What's a Little Larcency Between Friends? Confessions of an Info Thief

Robertson, Guy
June 2001
Feliciter;2001, Vol. 47 Issue 3, p152
Relates the author's experience being a computer hacker using the borrowers information card in Canada. Details of the borrower application form; Costs of information per list; Method of the author in stealing information.


Related Articles

  • Reference librarians endorse telephone answering machines.  // American Libraries;Feb85, Vol. 16 Issue 2, p90 

    Replies to reader inquiries on library automation. Use of telephone-answering machines on library reference phone lines; Purchasing of Dymo wheel for making replacement cards for a Gaylord Model C charging machine. INSET: Over to you.

  • Online Library Card Registration. Butler, Lorie Ann; Kantor-Horning, Susan // Computers in Libraries;May2007, Vol. 27 Issue 5, p12 

    The article reports on the successful implementation of an online library card registration and e-Card service at the Contra Costa County Library in Pleasant Hill, California. The implementation of the registration system was implemented through the help of the team of information technology...

  • Who's Afraid of the Big Bad Hack? Everyone Should Be! Saunders, Laverna // Computers in Libraries;Oct98, Vol. 18 Issue 9, p39 

    Comments on computer hackers and the security of computer systems in libraries. Reference to the firewalls and bastion hosts mentioned in this issue's article by J.R. Charnetski; The author's efforts to learn acronyms and understand how a firewall can be a bandwidth management tool.

  • Self-service allows Noosa library to open 7 days a week.  // inCite;Oct2006, Vol. 27 Issue 10, p12 

    The article focuses on the Spydus self-service unit installed by Noosa Library in Queensland which allows borrowers to look for their own selected books and DVD. The self-service unit is a simple device designed to produce a receipt automatically whenever customers run their library card and...

  • Los Angeles County PL Conducts $600,000 PR Drive. Quinn, Judy; Rogers, Michael // Library Journal;4/1/1991, Vol. 116 Issue 6, p19 

    Announces that the Los Angeles Public Library (LAPL) is conducting an organized marketing campaign to increase library use and numbers of cardholders. Discussion of the strategy and theme of the campaign, "The Best Things in Life Are Still Free"; Way that library automation created the need for...

  • Trading data with dead and digital. Platt, Charles // Fantasy & Science Fiction;Mar1994, Vol. 86 Issue 3, p33 

    Recounts the author's meeting with a group of hackers during an informal convention in New York City. Birth of the practice of hacking with the publication of the magazine `Tap'; Hacking experience of Bruce Franche, co-owner of a local bulletin board system called MindVox; Computer equipment...

  • Hackers, crackers, and sniffers. Valente, George // Internal Auditor;Oct96, Vol. 53 Issue 5, p52 

    Discusses the use of sniffing tools by hackers to gain unauthorized access to computer systems. Stealing of user IDs and passwords; Installation of trojan horse programs, trap doors, additional user IDs; Deletion of log files to eliminate the electronic audit trail; Ways of preventing sniffer...

  • It's harder to identify the bad guys online. Bruinius, Harry // Christian Science Monitor;3/28/2000, Vol. 92 Issue 87, p3 

    Focuses on the attraction and increasing occurrences of computer hacking, and examples of tactics used by hackers.

  • Cops narrow gap on Web criminals. Belsie, Laurent // Christian Science Monitor;4/21/2000, Vol. 92 Issue 105, p2 

    Focuses on the concentrated effort of police on Internet hackers.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics