u003cbr\u003e\u003cbr\u003eThe PDF version contains all of the original articles, graphics, lists of data, along with never before published explanations of the cover pages, and a behind the scenes look at the first days of 2600.\u003cbr\u003e\u003cbr\u003eThis is not just a scan of some old back issues. We've literally gone through every article and every piece of data and arranged them in a brand new book form, divided into articles, news stories, letters, and data.\u003c\/p\u003e\n\u003cp\u003eFor the PDF version, click the order button above.\u003c\/p\u003e\n\u003cp\u003eTo get the Kindle and Nook versions of this volume, click \u003ca href=\"http:\/\/www.2600.com\/magazine\/digital-digests.html\"\u003ehere.\u003c\/a\u003e\u003c\/p\u003e\nWant to get ALL of the digests, past, present, and future? Consider the \u003ca href=\"\/collections\/pdf\/products\/the-hacker-digest-lifetime-pdf\"\u003elifetime plan.\u003c\/a\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1222932581,"sku":"","price":3.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/51PL8_L_xOL._SS500.jpg?v=1429835571"},{"product_id":"the-hacker-digest-volume-07-pdf","title":"The Hacker Digest - Volume 07 (PDF)","description":"\u003cp\u003eThis is a compendium of articles from Volume 7 of 2600 Magazine, originally published in 1990.\u003cbr\u003e\u003cbr\u003eThe PDF version contains all of the original articles, graphics, lists of data, along with never before published explanations of the cover pages, and what significant events were going on at the time.\u003cbr\u003e\u003cbr\u003eWe've done this at very high quality, which means the file size is around 81 megs. This allows you to zoom in on some of our microscopic type and find the occasional hidden message, as well as be assured of never having a crappy looking scan.\u003cbr\u003e\u003cbr\u003eWant to get ALL of the digests, past, present, and future? Consider the \u003ca href=\"\/collections\/pdf\/products\/the-hacker-digest-lifetime-pdf\"\u003elifetime plan.\u003c\/a\u003e\u003cbr\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":4985563201,"sku":"","price":6.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/Volume7cover.jpg?v=1437777854"},{"product_id":"the-hacker-digest-volume-31-pdf","title":"The Hacker Digest - Volume 31 (PDF)","description":"\u003cp\u003eThis is a compendium of articles from Volume 31 of 2600 Magazine (2014), rearranged in book form and totaling nearly 300 pages of material.\u003c\/p\u003e\n\u003cp\u003eThe PDF version contains all of the graphics, along with enhanced cover pages, a full payphone photo spread in the middle, and a collection of all of the back cover photos.\u003c\/p\u003e\n\u003cp\u003eFor the PDF version, click the order button above.\u003c\/p\u003e\n\u003cp\u003eTo get the Kindle and Nook versions of this volume, click \u003ca href=\"http:\/\/www.2600.com\/magazine\/digital-digests.html\"\u003ehere.\u003c\/a\u003e\u003c\/p\u003e\nWant to get ALL of the digests, past, present, and future? Consider the \u003ca href=\"\/collections\/pdf\/products\/the-hacker-digest-lifetime-pdf\"\u003elifetime plan.\u003c\/a\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":4986104257,"sku":"","price":9.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/cover_Vol_31.jpg?v=1437779682"},{"product_id":"copy-of-the-hacker-digest-volume-31-pdf","title":"The Hacker Digest - Volume 31 (EPUB)","description":"\u003cp\u003eThis is a compendium of articles from Volume 31 of 2600 Magazine (2014), rearranged in book form with hundreds of pages of material.\u003cbr\u003e\u003cbr\u003eThe EPUB version contains enhanced cover pages, a full payphone photo spread in the middle, and a collection of all of the back cover photos along with dozens of articles and hundreds of letters.\u003cbr\u003e\u003cbr\u003eEPUBs can be converted to almost any e-reader format, using tools available at such sites as http:\/\/calibre-ebook.com.\u003cbr\u003e\u003cbr\u003eFor the EPUB version, click the order button above.\u003c\/p\u003e\n\u003cp\u003eTo get the Kindle and Nook versions of this volume, click \u003ca href=\"http:\/\/www.2600.com\/magazine\/digital-digests.html\"\u003ehere.\u003c\/a\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":4986971137,"sku":"","price":9.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/cover_Vol_31_f78da30d-e809-4c67-b26c-b90c03a91c50.jpg?v=1437781095"},{"product_id":"the-hacker-digest-volume-30-epub","title":"The Hacker Digest - Volume 30 (EPUB)","description":"This is a compendium of articles from Volume 30 of 2600 Magazine (2013), rearranged in book form with hundreds of pages of material.\u003cbr\u003e\u003cbr\u003eThe EPUB version contains enhanced cover pages, a full payphone photo spread in the middle, and a collection of all of the back cover photos along with dozens of articles and hundreds of letters.\u003cbr\u003e\u003cbr\u003eEPUBs can be converted to almost any e-reader format, using tools available at such sites as http:\/\/calibre-ebook.com.\u003cbr\u003e\u003cbr\u003eFor the EPUB version, click the order button above.\u003cbr\u003e\u003cbr\u003e\n\u003cp\u003eTo get the Kindle and Nook versions of this volume, click \u003ca href=\"http:\/\/www.2600.com\/magazine\/digital-digests.html\"\u003ehere.\u003c\/a\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":4987214273,"sku":"","price":9.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/cover_Vol_30_cd003110-07f5-419a-ba85-6c2b02148a98.jpg?v=1437782247"},{"product_id":"the-hacker-digest-volume-29-epub","title":"The Hacker Digest - Volume 29 (EPUB)","description":"This is a compendium of articles from Volume 29 of 2600 Magazine (2012), rearranged in book form with hundreds of pages of material.