Hackers
          Beginning of paper
Introduction . . . . . . . . . . . . . . . . . . . 1 
Methodology . . . . . . . . . . . . . . . . . . . 6 
What is the Computer Underground? . . . . . . . . 11 
Topography of the Computer Underground . . . . . . 20 
Hacking . . . . . . . . . . . . . . . . . 20 
Phreaking . . . . . . . . . . . . . . ....          
Middle of paper
....  . . . . . . . . . . . . . . . . . . . . 75 
 APPENDIX A. COMPUTER UNDERGROUND PSEUDONYMS . . . 76 
 APPENDIX B. NEW USER QUESTIONNAIRE FROM A PHREAK/HACK BBS . 77 
 
 Introduction 
 
 The proliferation of home computers has been accompanied by a corresponding social problem involving the activities of so-called "computer hackers." "Hackers" are computer aficionados who "break in" to corporate and government computer systems using their home computer and a telephone modem. The prevalence of the  ....          
          ------------------
          
          Word count: 10104 
 Page count: 37 (approximately 250 words per page)