mv: ‘./input-file.zip’ and ‘./input-file.zip’ are the same file Creating study carrel named computer-from-gutenberg Initializing database Unzipping Archive: input-file.zip creating: ./tmp/input/input-file/ inflating: ./tmp/input/input-file/729.txt inflating: ./tmp/input/input-file/4686.txt inflating: ./tmp/input/input-file/39.txt inflating: ./tmp/input/input-file/118.txt inflating: ./tmp/input/input-file/37504.txt inflating: ./tmp/input/input-file/27468.txt inflating: ./tmp/input/input-file/37237.txt inflating: ./tmp/input/input-file/929.txt inflating: ./tmp/input/input-file/29461.txt inflating: ./tmp/input/input-file/101.txt inflating: ./tmp/input/input-file/34.txt inflating: ./tmp/input/input-file/250.txt inflating: ./tmp/input/input-file/56.txt inflating: ./tmp/input/input-file/5768.txt inflating: ./tmp/input/input-file/480.txt inflating: ./tmp/input/input-file/53.txt inflating: ./tmp/input/input-file/49.txt inflating: ./tmp/input/input-file/42613.txt inflating: ./tmp/input/input-file/79.txt inflating: ./tmp/input/input-file/30142.txt inflating: ./tmp/input/input-file/5180.txt inflating: ./tmp/input/input-file/metadata.csv caution: excluded filename not matched: *MACOSX* === updating bibliographic database Building study carrel named computer-from-gutenberg FILE: cache/729.txt OUTPUT: txt/729.txt FILE: cache/118.txt OUTPUT: txt/118.txt FILE: cache/37237.txt OUTPUT: txt/37237.txt FILE: cache/39.txt OUTPUT: txt/39.txt FILE: cache/929.txt OUTPUT: txt/929.txt FILE: cache/37504.txt OUTPUT: txt/37504.txt FILE: cache/29461.txt OUTPUT: txt/29461.txt FILE: cache/250.txt OUTPUT: txt/250.txt FILE: cache/27468.txt OUTPUT: txt/27468.txt FILE: cache/34.txt OUTPUT: txt/34.txt FILE: cache/56.txt OUTPUT: txt/56.txt FILE: cache/4686.txt OUTPUT: txt/4686.txt FILE: cache/101.txt OUTPUT: txt/101.txt FILE: cache/5768.txt OUTPUT: txt/5768.txt FILE: cache/53.txt OUTPUT: txt/53.txt FILE: cache/480.txt OUTPUT: txt/480.txt FILE: cache/49.txt OUTPUT: txt/49.txt FILE: cache/5180.txt OUTPUT: txt/5180.txt FILE: cache/30142.txt OUTPUT: txt/30142.txt FILE: cache/42613.txt OUTPUT: txt/42613.txt FILE: cache/79.txt OUTPUT: txt/79.txt /data-disk/reader-compute/reader-classic/bin/txt2adr.sh: line 40: printf: `U': invalid format character /data-disk/reader-compute/reader-classic/bin/txt2adr.sh: line 40: printf: `U': invalid format character /data-disk/reader-compute/reader-classic/bin/txt2adr.sh: line 40: printf: `U': invalid format character 27468 txt/../pos/27468.pos 27468 txt/../wrd/27468.wrd 27468 txt/../ent/27468.ent 37504 txt/../pos/37504.pos 37504 txt/../ent/37504.ent 37504 txt/../wrd/37504.wrd 37237 txt/../ent/37237.ent 37237 txt/../pos/37237.pos === file2bib.sh === id: 37504 author: Anonymous title: IBM System 360 RPG Debugging Template and Keypunch Card date: pages: extension: .txt txt: ./txt/37504.txt cache: ./cache/37504.txt Content-Encoding ISO-8859-1 Content-Type text/plain; charset=ISO-8859-1 X-Parsed-By ['org.apache.tika.parser.DefaultParser', 'org.apache.tika.parser.csv.TextAndCSVParser'] X-TIKA:content_handler ToTextContentHandler X-TIKA:embedded_depth 0 X-TIKA:parse_time_millis 2 resourceName b'37504.txt' === file2bib.sh === id: 27468 author: Anonymous title: IBM 1401 Programming Systems date: pages: extension: .txt txt: ./txt/27468.txt cache: ./cache/27468.txt Content-Encoding ISO-8859-1 Content-Type text/plain; charset=ISO-8859-1 X-Parsed-By ['org.apache.tika.parser.DefaultParser', 'org.apache.tika.parser.csv.TextAndCSVParser'] X-TIKA:content_handler ToTextContentHandler X-TIKA:embedded_depth 0 X-TIKA:parse_time_millis 2 resourceName b'27468.txt' 37237 txt/../wrd/37237.wrd 56 txt/../wrd/56.wrd 56 txt/../pos/56.pos 56 txt/../ent/56.ent === file2bib.sh === OMP: Error #34: System unable to allocate necessary resources for OMP thread: OMP: System error #11: Resource temporarily unavailable OMP: Hint Try decreasing the value of OMP_NUM_THREADS. /data-disk/reader-compute/reader-classic/bin/file2bib.sh: line 39: 52943 Aborted $FILE2BIB "$FILE" > "$OUTPUT" === file2bib.sh === OMP: Error #34: System unable to allocate necessary resources for OMP thread: OMP: System error #11: Resource temporarily unavailable OMP: Hint Try decreasing the value of OMP_NUM_THREADS. /data-disk/reader-compute/reader-classic/bin/file2bib.sh: line 39: 52832 Aborted $FILE2BIB "$FILE" > "$OUTPUT" === file2bib.sh === id: 37237 author: Digital Equipment Corporation title: Digital PDP15 Price List, April, 1970 date: pages: extension: .txt txt: ./txt/37237.txt cache: ./cache/37237.txt Content-Encoding UTF-8 Content-Type text/plain; charset=UTF-8 X-Parsed-By ['org.apache.tika.parser.DefaultParser', 'org.apache.tika.parser.csv.TextAndCSVParser'] X-TIKA:content_handler ToTextContentHandler X-TIKA:embedded_depth 0 X-TIKA:parse_time_millis 2 resourceName b'37237.txt' 39 txt/../pos/39.pos 929 txt/../wrd/929.wrd === file2bib.sh === id: 56 author: Polly, Jean Armour title: NREN for All: Insurmountable Opportunity date: pages: extension: .txt txt: ./txt/56.txt cache: ./cache/56.txt Content-Encoding ISO-8859-1 Content-Type text/plain; charset=ISO-8859-1 X-Parsed-By ['org.apache.tika.parser.DefaultParser', 'org.apache.tika.parser.csv.TextAndCSVParser'] X-TIKA:content_handler ToTextContentHandler X-TIKA:embedded_depth 0 X-TIKA:parse_time_millis 1 resourceName b'56.txt' 39 txt/../wrd/39.wrd 929 txt/../pos/929.pos 29461 txt/../wrd/29461.wrd 49 txt/../pos/49.pos 29461 txt/../pos/29461.pos 929 txt/../ent/929.ent 49 txt/../wrd/49.wrd 39 txt/../ent/39.ent === file2bib.sh === id: 929 author: St. Jude title: The Real Cyberpunk Fakebook date: pages: extension: .txt txt: ./txt/929.txt cache: ./cache/929.txt Content-Encoding ISO-8859-1 Content-Type text/plain; charset=ISO-8859-1 X-Parsed-By ['org.apache.tika.parser.DefaultParser', 'org.apache.tika.parser.csv.TextAndCSVParser'] X-TIKA:content_handler ToTextContentHandler X-TIKA:embedded_depth 0 X-TIKA:parse_time_millis 2 resourceName b'929.txt' 49 txt/../ent/49.ent === file2bib.sh === id: 39 author: Krol, Ed title: Hitchhiker's Guide to the Internet date: pages: extension: .txt txt: ./txt/39.txt cache: ./cache/39.txt Content-Encoding ISO-8859-1 Content-Type text/plain; charset=ISO-8859-1 X-Parsed-By ['org.apache.tika.parser.DefaultParser', 'org.apache.tika.parser.csv.TextAndCSVParser'] X-TIKA:content_handler ToTextContentHandler X-TIKA:embedded_depth 0 X-TIKA:parse_time_millis 2 resourceName b'39.txt' 250 txt/../pos/250.pos 729 txt/../pos/729.pos === file2bib.sh === id: 49 author: Polly, Jean Armour title: Surfing the Internet: An Introduction Version 2.0.2 date: pages: extension: .txt txt: ./txt/49.txt cache: ./cache/49.txt Content-Encoding ISO-8859-1 Content-Type text/plain; charset=ISO-8859-1 X-Parsed-By ['org.apache.tika.parser.DefaultParser', 'org.apache.tika.parser.csv.TextAndCSVParser'] X-TIKA:content_handler ToTextContentHandler X-TIKA:embedded_depth 0 X-TIKA:parse_time_millis 3 resourceName b'49.txt' === file2bib.sh === id: 29461 author: Digital Equipment Corporation title: Preliminary Specifications: Programmed Data Processor Model Three (PDP-3) October, 1960 date: pages: extension: .txt txt: ./txt/29461.txt cache: ./cache/29461.txt Content-Encoding UTF-8 Content-Type text/plain; charset=UTF-8 X-Parsed-By ['org.apache.tika.parser.DefaultParser', 'org.apache.tika.parser.csv.TextAndCSVParser'] X-TIKA:content_handler ToTextContentHandler X-TIKA:embedded_depth 0 X-TIKA:parse_time_millis 2 resourceName b'29461.txt' 29461 txt/../ent/29461.ent 729 txt/../wrd/729.wrd 729 txt/../ent/729.ent 250 txt/../wrd/250.wrd 250 txt/../ent/250.ent === file2bib.sh === OMP: Error #34: System unable to allocate necessary resources for OMP thread: OMP: System error #11: Resource temporarily unavailable OMP: Hint Try decreasing the value of OMP_NUM_THREADS. /data-disk/reader-compute/reader-classic/bin/file2bib.sh: line 39: 53086 Aborted $FILE2BIB "$FILE" > "$OUTPUT" === file2bib.sh === OMP: Error #34: System unable to allocate necessary resources for OMP thread: OMP: System error #11: Resource temporarily unavailable OMP: Hint Try decreasing the value of OMP_NUM_THREADS. /data-disk/reader-compute/reader-classic/bin/file2bib.sh: line 39: 52942 Aborted $FILE2BIB "$FILE" > "$OUTPUT" 34 txt/../pos/34.pos 42613 txt/../pos/42613.pos 34 txt/../wrd/34.wrd 42613 txt/../wrd/42613.wrd 34 txt/../ent/34.ent 42613 txt/../ent/42613.ent 5180 txt/../pos/5180.pos 5180 txt/../wrd/5180.wrd 53 txt/../wrd/53.wrd 5180 txt/../ent/5180.ent 118 txt/../pos/118.pos 53 txt/../pos/53.pos 5768 txt/../pos/5768.pos 118 txt/../wrd/118.wrd 53 txt/../ent/53.ent 5768 txt/../wrd/5768.wrd === file2bib.sh === OMP: Error #34: System unable to allocate necessary resources for OMP thread: OMP: System error #11: Resource temporarily unavailable OMP: Hint Try decreasing the value of OMP_NUM_THREADS. /data-disk/reader-compute/reader-classic/bin/file2bib.sh: line 39: 53151 Aborted $FILE2BIB "$FILE" > "$OUTPUT" 118 txt/../ent/118.ent 480 txt/../wrd/480.wrd 101 txt/../pos/101.pos 101 txt/../wrd/101.wrd 480 txt/../pos/480.pos 5768 txt/../ent/5768.ent === file2bib.sh === OMP: Error #34: System unable to allocate necessary resources for OMP thread: OMP: System error #11: Resource temporarily unavailable OMP: Hint Try decreasing the value of OMP_NUM_THREADS. /data-disk/reader-compute/reader-classic/bin/file2bib.sh: line 39: 52875 Aborted $FILE2BIB "$FILE" > "$OUTPUT" 30142 txt/../wrd/30142.wrd 30142 txt/../pos/30142.pos 4686 txt/../wrd/4686.wrd 4686 txt/../pos/4686.pos 101 txt/../ent/101.ent === file2bib.sh === id: 53 author: Library of Congress title: Workshop on Electronic Texts: Proceedings, 9-10 June 1992 date: pages: extension: .txt txt: ./txt/53.txt cache: ./cache/53.txt Content-Encoding ISO-8859-1 Content-Type text/plain; charset=ISO-8859-1 X-Parsed-By ['org.apache.tika.parser.DefaultParser', 'org.apache.tika.parser.csv.TextAndCSVParser'] X-TIKA:content_handler ToTextContentHandler X-TIKA:embedded_depth 0 X-TIKA:parse_time_millis 5 resourceName b'53.txt' 480 txt/../ent/480.ent 30142 txt/../ent/30142.ent 79 txt/../wrd/79.wrd 79 txt/../pos/79.pos 4686 txt/../ent/4686.ent === file2bib.sh === id: 30142 author: Doctorow, Cory title: Little Brother date: pages: extension: .txt txt: ./txt/30142.txt cache: ./cache/30142.txt Content-Encoding UTF-8 Content-Type text/plain; charset=UTF-8 X-Parsed-By ['org.apache.tika.parser.DefaultParser', 'org.apache.tika.parser.csv.TextAndCSVParser'] X-TIKA:content_handler ToTextContentHandler X-TIKA:embedded_depth 0 X-TIKA:parse_time_millis 6 resourceName b'30142.txt' === file2bib.sh === id: 5768 author: Williams, Sam title: Free as in Freedom: Richard Stallman's Crusade for Free Software date: pages: extension: .txt txt: ./txt/5768.txt cache: ./cache/5768.txt Content-Encoding ISO-8859-1 Content-Type text/plain; charset=ISO-8859-1 X-Parsed-By ['org.apache.tika.parser.DefaultParser', 'org.apache.tika.parser.csv.TextAndCSVParser'] X-TIKA:content_handler ToTextContentHandler X-TIKA:embedded_depth 0 X-TIKA:parse_time_millis 4 resourceName b'5768.txt' === file2bib.sh === id: 101 author: Sterling, Bruce title: The Hacker Crackdown: Law and Disorder on the Electronic Frontier date: pages: extension: .txt txt: ./txt/101.txt cache: ./cache/101.txt Content-Encoding ISO-8859-1 Content-Type text/plain; charset=ISO-8859-1 X-Parsed-By ['org.apache.tika.parser.DefaultParser', 'org.apache.tika.parser.csv.TextAndCSVParser'] X-TIKA:content_handler ToTextContentHandler X-TIKA:embedded_depth 0 X-TIKA:parse_time_millis 7 resourceName b'101.txt' === file2bib.sh === id: 480 author: Hutsko, Joe title: "Undo": A Novel date: pages: extension: .txt txt: ./txt/480.txt cache: ./cache/480.txt Content-Encoding ISO-8859-1 Content-Type text/plain; charset=ISO-8859-1 X-Parsed-By ['org.apache.tika.parser.DefaultParser', 'org.apache.tika.parser.csv.TextAndCSVParser'] X-TIKA:content_handler ToTextContentHandler X-TIKA:embedded_depth 0 X-TIKA:parse_time_millis 5 resourceName b'480.txt' 79 txt/../ent/79.ent === file2bib.sh === id: 4686 author: Dreyfus, Suelette title: Underground: Hacking, madness and obsession on the electronic frontier date: pages: extension: .txt txt: ./txt/4686.txt cache: ./cache/4686.txt Content-Encoding ISO-8859-1 Content-Type text/plain; charset=ISO-8859-1 X-Parsed-By ['org.apache.tika.parser.DefaultParser', 'org.apache.tika.parser.csv.TextAndCSVParser'] X-TIKA:content_handler ToTextContentHandler X-TIKA:embedded_depth 0 X-TIKA:parse_time_millis 8 resourceName b'4686.txt' === file2bib.sh === id: 79 author: Schwartau, Winn title: Terminal Compromise date: pages: extension: .txt txt: ./txt/79.txt cache: ./cache/79.txt Content-Encoding ISO-8859-1 Content-Type text/plain; charset=ISO-8859-1 X-Parsed-By ['org.apache.tika.parser.DefaultParser', 'org.apache.tika.parser.csv.TextAndCSVParser'] X-TIKA:content_handler ToTextContentHandler X-TIKA:embedded_depth 0 X-TIKA:parse_time_millis 23 resourceName b'79.txt' Done mapping. Reducing computer-from-gutenberg === reduce.pl bib === === reduce.pl bib === id = 37237 author = Digital Equipment Corporation title = Digital PDP15 Price List, April, 1970 date = pages = extension = .txt mime = text/plain words = 3017 sentences = 785 flesch = 87 summary = DIGITAL PDP15 PRICE LIST; April 1970 with KSR-35 Teletype--PC15 required $17,800 $172.00 Yes with KSR-35 Teletype--PC15 required $17,800 $172.00 