\u003cbr\u003e\u003cbr\u003eThe EPUB version contains enhanced cover pages, a full payphone photo spread in the middle, and a collection of all of the back cover photos along with dozens of articles and hundreds of letters.\u003cbr\u003e\u003cbr\u003eEPUBs can be converted to almost any e-reader format, using tools available at such sites as http:\/\/calibre-ebook.com.\u003cbr\u003e\u003cbr\u003eFor the EPUB version, click the order button above.\u003cbr\u003e\u003cbr\u003e\n\u003cp\u003eTo get the Kindle and Nook versions of this volume, click \u003ca href=\"http:\/\/www.2600.com\/magazine\/digital-digests.html\"\u003ehere.\u003c\/a\u003e\u003c\/p\u003e\n\u003cbr\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":4987278017,"sku":"","price":9.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/cover_Vol_29_small_91319837-3748-46e7-91cf-a0de97b24c16.jpg?v=1437782427"},{"product_id":"the-hacker-digest-volume-08-pdf","title":"The Hacker Digest - Volume 08 (PDF)","description":"\u003cp\u003eThis is a compendium of articles from Volume 8 of 2600 Magazine, originally published in 1991.\u003cbr\u003e\u003cbr\u003eThe PDF version contains all of the original articles, graphics, lists of data, along with never before published explanations of the cover pages, and what significant events were going on at the time.\u003cbr\u003e\u003cbr\u003eWe've done this at very high quality, which means the file size is around 92 megs. This allows you to zoom in on some of our microscopic type and find the occasional hidden message, as well as be assured of never having a crappy looking scan.\u003cbr\u003e\u003cbr\u003eWant to get ALL of the digests, past, present, and future? Consider the \u003ca href=\"\/collections\/pdf\/products\/the-hacker-digest-lifetime-pdf\"\u003elifetime plan.\u003c\/a\u003e\u003cbr\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6221871041,"sku":"","price":6.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/Volume8cover.jpg?v=1441097703"},{"product_id":"the-hacker-digest-lifetime-pdf","title":"The Hacker Digest - LIFETIME (PDF)","description":"\u003cp\u003eThis is our popular lifetime digest subscription which contains ALL of our annual digests, beginning with Volume 1 from 1984 and continuing into the future.\u003cbr\u003e\u003cbr\u003eHere's how it works. After your payment has been confirmed, you will be able to download a zip file of all of the digests released so far (Volumes 1-41). After that you will get a newly created annual digest each spring via email.\u003cbr\u003e\u003cbr\u003eThis offer is only good for DRM-free PDF versions of The Hacker Digest.\u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6222023873,"sku":"","price":260.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/the-hacker-digest-lifetime-pdf-2.gif?v=1441484743"},{"product_id":"the-next-hope-2010-2600-meetings-yesterday-today-and-tomorrow-mp4","title":"The Next HOPE (2010): \"2600 Meetings: Yesterday, Today, and Tomorrow\" (Download)","description":"Saturday, July 17, 2010: 11:00 pm (Lovelace): In this panel, longtime attendees and website admins of New York City's 2600 meeting will explain how an event that began in the 1980s as a simple way for local hackers to meet each other in person has grown into a major and vital part of the worldwide hacker community. The panel will recap the history of 2600 meetings, and explain the basics for those interested in getting involved with an existing meeting or starting a new one. Issues involved in operating a 2600 meeting's web presence will also be addressed. There will most certainly be a recounting of some favorite meeting stories and experiences, and the lasting effects the meetings have had on all sorts of lives.\u003cbr\u003e\u003cbr\u003eHosted by Rob T Firefly, Grey Frequency, and Gonzo","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6698678017,"sku":"TNHB25","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_95d4e10f-3d58-4758-a587-060531fd9145.jpg?v=1442802610"},{"product_id":"the-next-hope-2010-american-bombe-how-the-u-s-shattered-the-enigma-code-mp4","title":"The Next HOPE (2010): \"American Bombe: How the U.S. Shattered the Enigma Code\" (Download)","description":"Sunday, July 18, 2010: 1:00 pm (Lovelace): Many people know the story of Alan Turing and his work at Bletchley Park in designing the British bombes, the machines used to crack the German Enigma codes. What most people don't know is what happened afterward. When the German military added a fourth rotor to the Enigma, a new type of machine was needed in order to crack the codes and keep Allied intelligence out of darkness. These American bombes were the first multifunction computers ever built, and are an important part of the history of modern computing. It's the incredible, gripping story of an enterprise that rivaled the Manhattan Project in secrecy and complexity, and ultimately led to the first modern digital computer.\u003cbr\u003e\u003cbr\u003eHosted by Shalom Silbermintz\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6701922881,"sku":"TNHB30","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_cdd912a2-8960-40fd-bda3-8e42d1cc85dd.jpg?v=1442813544"},{"product_id":"the-next-hope-2010-arse-elektronika-sex-tech-and-the-future-of-screw-it-yourself-mp4","title":"The Next HOPE (2010): \"Arse Elektronika: Sex, Tech, and the Future of Screw-It-Yourself\" (Download)","description":"Friday, July 16, 2010: 3:00 pm (Tesla):  We may not forget that mankind is a sexual and tool-using species.\u003cbr\u003e\u003cbr\u003eFrom the depiction of a vulva in a cave painting to the newest Internet porno, technology and sexuality have always been closely linked. New technologies are quick to appeal to pornography consumers, and thus these customers represent a profitable market segment for the suppliers of new products and services.\u003cbr\u003e\u003cbr\u003eCurrently, all factors show that high-tech developments owe a great deal of their success to the need for further sexual stimulation. One could cite the example provided by the science fiction concept of a full-body interface designed to produce sexual stimulation. But it isn't science fiction anymore. It's DIY.\u003cbr\u003e\u003cbr\u003eAs bio-hacking, sexually enhanced bodies, genetic utopias, and plethora of gender have long been the focus of literature, science fiction and, increasingly, pornography, this year will see us explore the possibilities that fictional and authentic bodies have to offer. Our world is already way more bizarre than our ancestors could have ever imagined. But it may not be bizarre enough. \"Bizarre enough for what?\" you might ask. Bizarre enough to subvert the heterosexist matrix that is underlying our world and that we should hack and overcome for some quite pressing reasons within the next century.\u003cbr\u003e\u003cbr\u003eDon't you think, replicants?\u003cbr\u003e\u003cbr\u003eHosted by Johannes Grenzfurthner\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6702209217,"sku":"TNHA05","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_e630e6b4-91f3-4d9e-b899-5bfe208a70bf.jpg?v=1442814986"},{"product_id":"the-next-hope-2010-bakeca-it-ddos-how-evil-forces-have-been-defeated-mp4","title":"The Next HOPE (2010): \"Bakeca.it DDoS - How Evil Forces Have Been Defeated\" (Download)","description":"Sunday, July 18, 2010: 3:00 pm (Bell): What if your infrastructure was attacked by a skilled and powerful organization, able to control many zombies all around the world? A real case history will be analyzed, with a long trip through sleepless nights, finishing with a DIY solution using OpenBSD based servers and a bit of cleverness, all of which eventually led to a happy ending.\u003cbr\u003e\u003cbr\u003eHosted by Alessio \"mayhem\" Pennasilico\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6702547073,"sku":"TNHC30","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_d020c8d1-7d27-4b82-ab32-bfeaa42b021e.jpg?v=1442816675"},{"product_id":"the-next-hope-2010-behind-the-padlock-https-ubiquitous-and-fragile-mp4","title":"The Next HOPE (2010): \"Behind the Padlock: HTTPS Ubiquitous and Fragile\" (Download)","description":"Saturday, July 17, 2010: 11:00 am (Lovelace): HTTPS is finally getting adopted all over the place -- including Gmail, Twitter, Facebook, Google Search, and Wikipedia -- as people realize that packet sniffing is easy and credit cards aren't the only sensitive information we send over the Internet. At the same time, a new series of attacks and scandals have shown that TLS is rather fragile. SSL stripping lets attackers bypass sites' HTTPS-only policies; a series of scandals over the past two years has renewed skepticism of certificate authorities' role and the security of the global public-key infrastructure. More and more people are wondering who those strange organizations are, what they're doing in our browsers, whether anyone knows if they're doing a good job, and even how to pronounce some of their names. And recent evidence suggests some CAs may be inept -- or cooperating with national governments.\u003cbr\u003e\u003cbr\u003eSeth Schoen will explain the push to increase HTTPS deployment to protect privacy and fight Internet censorship, but also make its protections more meaningful and robust. He'll describe the work on Firefox plugins that change the browser security model, and ideas on information sources that can supplement the certificate authorities. The talk will also include a look at SSL Observatory, which aims to collect data to catch rogue CAs in the act.\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6702849473,"sku":"TNHB15","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_a7cc75e8-fc25-4770-95f9-08c34881bfbd.jpg?v=1442817768"},{"product_id":"the-next-hope-2010-the-black-suit-plan-isnt-working-now-what-mp4","title":"The Next HOPE (2010): \"The Black Suit Plan Isn't Working - Now What?\" (Download)","description":"Sunday, July 18, 2010: 4:00 pm (Bell): The suit plan isn't working. At The Last HOPE, James Arlen told you all about the awesomeness of The Black Suit. But you're finding that it's not really working out... maybe it's possible to lower the goal? Can we take advantage of the Econopocalypse, the fact that two years have gone by, and infiltrate the upper echelons without having to leave the Black Hat behind? With cyber humor, blistering criticism, and awesometastic possibilities, spend some time in a discussion about ways to get to the place we all want to be -- employed and happy.\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6703139009,"sku":"TNHC31","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_f23a7875-9375-497f-b783-dfc78904a6e0.jpg?v=1442819114"},{"product_id":"the-next-hope-2010-botnet-resistant-coding-protecting-your-users-from-script-kiddies-mp4","title":"The Next HOPE (2010): \"Botnet Resistant Coding: Protecting Your Users from Script Kiddies\" (Download)","description":"Friday, July 16, 2010: 3:00 pm (Lovelace): Zeus botnets are trojans accountable for a large percentage of all trojan infections. Zeus's availability and ease of use make it popular amongst malicious individuals with low technical sophistication. Better social engineering scams, coupled with consistent levels of victim unawareness and carelessness on the part of software vendors, have created a need for greater web security. Using a standard LAMP stack and web programming techniques, a guideline was developed to mitigate and reduce the exposure of sensitive information from compromised clients. Because of the resultant confusion, attackers have either given up and moved on to an easier target, or have spent significant amounts of resources undoing damage to harvested POST data. The immediate objective of implementing these new techniques is to reduce the efficacy of Zeus and its counterparts and ebb cybercrime and identity fraud. Future use of these techniques will provide better chances against the compromising of users and web applications.