Yes TC02D DECtape control for 3 DW15A 20 240 5,400 Yes RP15 Disk Pack Control for None 100 450 18,000 Yes LT19E Line Unit LT19A 2 120 800 Yes DB98A PDP-15 (9 or 9/L) to 3,4 DW15A 15 250 7,000 Yes DB98A PDP-15 (9 or 9/L) to 3,4 DW15A 15 250 7,000 Yes AA15A Multiplexer Control 2,600 Yes AAC2 Digital-to-Analog AA15 350 Yes AF01B 6-12 Bit Analog-to3 DW15A 8 240 5,000 Yes AH02 One-Channel of AF01B 6 150 500 Yes ADC1/9 6-12 Bit Analog-to3 DW15A 8 160 3,265 Yes A111 2-Channel Multiplexer AM03 2 40 93 Yes 146 Main Street, Maynard, Massachusetts, U.S.A. 01754 · Telephone: 130 Allens Creek Road, Rochester, New York 14618 1100 West Valley Road, Wayne, Pennsylvania 19087 3417 Milam Street, Suite A, Houston, Texas 77002 cache = ./cache/37237.txt txt = ./txt/37237.txt === reduce.pl bib === === reduce.pl bib === id = 37504 author = Anonymous title = IBM System 360 RPG Debugging Template and Keypunch Card date = pages = extension = .txt mime = text/plain words = 1635 sentences = 342 flesch = 111 summary = The dimensions of the debugging template and the keypunch card The debugging template contains two sections on the front and the left-hand edge: IBM J33837. The front of the keypunch card is labelled vertically along the right-hand edge: PRYOR 5081. 43-48 RESULT FIELD 40-43 END POS IN OUTPUT RECORD 38 Z ZERO SUPP. 16 STACKER 54-59 NAME OF LABEL EXIT 47-52 SYMBOLIC DEVICE 40-46 DEVICE 33-34 OVERFLOW INDICATOR 32 IDT TYPE OF FILE ORG. 31 KI RECORD ADDRESS TYPE 29-30 LENGTH OF RECORD ADDRESS FIELD 24-27 RECORD LENGTH 17 E END OF FILE 15 IOUC FILE TYPE 6 FILE DESCRIPTION SPECS. 40-42 LENGTH OF TABLE ENTRY 40-42 LENGTH OF TABLE ENTRY OF TABLE ENTRIES PER RECORD 9-10 NUMBER OF THE CHAINING FIELD 78 RECORD SEQUENCE OF THE CHAINING FILE 6 FILE EXT. 69-70 ZERO BLK | | 69-70 ZERO BLK | | 63-64 FIELD RECORD RELATION 42 STACKER SELECT INDIC. INDIC. cache = ./cache/37504.txt txt = ./txt/37504.txt === reduce.pl bib === id = 29461 author = Digital Equipment Corporation title = Preliminary Specifications: Programmed Data Processor Model Three (PDP-3) October, 1960 date = pages = extension = .txt mime = text/plain words = 10483 sentences = 1015 flesch = 71 summary = single address, single instruction machine operating in parallel on 36 The address portion of the Memory Buffer Register communicates with the Index Adder, the Memory Address Register, and the Program instruction, thus, the address portion of the Memory Buffer is connected The Program Counter holds the memory location of the next instruction to The Instruction Register receives the first six bits of the Memory The six Sense Switches allow the operator to manually select program Buffer Register, the Arithmetic Element, and the Memory Addressing Operating times of PDP-3 instructions are normally multiples of the address an index register for memory-type instructions. is in the shift and rotate instructions in which the memory address the memory register containing the indirect address also has a 1 in bit Program Counter is indexed one extra position and the next instruction For each In-Out Transfer instruction, six lines of paper tape are read cache = ./cache/29461.txt txt = ./txt/29461.txt === reduce.pl bib === id = 39 author = Krol, Ed title = Hitchhiker's Guide to the Internet date = pages = extension = .txt mime = text/plain words = 7525 sentences = 543 flesch = 70 summary = experimental network connecting hosts and terminal servers RFC-791, The Internet Protocol) must be implemented on any host backbone, regional network, and Internet inter-connection Before a local network can be connected to the Internet it octet as a network address and the remaining three as a host In the past sites requiring multiple network addresses Information on how to reach a particular network (routing information) must be stored in Internet gateways and packet Gateways exchange network routing information. Routing is the algorithm by which a network directs a packet RIP is a routing protocol based on XNS (Xerox Network machine on a network with multiple RIP speaking gateways. names and one or more network addresses (connections) to network with multiple gateways, and a host sends a RFC-947 * Multi-network Broadcasting within the Internet RFC-974 Mail Routing and the Domain System RFC-1009 Requirements for Internet Gateways Network Information Center (NIC) cache = ./cache/39.txt txt = ./txt/39.txt === reduce.pl bib === id = 4686 author = Dreyfus, Suelette title = Underground: Hacking, madness and obsession on the electronic frontier date = pages = extension = .txt mime = text/plain words = 158580 sentences = 12489 flesch = 80 summary = work over time: the individual's hacking adventures, the police raid wasn't changed, the aspiring hacker would look like a guy who couldn't 'Where did you get those numbers?' Par asked Force next time they were The loose-knit network of hackers worked a bit like the Being on the run for so long had changed Par. Some time after she returned to Switzerland, Theorem's access to Altos hackers--told the Secret Service that Par was not the 'Citibank Force liked Phoenix and was impressed by the new hacker's enthusiasm Electron wanted Phoenix to read the security file so they could bounce Electron and Phoenix logged onto Altos and waited for Pad or Gandalf While Phoenix and Electron waited on-line for Pad to return, Par Electron knew Par was on the run at the time. Like the three Australian hackers, Pad, Gandalf and the little-known what phone number the hacker was calling from, Mendax would know. cache = ./cache/4686.txt txt = ./txt/4686.txt === reduce.pl bib === id = 27468 author = Anonymous title = IBM 1401 Programming Systems date = pages = extension = .txt mime = text/plain words = 1256 sentences = 134 flesch = 55 summary = IBM Programming Languages and their significance to management._ Page 2: Here an operator points to machine language instructions for a new simplified vocabulary of statements to use in writing programs, and (2) =What 1401 Programming Systems Mean To Management:= Simplified programming routines allow programmers to write more Many pre-written programs are supplied by IBM, eliminating necessity of Pre-written programs have already been tested by IBM, reducing tedious IBM Programming Systems: IBM Programming Systems: applications.