\u003cbr\u003e\u003cbr\u003eHosted by Peter Greko and Fabian Rothschild\u003cbr\u003e\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6703780097,"sku":"TNHB05","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_ca6984f0-8ce4-4ad4-ae12-07c914f5a378.jpg?v=1442823079"},{"product_id":"the-next-hope-2010-brilliants-exploits-a-look-at-the-vancouver-2010-olympics-mp4","title":"The Next HOPE (2010): \"'Brilliants Exploits' - A Look at the Vancouver 2010 Olympics\" (Download)","description":"Friday, July 16, 2010: 5:00 pm (Lovelace): With the 2010 Winter Olympics having come and gone, it's not too late to look back at what an event it was. From a technology standpoint, CCTV cameras and ticket sales will be looked at, and from a social standpoint, matters involving intellectual property as well as the police will be examined.\u003cbr\u003e\u003cbr\u003eHosted by Colin Keigher\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6703886849,"sku":"TNHB07","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_44e28104-8e6a-4bd1-bdf4-ae49c3155e9e.jpg?v=1442823763"},{"product_id":"the-next-hope-2010-build-robots-and-see-the-world-mp4","title":"The Next HOPE (2010): \"Build Robots and See the World\" (Download)","description":"Friday, July 16, 2010: 8:00 pm (Tesla): Computing and electronics parts are inexpensive enough these days to allow amateurs to build surprisingly sophisticated machines on a budget. Jonathan Foote will talk about his experiences building kinetic artworks like Chassis the Drink-Serving Robot and SWARM, the collection of six spherical orbs that roll without wheels. He will discuss how it got started, how the robots work, and how knowing what you are doing is not always the best approach. Although they haven't quite achieved world domination, he and his collaborators have exhibited robots at the Coachella Music Festival, the International Festival of Cocktail Robotics in Vienna, as well as the Techkriti Festival in Kanpur, India. The interested beginner will wind up with a bunch of tips and sources for getting started in robotics.\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6704618049,"sku":"TNHA10","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_42528e3b-b5ae-413d-ae19-10f4887419c7.jpg?v=1442828233"},{"product_id":"the-next-hope-2010-building-and-breaking-the-next-hope-badge-mp4","title":"The Next HOPE (2010): \"Building and Breaking the Next HOPE Badge\" (Download)","description":"Saturday, July 17, 2010: 10:00 pm (Tesla): This lecture describes the design of The Next HOPE badge's hardware and firmware, as well as the security of the same. Attendees will learn how to add a USB chip, how to reflash a badge with new firmware, and how to write new software for the device. Additionally, attacks against which the badge is -- or is not -- defended will be explored in detail. Topics will include the design of the Open Beacon firmware, forced firmware extraction, and the repurposing of badges into packet sniffers, radio jammers, Morse code beacons, and a dozen other things.\u003cbr\u003e\u003cbr\u003eHosted by Travis Goodspeed\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6710191041,"sku":"TNHA21","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_b2ebe1f2-6ed9-43f6-b4d6-0f758943a2a6.jpg?v=1442852692"},{"product_id":"the-next-hope-2010-burning-and-building-bridges-a-primer-to-hacking-the-education-system-mp4","title":"The Next HOPE (2010): \"Burning and Building Bridges: A Primer to Hacking the Education System\" (Download)","description":"Sunday, July 18, 2010: 12:00 pm (Bell): Public education today consists of underpaid, overworked, and generally dissatisfied teachers who are tasked with force-feeding students overwhelming amounts of information, perfectly regurgitated onto multiple-choice exams. State exams, for their part, are written by people who understand neither content nor students. Over the years, we have successfully created an education system that stifles creativity, stymies logical reasoning, and stunts learning. Long gone are the days of self-motivated learning, when children used their hands and their heads, piecing the world together with all their senses.\u003cbr\u003e\u003cbr\u003eFortunately, we have hackers and hackerspaces. Makerspaces and art spaces, music spaces and theater spaces. Here are the last vestiges of true education, where individuals still take objects and learn from them -- observe, break apart, analyze, fix, and piece back together. If we can accept the productive and creative capacities of such spaces, and use them as community centers for learning, we have the potential to become the next big force in public education. This talk will be about hacking education as we hack anything else. That is, break the existing system, throw out what gets in the way (tests, outdated formulas, teacher-centric classrooms), reconstruct the pieces conducive to learning (inquiry, manipulatives, the outdoors, the real world, use of tools), and piece back together an education system that works for us, rather than against us.\u003cbr\u003e\u003cbr\u003eHosted by Christina \"fabulous\" Pei\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6710583169,"sku":"TNHC27","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_441fa86c-b1f1-48bc-b234-8787417da6ca.jpg?v=1442853972"},{"product_id":"the-next-hope-2010-buying-privacy-in-digitized-cities-mp4","title":"The Next HOPE (2010): \"Buying Privacy in Digitized Cities\" (Download)","description":"Friday, July 16, 2010: 7:00 pm (Bell): As new sensing technologies appear in our cities almost overnight, what does it mean to be visible or invisible? What happens when socioeconomic categories determine when, where, and how you're seen? The asymmetry in who is visible, and where, is a long-standing urban problem, but it is now being built into our technologies and our cities.\u003cbr\u003e\u003cbr\u003eThe worlds of advertising, city planning, and law enforcement are each creating their own inconsistent visions. Privacy is not dead; rather, it is being selectively vivisected. What can we do to fix this? In this talk, a lot of problems and a few solutions will be covered, including the announcement of a new competition for the development of tactical countersurveillance tools.\u003cbr\u003e\u003cbr\u003eHosted by Eleanor Saitta\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6710956737,"sku":"TNHC08","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_c52acb74-4156-46d5-9c9a-1d6247e3a59c.jpg?v=1442855312"},{"product_id":"the-next-hope-2010-cats-and-mice-the-phone-company-the-fbi-and-the-phone-phreaks-mp4","title":"The Next HOPE (2010): \"Cats and Mice: The Phone Company, the FBI, and the Phone Phreaks\" (Download)","description":"Sunday, July 18, 2010: 12:00 pm (Tesla): Ever since the first blue box arrest in 1961, the telephone company, the FBI, and the phone phreaks engaged in a long-running game of cat and mouse. This talk explores the moves and countermoves between the two sides from 1960 to 1980, covering advances in phreaking -- new ways to hack the phone system and evade detection -- as well as advances in finding and prosecuting those pesky phone phreaks. Based on exclusive interviews with phreaks, FBI agents, and telephone company security officers for his forthcoming book on the history of phone phreaking, Phil Lapsley will focus on some of the more dramatic battles between the two sides that occurred during the heyday of analog phone phreaking, including the 1962 Harvard \"spy ring,\" a certain well-known phone phreak's wiretapping of the FBI in 1975 (yes, you read that right), and the hacking of the military's AUTOVON telephone network in the mid-1970s.\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6711566401,"sku":"TNHA26","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_e36f6623-64c4-491f-9322-ccc1df6fb047.jpg?v=1442857615"},{"product_id":"the-next-hope-2010-circuitbending-mp4","title":"The Next HOPE (2010): \"Circuitbending\" (Download)","description":"Saturday, July 17, 2010: 10:00 pm (Lovelace): A general overview of circuit bending, as well as its history, and some examples of really cool bends. An assortment of bent toys will be displayed. This talk will cover a good deal on the basics of bending, and some of the techniques used to coax the sounds out of a variety of toys. You'll learn what to look for in bendable toys, as well as techniques that are least likely to destroy toys. There will also be a basic workshop on circuit bending where people can build their own bent toy.\u003cbr\u003e\u003cbr\u003eHosted by Jimmie Rodgers\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6712176897,"sku":"TNHB24","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_29273e65-31c1-4e35-9f55-44c88786d42c.jpg?v=1442859188"},{"product_id":"the-next-hope-2010-closing-ceremonies-mp4","title":"The Next HOPE (2010): \"The Next HOPE Closing Ceremonies\" (Download)","description":"Sunday, July 18, 2010: 6:00 pm (Tesla): This is always worth sticking around for, as so many people do. Sure, there are those who leave early on Sunday because they have to get back to whatever it is they do in the real world bright and early Monday morning. But those who fancy something a bit more celebratory and different stick around as the conference truly winds down. Hear some of the back story of the conference in these final moments and witness all of the fun.\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6712718721,"sku":"TNHA31","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_4bf99078-12a6-4518-ae43-b994a26f2b64.jpg?v=1442860863"},{"product_id":"the-next-hope-2010-content-of-the-future-mp4","title":"The Next HOPE (2010): \"Content of the Future\" (Download)","description":"Friday, July 16, 2010: 12:00 pm (Lovelace): There are billions of cell phones and other mobile devices, computers, and dedicated readers in the world that can be used for reading eBooks and accessing other digital content. They may also be used for sharing, editing, annotating, and authoring. Is the future what the inventors of the digital revolution dreamed of? Yes and no. While digital content can be liberated and liberating, it is also being used to turn the masses into complacent consumer zombies. These wondrous tools for creating and sharing our own content might, at the same time, de-emphasize our ability to use the written word and logical thinking. In this session, the father of eBooks will share his thoughts on these topics and more. Despite corporate control and other negative forces, the liberation and proliferation of digital capabilities and content is changing the world for good, and will continue to do so. The session will discuss how software, creative thinking, and contributed labor have created the free digital content of today. More importantly, it will point the way to a future of content that achieves our dreams, and more.\u003cbr\u003e\u003cbr\u003eHosted by Michael S. Hart and Greg Newby\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6718312065,"sku":"TNHB03","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_5016b123-9c85-491d-a120-105c6b4a3f27.jpg?v=1442873354"},{"product_id":"the-next-hope-2010-cooking-for-geeks-mp4","title":"The Next HOPE (2010): \"Cooking for Geeks\" (Download)","description":"Friday, July 16, 2010: 4:00 pm (Bell): Are you interested in the science behind what happens to the food in your kitchen? Do you want to learn what makes a recipe work so you can improvise instead of simply following a set of instructions? In this talk, Jeff Potter, author of the forthcoming O'Reilly book Cooking for Geeks, will share the key insights into what happens in the kitchen from a geek perspective so that you can improvise and create your own unique dishes.