[A] COBOL permits a programmer to use language based on customers who also use larger data processing systems. This example illustrates how the Report Program Generator simplifies the But with the Report Program Generator, all the programmer has to write The Report Program Generator The Report Program Generator is an example of what IBM Programming Systems can accomplish. To assist the IBM programming staff in reflecting customer requirements in the specification of new programming systems. cache = ./cache/27468.txt txt = ./txt/27468.txt === reduce.pl bib === === reduce.pl bib === === reduce.pl bib === id = 929 author = St. Jude title = The Real Cyberpunk Fakebook date = pages = extension = .txt mime = text/plain words = 7122 sentences = 1575 flesch = 96 summary = The Real Cyberpunk Fakebook, by St. Jude, R.U. Sirius time and were cyberpunks *twelve years ago*-we never sneer Chapter 1/ CYBERPUNK: A CHALLENGING POSTMODERN LIFESTYLE! Chapter 5/ CHEATCARDS FOR BOOKS YOU SHOULD HAVE READ Chapter 7/ ONLINE THINGS YOU SHOULD KNOW ABOUT Chapter 16/ CYBERPUNK LIFESTYLE HINTS Chapter 17/ CYBERPUNK SECRETS REVEALED! + The Real Reason Why Cyberpunks Need to Encrypt Their Email Chapter 18/ CYBERPUNK: THE INNER GAME Chapter 19/ CYBERPUNK: THE PARENTAL-DISCRETION SPECIAL Chapter 2: ACHIEVING CYBERPUNK Chapter 2: ACHIEVING CYBERPUNK What is there to know about being a cyberpunk? You think cyberpunk is just a leather jacket, some chrome While a cyberpunk is commonly a middleclass white male with way too many don't know why all cyberpunks need a laser pointer, but it's mandatory.) Maybe you should stick to basic cyberpunk. Chapter 4: Building Your Cyber Word Power Chapter 4: Building Your Cyber Word Power cache = ./cache/929.txt txt = ./txt/929.txt === reduce.pl bib === id = 101 author = Sterling, Bruce title = The Hacker Crackdown: Law and Disorder on the Electronic Frontier date = pages = extension = .txt mime = text/plain words = 105579 sentences = 7348 flesch = 72 summary = private telephone security, and state and local law enforcement groups by professional grifters and by underground hackers and phone phreaks, Said the New York Times Service: "Telephone company executives the magazine was seized by police and Pacific Bell phone-company officials. which a few hackers and law enforcement people actually do use. hackers often talk about common board topics, such as hardware, software, of the hacker group "Tribunal of Knowledge." People came and went knew hackers liked to "break into computers:" but telephone people's The Secret Service scrambler-phones and secured lines put in New York, Fry Guy switched the card-holder's number to a local pay-phone. to monitor phone-calls to the police and Secret Service. on hackers is why the United States Secret Service has anything at all as Secret Service people in particular examine bulletin boards with cops with hackers, civil rights with FBI, Secret Service with phone phreaks. cache = ./cache/101.txt txt = ./txt/101.txt === reduce.pl bib === id = 56 author = Polly, Jean Armour title = NREN for All: Insurmountable Opportunity date = pages = extension = .txt mime = text/plain words = 4214 sentences = 295 flesch = 59 summary = -access to digital libraries of information, both textual and graphic. Library of Congress-to collect information on dinosaurs. library act as electronic information access centers, providing public Why the Public Library is a good place for NREN access 1. Books and other library resources should be provided for the 2. Libraries should provide materials and information Public libraries will offer access to all Public libraries also provide "free" services, though in fact the costs Why NREN in the Public Library is a bad idea The public library may find itself servicing of information resources and services electronically." "In this scenario, the public library will develop and mount services public libraries need NREN. "digital libraries" of electronic information. Public Libraries and the INTERNET/NREN: New Challenges, New Opportunities. the Publication Office, School of Information Studies, Syracuse The U.S. National Commission on Libraries and Information Technology Policy on Library and Information Services' Roles in cache = ./cache/56.txt txt = ./txt/56.txt === reduce.pl bib === id = 30142 author = Doctorow, Cory title = Little Brother date = pages = extension = .txt mime = text/plain words = 124084 sentences = 10356 flesch = 91 summary = What's more, kids were clearly being used as guinea-pigs for a new kind of technological state that all of us were on our way to, a world where taking a picture was either piracy (in a movie theater or museum or even a Starbucks), or terrorism (in a public place), but where we could be photographed, tracked and logged hundreds of times a day by every tin-pot dictator, cop, bureaucrat and shop-keeper. "I can talk about Little Brother in terms of its bravura political speculation or its brilliant uses of technology -each of which make this book a must-read -but, at the end of it all, I'm haunted by the universality of Marcus's rite-of-passage and struggle, an experience any teen today is going to grasp: the moment when you choose what your life will mean and how to achieve it." He looked like he was Chinese or Korean -even Van can't tell the difference sometimes -but with that bearing that said *American* in a way I couldn't put my finger on. cache = ./cache/30142.txt txt = ./txt/30142.txt === reduce.pl bib === id = 49 author = Polly, Jean Armour title = Surfing the Internet: An Introduction Version 2.0.2 date = pages = extension = .txt mime = text/plain words = 9444 sentences = 1010 flesch = 69 summary = discussion lists, electronic journals and texts, and resources available Join EFF to be added to the mailing list or ftp the files yourself from and Internet Resource Guide, and a gateway to other library systems. An FTP visit to the Network Service Center at nnsc.nsf.net (128.89.1.178) provide an electronic directory service for locating information in an gopher items, immediately accessible via the gopher client just doubleclick to open directories, read files, or perform other searches -across includes a full suite of internet activities (mail, news, ftp, telnet). Services offered by The World include internet electronic mail, For a list of Internet Service Providers contact: networks, Free-Nets, subscription services, and where to get more information ftp to NIC.MERIT.EDU /internet/resources. Internet connectivity and software that does file transfers via FTP. Internet connectivity and software that does file transfers via FTP. New-List, the List of Lists, and the Internet Interest Groups file." cache = ./cache/49.txt txt = ./txt/49.txt === reduce.pl bib === === reduce.pl bib === id = 53 author = Library of Congress title = Workshop on Electronic Texts: Proceedings, 9-10 June 1992 date = pages = extension = .txt mime = text/plain words = 70864 sentences = 10819 flesch = 72 summary = Cornell project are creating digital image sets of older books in the books on microfilm to digital image sets, Project Open Book (POB). that electronic images constitute a serious attempt to represent text in to bring together people who are working on texts and images. imaging, text-coding, and networked distribution that suit their Evaluation of the prospects for the use of electronic texts includes two projects that involve electronic texts were being done by people with a numerous network experiments in accessing full-text materials, including The students with either electronic format, text or image, electronic text, which was developed through the use of computers in the coming together of people working on texts and not images. electronic texts, and the implications of that use for information databases, image (and text) document collections stored on network "file In the use of electronic imaging for document preservation, there are cache = ./cache/53.txt txt = ./txt/53.txt === reduce.pl bib === id = 5768 author = Williams, Sam title = Free as in Freedom: Richard Stallman's Crusade for Free Software date = pages = extension = .txt mime = text/plain words = 75706 sentences = 4559 flesch = 68 summary = Free As in Freedom: Richard Stallman's Crusade for Free Software. "I do free software," Stallman says to rising laughter. Most importantly, Stallman says, software programs and high-quality software programs Stallman has built, program to examine another," says Stallman, recalling the Free Software Foundation, Stallman wisecracks, free software tools and programs for the GNU Project, When it comes to copyrighted works, Stallman says he Stallman, the hacker who coined the Twenex term, says the AI Lab's hacker staff, Stallman says many of the if they restrict the use of these programs."See Richard Stallman, "The GNU the free software model, Stallman has held up the better software," says Stallman. distribute copies of the software, or if you modify it.See Richard Stallman, et [Stallman's] software, but also all of the other GNU According to Stallman, improving software programs was deference to Stallman and the Free Software Foundation Stallman was the software cache = ./cache/5768.txt txt = ./txt/5768.txt === reduce.pl bib === id = 79 author = Schwartau, Winn title = Terminal Compromise date = pages = extension = .txt mime = text/plain words = 218665 sentences = 24744 flesch = 86 summary = Now as a New York City Times reporter, Mason understands both the good and the evil of technology and discovers Within 2 minutes of the time Miles Foster announced his resignations as a communications expert with the National Security In only seven years as a reporter Scott Mason had developed quite a reputation for himself, and for the New York City Scott's credentials as a reporter for the New York City Times got him past the secretary "By the way," Scott said to Tyrone. "You think the NYPD would know what to look for?" Scott said "The New York City Times," Duncan said, confident that Scott "Scott, what is going on here?" Higgins asked but Doug wanted to "Let me ask you," Scott said to the group. "Let me ask you," Scott said to the group. "This doesn't sound like the Spook I know," Scott said after "Scott's going after Homosoto," said Tyrone. cache = ./cache/79.txt txt = ./txt/79.txt === reduce.pl bib === id = 480 author = Hutsko, Joe title = "Undo": A Novel date = pages = extension = .txt mime = text/plain words = 104072 sentences = 9081 flesch = 88 summary = Matthew turned just in time to see Peter's office door slam "Okay, Peter," Matthew said with a resigned sigh. That said, Matthew halted his friendship with Peter, "Matthew, you're not right for Wallaby anymore," he said. "Peter, " Matthew said, cutting him off. "As I said," Matthew went on, planting both of his hands on the "Matthew, now I'm getting angry," Peter said, rising from his "Alan," Peter said, resting his hand on Parker's shoulder. said, flinging a hand towards Matthew, "who let things get to "Well forget it, Matthew," Peter said. "Good luck," William said, shaking Matthew's hand. "Okay," Byron said, settling his hands on both Kate's and Peter's "How come the time off?" Matthew said, without much interest. Here," Byron said, handing Peter a small Matthew said, "When they find out that Peter has been talking to "I know you met with Peter Jones today," Matthew said, glancing cache = ./cache/480.txt txt = ./txt/480.txt === reduce.pl bib === Building ./etc/reader.txt 79 4686 101 101 79 4686 number of items: 21 sum of words: 902,246 average size in words: 60,149 average readability score: 78 nouns: computer; time; system; people; information; software; way; computers; internet; phone; hackers; something; access; world; years; number; program; network; hacker; systems; day; line; message; name; file; data; work; mail; one; security; case; things; library; room; company; machine; -; police; use; hand; sites; thing; anything; web; text; government; list; book; place; programs verbs: was; is; had; be; have; are; were; do; ''s; said; been; did; get; has; know; see; ''re; want; make; made; going; go; got; use; used; take; think; being; ''m; called; asked; does; thought; let; say; ''ve; knew; put; wanted; looked; using; found; told; find; came; come; read; took; went; felt adjectives: other; more; many; new; few; first; good; public; own; little; such; same; free; electronic; most; much; available; high; different; last; several; large; long; small; -; real; old; next; right; full; great; big; local; able; sure; possible; particular; only; best; bad; least; private; open; second; better; american; hard; single; whole; certain adverbs: not; n''t; up; so; out; just; then; now; only; even; also; back; more; as; down; very; in; never; too; again; off; still; here; well; all; there; on; really; away; however; most; much; over; ever; around; once; almost; maybe; already; first; else; later; always; together; often; far; yet; long; enough; right pronouns: it; he; i; you; his; they; she; we; her; their; my; your; him; me; them; its; our; us; himself; one; itself; themselves; ''s; myself; herself; yourself; yours; ourselves; mine; ya; hers; ''em; ours; theirs; oneself; huh; rn; bookshelf; em; you''re; s; i''ve; i''m; ftp; freebsd; you''ll; y; ucmp1.berkeley.edu; ty; this proper nouns: scott; _; stallman; peter; matthew; par; new; miles; phoenix; electron; unix; service; york; university; pierre; mendax; u.s.; computer; wallaby; homosoto; william; nasa; mr.; first; secret; national; library; president; gnu; united; us; states; california; project; pad; spook; usenet; washington; ftp; bell; anthrax; at&t; san; joey; opt; center; america; amendment; mason; information