\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6719246721,"sku":"TNHC05","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_640837cf-0b06-4394-b39c-b468b93da3f2.jpg?v=1442876922"},{"product_id":"the-next-hope-2010-cv-dazzle-face-deception-mp4","title":"The Next HOPE (2010): \"CV Dazzle: Face Deception\" (Download)","description":"Sunday, July 18, 2010: 3:00 pm (Lovelace): As CCTV camera networks proliferate worldwide, so do automated face detection\/recognition systems, which can rapidly identify faces in crowds and covertly log individuals' movements. CV Dazzle is camouflage from face detection. It's based on the original Dazzle camo from WWI and thwarts automated face detection\/recognition systems by altering the contrast and spatial relationship of key facial features. Developed as a challenge to the growing prowess of computer vision, CV Dazzle undermines the capabilities of visual capture systems under the guise of high-fashion aesthetics.\u003cbr\u003e\u003cbr\u003eHosted by Adam Harvey\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6719661889,"sku":"TNHB32","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_72d40c88-5809-43c0-9753-83bb5529f32b.jpg?v=1442878636"},{"product_id":"the-next-hope-2010-design-of-a-wireless-emg-mp4","title":"The Next HOPE (2010): \"Design of a Wireless EMG\" (Download)","description":"Friday, July 16, 2010: 5:00 pm (Bell): This talk is a summary of all the steps taken in designing a wireless EMG. Such a device is capable of using the faint electrical signals that muscles give off when used in controlling other systems. Konstantin Avdashchenko's current design is a combination of power supply circuitry to run off a lithium-ion battery, a nRF24l01+ chip for wireless capability, a PIC 18F4550 as the brains of the device, and an amplification board to amplify EMG signals. This presentation will show how each of these elements come together to create a wireless EMG. The talk will cover the sections of design, manufacture, testing, coding, and future work.\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6719786369,"sku":"TNHC06","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_523a9ca4-afd5-4579-ba1d-44fc0f3d2e68.jpg?v=1442879497"},{"product_id":"the-next-hope-2010-detecting-and-defending-your-network-from-malware-using-nepenthes-mp4","title":"The Next HOPE (2010): \"Detecting and Defending Your Network from Malware Using Nepenthes\" (Download)","description":"Friday, July 16, 2010: 10:00 pm (Bell): Security analysts have a tendency to believe they are safe because the red alert light hasn't blinked on their IDS\/IPS device. This remains true even when organizations have invested the time and budget to deploy a myriad of different tools to defend against the overwhelming number of network defense issues we all tend to face. A key pain point among these issues is keeping malware and the subsequent bot herders who spread it off of your corporate network.\u003cbr\u003e\u003cbr\u003eNepenthes is an open source honeypot that allows for the collection of malware \"in the wild.\" It emulates known vulnerabilities and will download and capture the malware when it is attempting to compromise the honeypot. This collection process allows for further analysis and understanding of the malware in question. This presentation introduces this powerful and flexible tool and will discuss malware collection techniques attendees will immediately be able to take home and implement within their network environment and add another layer to their \"defense in depth\" strategy.\u003cbr\u003e\u003cbr\u003eHosted by Marco Figueroa\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6721608449,"sku":"TNHC11","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_c4ae0d0f-277e-4ab2-a14b-58d1595d3e46.jpg?v=1442889098"},{"product_id":"the-next-hope-2010-digital-a-love-story-mp4","title":"The Next HOPE (2010): \"Digital: A Love Story\" (Download)","description":"Friday, July 16, 2010: 2:00 pm (Lovelace): Earlier this year, author Christine Love released a computer game called Digital: A Love Story, an interactive adventure based about BBSes, hacking, and science fiction. Taking place in 1988, Love created a game that took place one year before she was born, utilizing textfiles.com as a research source for historical fiction. Textfiles.com's Jason Scott will interview Christine about the inspiration and creation of this game, what the BBS era offers as a story background, and a glimpse into how future generations will look at the hackers of today.\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6721915585,"sku":"TNHB04","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_a7e9d7e1-e15f-4ae4-b032-ec7c16482438.jpg?v=1442890153"},{"product_id":"the-next-hope-2010-the-dmca-and-acta-vs-academic-and-professional-research-how-misuse-of-this-intellectual-property-legislation-chills-research-disclosure-and-innovation-mp4","title":"The Next HOPE (2010): \"The DMCA and ACTA vs. Academic and Professional Research: How Misuse of This Intellectual Property Legislation Chills Research, Disclosure, and Innovation\" (Download)","description":"Sunday, July 18, 2010: 1:00 pm (Tesla): Fair use, reverse engineering, and public discussion of research encourage innovation and self-regulates industries. However, these principles which define our vibrant and creative marketplace are fading. If a professional cannot constructively critique another's research online without being burdened with takedown notices until the critique is obscured or functionally removed for long periods of time, we do not have a society from which we can learn from others' mistakes and improve our trade.