keywords: internet; computer; university; system; unix; new; network; library; information; hacker; project; national; look; ibm; good; american; york; usenet; united; u.s.; time; site; service; secret; right; program; pierre; phoenix; peter; nasa; mr.; mit; mail; like; license; ftp; free; force; document; court; congress; chapter; california; bbs; zardoz; yes; year; xnet; xerox; xbox one topic; one dimension: computer file(s): titles(s): Hackers, Heroes of the Computer Revolution. Chapters 1 and 2 three topics; one dimension: said; computer; computer file(s): ./cache/79.txt, ./cache/53.txt, titles(s): Terminal Compromise | Workshop on Electronic Texts: Proceedings, 9-10 June 1992 | Children's Internet Protection Act (CIPA) Ruling five topics; three dimensions: scott said stallman; internet use information; computer par electron; said peter matthew; computer people service file(s): ./cache/79.txt, ./cache/53.txt, ./cache/4686.txt, ./cache/480.txt, ./cache/101.txt titles(s): Terminal Compromise | Workshop on Electronic Texts: Proceedings, 9-10 June 1992 | Underground: Hacking, madness and obsession on the electronic frontier | "Undo": A Novel | The Hacker Crackdown: Law and Disorder on the Electronic Frontier Type: gutenberg title: computer-from-gutenberg date: 2021-01-16 time: 03:08 username: emorgan patron: Eric Morgan email: emorgan@nd.edu input: subject:computer ==== make-pages.sh htm files ==== make-pages.sh complex files ==== make-pages.sh named enities ==== making bibliographics id: 37504 author: Anonymous title: IBM System 360 RPG Debugging Template and Keypunch Card date: words: 1635.0 sentences: 342.0 pages: flesch: 111.0 cache: ./cache/37504.txt txt: ./txt/37504.txt summary: The dimensions of the debugging template and the keypunch card The debugging template contains two sections on the front and the left-hand edge: IBM J33837. The front of the keypunch card is labelled vertically along the right-hand edge: PRYOR 5081. 43-48 RESULT FIELD 40-43 END POS IN OUTPUT RECORD 38 Z ZERO SUPP. 16 STACKER 54-59 NAME OF LABEL EXIT 47-52 SYMBOLIC DEVICE 40-46 DEVICE 33-34 OVERFLOW INDICATOR 32 IDT TYPE OF FILE ORG. 31 KI RECORD ADDRESS TYPE 29-30 LENGTH OF RECORD ADDRESS FIELD 24-27 RECORD LENGTH 17 E END OF FILE 15 IOUC FILE TYPE 6 FILE DESCRIPTION SPECS. 40-42 LENGTH OF TABLE ENTRY 40-42 LENGTH OF TABLE ENTRY OF TABLE ENTRIES PER RECORD 9-10 NUMBER OF THE CHAINING FIELD 78 RECORD SEQUENCE OF THE CHAINING FILE 6 FILE EXT. 69-70 ZERO BLK | | 69-70 ZERO BLK | | 63-64 FIELD RECORD RELATION 42 STACKER SELECT INDIC. INDIC. id: 27468 author: Anonymous title: IBM 1401 Programming Systems date: words: 1256.0 sentences: 134.0 pages: flesch: 55.0 cache: ./cache/27468.txt txt: ./txt/27468.txt summary: IBM Programming Languages and their significance to management._ Page 2: Here an operator points to machine language instructions for a new simplified vocabulary of statements to use in writing programs, and (2) =What 1401 Programming Systems Mean To Management:= Simplified programming routines allow programmers to write more Many pre-written programs are supplied by IBM, eliminating necessity of Pre-written programs have already been tested by IBM, reducing tedious IBM Programming Systems: IBM Programming Systems: applications.[A] COBOL permits a programmer to use language based on customers who also use larger data processing systems. This example illustrates how the Report Program Generator simplifies the But with the Report Program Generator, all the programmer has to write The Report Program Generator The Report Program Generator is an example of what IBM Programming Systems can accomplish. To assist the IBM programming staff in reflecting customer requirements in the specification of new programming systems. id: 37237 author: Digital Equipment Corporation title: Digital PDP15 Price List, April, 1970 date: words: 3017.0 sentences: 785.0 pages: flesch: 87.0 cache: ./cache/37237.txt txt: ./txt/37237.txt summary: DIGITAL PDP15 PRICE LIST; April 1970 with KSR-35 Teletype--PC15 required $17,800 $172.00 Yes with KSR-35 Teletype--PC15 required $17,800 $172.00 Yes TC02D DECtape control for 3 DW15A 20 240 5,400 Yes RP15 Disk Pack Control for None 100 450 18,000 Yes LT19E Line Unit LT19A 2 120 800 Yes DB98A PDP-15 (9 or 9/L) to 3,4 DW15A 15 250 7,000 Yes DB98A PDP-15 (9 or 9/L) to 3,4 DW15A 15 250 7,000 Yes AA15A Multiplexer Control 2,600 Yes AAC2 Digital-to-Analog AA15 350 Yes AF01B 6-12 Bit Analog-to3 DW15A 8 240 5,000 Yes AH02 One-Channel of AF01B 6 150 500 Yes ADC1/9 6-12 Bit Analog-to3 DW15A 8 160 3,265 Yes A111 2-Channel Multiplexer AM03 2 40 93 Yes 146 Main Street, Maynard, Massachusetts, U.S.A. 01754 · Telephone: 130 Allens Creek Road, Rochester, New York 14618 1100 West Valley Road, Wayne, Pennsylvania 19087 3417 Milam Street, Suite A, Houston, Texas 77002 id: 29461 author: Digital Equipment Corporation title: Preliminary Specifications: Programmed Data Processor Model Three (PDP-3) October, 1960 date: words: 10483.0 sentences: 1015.0 pages: flesch: 71.0 cache: ./cache/29461.txt txt: ./txt/29461.txt summary: single address, single instruction machine operating in parallel on 36 The address portion of the Memory Buffer Register communicates with the Index Adder, the Memory Address Register, and the Program instruction, thus, the address portion of the Memory Buffer is connected The Program Counter holds the memory location of the next instruction to The Instruction Register receives the first six bits of the Memory The six Sense Switches allow the operator to manually select program Buffer Register, the Arithmetic Element, and the Memory Addressing Operating times of PDP-3 instructions are normally multiples of the address an index register for memory-type instructions. is in the shift and rotate instructions in which the memory address the memory register containing the indirect address also has a 1 in bit Program Counter is indexed one extra position and the next instruction For each In-Out Transfer instruction, six lines of paper tape are read id: 30142 author: Doctorow, Cory title: Little Brother date: words: 124084.0 sentences: 10356.0 pages: flesch: 91.0 cache: ./cache/30142.txt txt: ./txt/30142.txt summary: What''s more, kids were clearly being used as guinea-pigs for a new kind of technological state that all of us were on our way to, a world where taking a picture was either piracy (in a movie theater or museum or even a Starbucks), or terrorism (in a public place), but where we could be photographed, tracked and logged hundreds of times a day by every tin-pot dictator, cop, bureaucrat and shop-keeper. "I can talk about Little Brother in terms of its bravura political speculation or its brilliant uses of technology -each of which make this book a must-read -but, at the end of it all, I''m haunted by the universality of Marcus''s rite-of-passage and struggle, an experience any teen today is going to grasp: the moment when you choose what your life will mean and how to achieve it." He looked like he was Chinese or Korean -even Van can''t tell the difference sometimes -but with that bearing that said *American* in a way I couldn''t put my finger on. id: 4686 author: Dreyfus, Suelette title: Underground: Hacking, madness and obsession on the electronic frontier date: words: 158580.0 sentences: 12489.0 pages: flesch: 80.0 cache: ./cache/4686.txt txt: ./txt/4686.txt summary: work over time: the individual''s hacking adventures, the police raid wasn''t changed, the aspiring hacker would look like a guy who couldn''t ''Where did you get those numbers?'' Par asked Force next time they were The loose-knit network of hackers worked a bit like the Being on the run for so long had changed Par. Some time after she returned to Switzerland, Theorem''s access to Altos hackers--told the Secret Service that Par was not the ''Citibank Force liked Phoenix and was impressed by the new hacker''s enthusiasm Electron wanted Phoenix to read the security file so they could bounce Electron and Phoenix logged onto Altos and waited for Pad or Gandalf While Phoenix and Electron waited on-line for Pad to return, Par Electron knew Par was on the run at the time. Like the three Australian hackers, Pad, Gandalf and the little-known what phone number the hacker was calling from, Mendax would know. id: 118 author: Electronic Frontier Foundation title: Big Dummy's Guide to the Internet date: words: nan sentences: nan pages: flesch: nan cache: txt: summary: id: 250 author: Fuller, Maxwell title: A Brief History of the Internet The Bright Side: The Dark Side date: words: nan sentences: nan pages: flesch: nan cache: txt: summary: id: 480 author: Hutsko, Joe title: "Undo": A Novel date: words: 104072.0 sentences: 9081.0 pages: flesch: 88.0 cache: ./cache/480.txt txt: ./txt/480.txt summary: Matthew turned just in time to see Peter''s office door slam "Okay, Peter," Matthew said with a resigned sigh. That said, Matthew halted his friendship with Peter, "Matthew, you''re not right for Wallaby anymore," he said. "Peter, " Matthew said, cutting him off. "As I said," Matthew went on, planting both of his hands on the "Matthew, now I''m getting angry," Peter said, rising from his "Alan," Peter said, resting his hand on Parker''s shoulder. said, flinging a hand towards Matthew, "who let things get to "Well forget it, Matthew," Peter said. "Good luck," William said, shaking Matthew''s hand. "Okay," Byron said, settling his hands on both Kate''s and Peter''s "How come the time off?" Matthew said, without much interest. Here," Byron said, handing Peter a small Matthew said, "When they find out that Peter has been talking to "I know you met with Peter Jones today," Matthew said, glancing id: 34 author: Kehoe, Brendan P. title: Zen and the Art of the Internet date: words: nan sentences: nan pages: flesch: nan cache: txt: summary: id: 39 author: Krol, Ed title: Hitchhiker''s Guide to the Internet date: words: 7525.0 sentences: 543.0 pages: flesch: 70.0 cache: ./cache/39.txt txt: ./txt/39.txt summary: experimental network connecting hosts and terminal servers RFC-791, The Internet Protocol) must be implemented on any host backbone, regional network, and Internet inter-connection Before a local network can be connected to the Internet it octet as a network address and the remaining three as a host In the past sites requiring multiple network addresses Information on how to reach a particular network (routing information) must be stored in Internet gateways and packet Gateways exchange network routing information. Routing is the algorithm by which a network directs a packet RIP is a routing protocol based on XNS (Xerox Network machine on a network with multiple RIP speaking gateways. names and one or more network addresses (connections) to network with multiple gateways, and a host sends a RFC-947 * Multi-network Broadcasting within the Internet RFC-974 Mail Routing and the Domain System RFC-1009 Requirements for Internet Gateways Network Information Center (NIC) id: 729 author: Levy, Steven title: Hackers, Heroes of the Computer Revolution. Chapters 1 and 2 date: words: nan sentences: nan pages: flesch: nan cache: txt: summary: id: 53 author: Library of Congress title: Workshop on Electronic Texts: Proceedings, 9-10 June 1992 date: words: 70864.0 sentences: 10819.0 pages: flesch: 72.0 cache: ./cache/53.txt txt: ./txt/53.txt summary: Cornell project are creating digital image sets of older books in the books on microfilm to digital image sets, Project Open Book (POB). that electronic images constitute a serious attempt to represent text in to bring together people who are working on texts and images. imaging, text-coding, and networked distribution that suit their Evaluation of the prospects for the use of electronic texts includes two projects that involve electronic texts were being done by people with a numerous network experiments in accessing full-text materials, including The students with either electronic format, text or image, electronic text, which was developed through the use of computers in the coming together of people working on texts and not images. electronic texts, and the implications of that use for information databases, image (and text) document collections stored on network "file In the use of electronic imaging for document preservation, there are id: 42613 author: National Research Council (U.S.). Ad Hoc Panel on On-line Computers in Nuclear Research title: On-Line Data-Acquisition Systems in Nuclear Physics, 1969 date: words: nan sentences: nan pages: flesch: nan cache: txt: summary: id: 56 author: Polly, Jean Armour title: NREN for All: Insurmountable Opportunity date: words: 4214.0 sentences: 295.0 pages: flesch: 59.0 cache: ./cache/56.txt txt: ./txt/56.txt summary: -access to digital libraries of information, both textual and graphic. Library of Congress-to collect information on dinosaurs. library act as electronic information access centers, providing public Why the Public Library is a good place for NREN access 1. Books and other library resources should be provided for the 2. Libraries should provide materials and information Public libraries will offer access to all Public libraries also provide "free" services, though in fact the costs Why NREN in the Public Library is a bad idea The public library may find itself servicing of information resources and services electronically." "In this scenario, the public library will develop and mount services public libraries need NREN. "digital libraries" of electronic information. Public Libraries and the INTERNET/NREN: New Challenges, New Opportunities. the Publication Office, School of Information Studies, Syracuse The U.S. National Commission on Libraries and Information Technology Policy on Library and Information Services'' Roles in id: 49 author: Polly, Jean Armour title: Surfing the Internet: An Introduction Version 2.0.2 date: words: 9444.0 sentences: 1010.0 pages: flesch: 69.0 cache: ./cache/49.txt txt: ./txt/49.txt summary: discussion lists, electronic journals and texts, and resources available Join EFF to be added to the mailing list or ftp the files yourself from and Internet Resource Guide, and a gateway to other library systems. An FTP visit to the Network Service Center at nnsc.nsf.net (128.89.1.178) provide an electronic directory service for locating information in an gopher items, immediately accessible via the gopher client just doubleclick to open directories, read files, or perform other searches -across includes a full suite of internet activities (mail, news, ftp, telnet). Services offered by The World include internet electronic mail, For a list of Internet Service Providers contact: networks, Free-Nets, subscription services, and where to get more information ftp to NIC.MERIT.EDU /internet/resources. Internet connectivity and software that does file transfers via FTP. Internet connectivity and software that does file transfers via FTP. New-List, the List of Lists, and the Internet Interest Groups file." id: 79 author: Schwartau, Winn title: Terminal Compromise date: words: 218665.0 sentences: 24744.0 pages: flesch: 86.0 cache: ./cache/79.txt txt: ./txt/79.txt summary: Now as a New York City Times reporter, Mason understands both the good and the evil of technology and discovers Within 2 minutes of the time Miles Foster announced his resignations as a communications expert with the National Security In only seven years as a reporter Scott Mason had developed quite a reputation for himself, and for the New York City Scott''s credentials as a reporter for the New York City Times got him past the secretary "By the way," Scott said to Tyrone. "You think the NYPD would know what to look for?" Scott said "The New York City Times," Duncan said, confident that Scott "Scott, what is going on here?" Higgins asked but Doug wanted to "Let me ask you," Scott said to the group. "Let me ask you," Scott said to the group. "This doesn''t sound like the Spook I know," Scott said after "Scott''s going after Homosoto," said Tyrone. id: 929 author: St. Jude title: The Real Cyberpunk Fakebook date: words: 7122.0 sentences: 1575.0 pages: flesch: 96.0 cache: ./cache/929.txt txt: ./txt/929.txt summary: The Real Cyberpunk Fakebook, by St. Jude, R.U. Sirius time and were cyberpunks *twelve years ago*-we never sneer Chapter 1/ CYBERPUNK: A CHALLENGING POSTMODERN LIFESTYLE! Chapter 5/ CHEATCARDS FOR BOOKS YOU SHOULD HAVE READ Chapter 7/ ONLINE THINGS YOU SHOULD KNOW ABOUT Chapter 16/ CYBERPUNK LIFESTYLE HINTS Chapter 17/ CYBERPUNK SECRETS REVEALED! + The Real Reason Why Cyberpunks Need to Encrypt Their Email Chapter 18/ CYBERPUNK: THE INNER GAME Chapter 19/ CYBERPUNK: THE PARENTAL-DISCRETION SPECIAL Chapter 2: ACHIEVING CYBERPUNK Chapter 2: ACHIEVING CYBERPUNK What is there to know about being a cyberpunk? You think cyberpunk is just a leather jacket, some chrome While a cyberpunk is commonly a middleclass white male with way too many don''t know why all cyberpunks need a laser pointer, but it''s mandatory.) Maybe you should stick to basic cyberpunk. Chapter 4: Building Your Cyber Word Power Chapter 4: Building Your Cyber Word Power id: 101 author: Sterling, Bruce title: The Hacker Crackdown: Law and Disorder on the Electronic Frontier date: words: 105579.0 sentences: 7348.0 pages: flesch: 72.0 cache: ./cache/101.txt txt: ./txt/101.txt summary: private telephone security, and state and local law enforcement groups by professional grifters and by underground hackers and phone phreaks, Said the New York Times Service: "Telephone company executives the magazine was seized by police and Pacific Bell phone-company officials. which a few hackers and law enforcement people actually do use. hackers often talk about common board topics, such as hardware, software, of the hacker group "Tribunal of Knowledge." People came and went knew hackers liked to "break into computers:" but telephone people''s The Secret Service scrambler-phones and secured lines put in New York, Fry Guy switched the card-holder''s number to a local pay-phone. to monitor phone-calls to the police and Secret Service. on hackers is why the United States Secret Service has anything at all as Secret Service people in particular examine bulletin boards with cops with hackers, civil rights with FBI, Secret Service with phone phreaks. id: 5180 author: United States District Court for the Eastern District of Pennsylvania title: Children's Internet Protection Act (CIPA) Ruling date: words: nan sentences: nan pages: flesch: nan cache: txt: summary: id: 5768 author: Williams, Sam title: Free as in Freedom: Richard Stallman''s Crusade for Free Software date: words: 75706.0 sentences: 4559.0 pages: flesch: 68.0 cache: ./cache/5768.txt txt: ./txt/5768.txt summary: Free As in Freedom: Richard Stallman''s Crusade for Free Software. "I do free software," Stallman says to rising laughter. Most importantly, Stallman says, software programs and high-quality software programs Stallman has built, program to examine another," says Stallman, recalling the Free Software Foundation, Stallman wisecracks, free software tools and programs for the GNU Project, When it comes to copyrighted works, Stallman says he Stallman, the hacker who coined the Twenex term, says the AI Lab''s hacker staff, Stallman says many of the if they restrict the use of these programs."See Richard Stallman, "The GNU the free software model, Stallman has held up the better software," says Stallman. distribute copies of the software, or if you modify it.See Richard Stallman, et [Stallman''s] software, but also all of the other GNU According to Stallman, improving software programs was deference to Stallman and the Free Software Foundation Stallman was the software ==== make-pages.sh questions ==== make-pages.sh search ==== make-pages.sh topic modeling corpus Zipping study carrel