\u003cbr\u003e\u003cbr\u003eAttendees will gain a greater appreciation about how the Digital Millennium Copyright Act (DMCA) is increasingly being used in ways that chill free speech, disclosure of security vulnerabilities, and innovative research. Using hypothetical examples and discussing case law, this talk will outline procedures for counterclaiming and alternatives to removal of allegedly infringing materials, including discussing why data havens (some in anticipation of enactment of the Anti-Counterfeiting Trade Agreement) are becoming more popular.\u003cbr\u003e\u003cbr\u003eHosted by Tiffany Rad and Chris Mooney\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6722618689,"sku":"TNHA27","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_3924f5ef-9c45-4de7-9e22-86852452ceba.jpg?v=1442893363"},{"product_id":"the-next-hope-2010-easy-hacks-on-telephone-entry-systems-mp4","title":"The Next HOPE (2010): \"Easy Hacks on Telephone Entry Systems\" (Download)","description":"Friday, July 16, 2010: 7:00 pm (Lovelace): Telephone entry systems are practically everywhere in the city. An investigation after a series of break-ins uncovered several shockingly simple bypass techniques currently used by criminals. This presentation explains how the common keypad box will grant full access to a building in under ten seconds using only basic tools. The presentation will also give details on a series of countermeasures that can significantly reduce the vulnerabilities.\u003cbr\u003e\u003cbr\u003eHosted by Davi Ottenheimer\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6723325825,"sku":"TNHB09","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_0c024411-3bfc-4419-92b3-9612a89c23d8.jpg?v=1442894894"},{"product_id":"the-next-hope-2010-electronic-take-back-mp4","title":"The Next HOPE (2010): \"Electronic Take Back\" (Download)","description":"Friday, July 16, 2010: 3:00 pm (Bell): Discarded electronic products contain many toxic substances which can pollute the environment and threaten human health. Many countries in the world require the manufacturer to be financially responsible for the collection and recycling of their discarded products, which provides an economic incentive to make the products less toxic and more recyclable. More and more U.S. states are adopting electronic take back laws. This talk will review the concept and practice of electronic take back, its track record in the E.U. and in the U.S., and why IT pros and IT security practitioners who want to support good environmental practices should support it.\u003cbr\u003e\u003cbr\u003eHosted by John McNabb\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6725640897,"sku":"TNHC04","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_6949a31f-f6a5-46e2-94c9-38bc47fddbba.jpg?v=1442897859"},{"product_id":"the-next-hope-2010-electronic-waste-whats-here-and-whats-next-mp4","title":"The Next HOPE (2010): \"Electronic Waste: What's Here and What's Next\" (Download)","description":"Friday, July 16, 2010: 10:00 pm (Lovelace): Electronic waste is a problem that dogs technology buyers, system administrators, electronics manufacturers, and especially people who engage in informal -- and often dangerous and toxic -- disassembly. This talk will outline the history and scope of the problem, the environmental justice implications, the regulatory environment, industries that may be poised to face or prevent similar issues, and what we as technology workers can do to turn the tide.\u003cbr\u003e\u003cbr\u003eHosted by Stephanie Alarcon\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6726886401,"sku":"TNHB12","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_62e0c9de-ce9d-4906-9b3d-748dc9dbcc3c.jpg?v=1442902328"},{"product_id":"the-next-hope-2010-examining-costs-benefits-and-economics-in-malware-and-carding-markets-mp4","title":"The Next HOPE (2010): \"Examining Costs, Benefits, and Economics in Malware and Carding Markets\" (Download)","description":"Friday, July 16, 2010: 2:00 pm (Bell): Much has been made of the growth of online black markets in Russia and Eastern Europe that facilitate the sale and distribution of tools and information designed to subvert and compromise computer networks and users. Specifically, web forums allow individuals to purchase access to sophisticated malicious software to victimize vulnerable systems and individuals, and sell the data they illegally obtain for a profit. While it is clear that malicious actors can acquire myriad resources to facilitate criminal activity, it is not clear what the return on investments is like relative to the costs of buying goods and services through these markets. This qualitative study examines this issue through an economic analysis of a sample of threads from ten active publicly accessible web forums that traffic in malware and personal information. Specifically, this talk will consider the costs of trojans, botnets, iframes tools, spam, DDoS services, and credit card information for victims and offenders to estimate dollar losses for victims relative to the economic gains for offenders who utilize and provide these resources. The findings will give significant insight into the role of malware and carding forums in the problem of cybercrime and the prospective economy revolving around computer intrusions and compromises. In turn, this talk can benefit computer security professionals, law enforcement, and anyone interested in better understanding cybercrime from the offender perspective.\u003cbr\u003e\u003cbr\u003eHosted by Thomas J. Holt\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6727438849,"sku":"TNHC03","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_3749e770-9ac3-4975-9fe8-73bbc91178ab.jpg?v=1442904034"},{"product_id":"the-next-hope-2010-false-domain-name-billing-and-other-scams-mp4","title":"The Next HOPE (2010): \"False Domain Name Billing and Other Scams\" (Download)","description":"Saturday, July 17, 2010: 10:00 am (Bell): Telex directories have moved on. In ancient history (the 1970s), scammers would send \"invoices\" to companies listed in the telex directory, billing them for listings in their \"telex directory.\" Fax machines were killing telex, and e-mail and FTP provided the death knell. Now those people are showing up again, sending out invoices for \"domain name services.\" They are not invoices, and you don't have to pay them. A look at some of the more infamous scams of technology that people have been taken in by.\u003cbr\u003e\u003cbr\u003eHosted by The Cheshire Catalyst\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6727503361,"sku":"TNHC13","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_368c059a-f486-4914-a7fc-8349a5cd4ef6.jpg?v=1442904879"},{"product_id":"the-next-hope-2010-free-software-why-we-need-a-big-tent-mp4","title":"The Next HOPE (2010): \"Free Software: Why We Need a Big Tent\" (Download)","description":"Saturday, July 17, 2010: 7:00 pm (Lovelace): There's been a lot of talk about diversity in free software lately. This talk will cover why that's important and introduce some of the tactics from the political organizing world that can be used to build a successful free software project and by extension a successful free software movement. Expect references to Saul Alinksy and Cesar Chavez as well as a bit of an introduction to free software and what it means for our increasingly technology-dependent world.\u003cbr\u003e\u003cbr\u003eHosted by Deb Nicholson\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6727609921,"sku":"TNHB21","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_6e2d898e-f10d-4576-a443-53567cdecd07.jpg?v=1442906117"},{"product_id":"the-next-hope-2010-the-freedom-box-how-to-reclaim-privacy-on-the-web-mp4","title":"The Next HOPE (2010): \"The Freedom Box: How to Reclaim Privacy on the Web\" (Download)","description":"Sunday, July 18, 2010: 2:00 pm (Bell): The world has finally realized that \"spying all the time\" is too high a price to pay for social networking platforms like Facebook. Now it's up to the hacker community to respond and build a free software social networking distribution to empower end users and help them reclaim their privacy. Software Freedom Law Center attorney James Vasile will talk about the progress of the \"Freedom Box\" box project and how the hacker community can get involved.\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6727896449,"sku":"TNHC29","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_07166c98-9dbb-46d3-b921-f56fcd4b7907.jpg?v=1442907564"},{"product_id":"the-next-hope-2010-friday-keynote-dan-kaminsky-mp4","title":"The Next HOPE (2010): \"Friday Keynote - Dan Kaminsky\" (Download)","description":"Friday, July 16, 2010: 1:00 pm (Tesla): Dan Kaminsky is one of our keynote speakers at The Next HOPE. He has a widely respected history in the computer security world, probably best known for discovering the 2008 DNS cache poisoning vulnerability, a flaw which could allow attackers to easily perform cache poisoning attacks on any name server. He also was key in the Sony BMG CD copy protection scandal, where Sony was found to be complicit in installing rootkits on consumer computers, making them vulnerable to all sorts of malware. Dan estimated that Sony's rootkit had been installed on computers spanning more than 500,000 networks. It's particularly thrilling for us to have Dan in attendance (it's also his first HOPE appearance) because he's able to present this material in an entertaining and accessible manner, unlike so many security experts who have trouble reaching an audience outside their field of expertise. This, after all, is our goal with all of our conferences - to reach as many people with varying levels of interest and ability as possible.\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6728189697,"sku":"TNHA04","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_4a35e7b5-0cf9-4350-aa27-88cb82ef5f2f.jpg?v=1442909084"},{"product_id":"the-next-hope-2010-from-indymedia-to-demand-media-participation-surveillance-and-the-transformation-of-journalism-mp4","title":"The Next HOPE (2010): \"From Indymedia to Demand Media: Participation, Surveillance, and the Transformation of Journalism\" (Download)","description":"Sunday, July 18, 2010: 11:00 am (Tesla): In the late 1990s, advances in digital content creation and distribution raised hopes that journalism and the media were becoming radically democratized. While these hopes have been borne out to some degree, old hierarchies and fissures are reasserting themselves as new forms of journalism become normalized. What's more, digital technology affords more than just participation; it affords surveillance and algorithmically driven visions of consumption. This conversational talk will address these issues, with a jumping off point being a comparison of different journalistic \"visions of their audience.\"\u003cbr\u003e\u003cbr\u003eHosted by Chris Anderson\u003cbr\u003e\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6744975233,"sku":"TNHA25","price":0.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/thn_logo_shirt_hi-res_feeab450-6d5a-4752-9fda-41138161cee5.jpg?v=1442942216"}],"url":"https:\/\/store.2600.com\/collections\/downloads\/conference_hope_16+conference_the-next-hope+conference_hope-xv.oembed","provider":"2600 Magazine","version":"1.0","type":"link"}