Difference between revisions of "2600: The Hacker Quarterly"
(→Downloads) |
|||
(4 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
{{Infobox Zine | {{Infobox Zine | ||
| name = 2600: The Hacker Quarterly | | name = 2600: The Hacker Quarterly | ||
− | | image = | + | | image = [[File:2600_Spring_2012.gif|250px|center]] |
− | | image_caption = | + | | image_caption = Spring 2012 issue of 2600 |
| format = [[Zines|Print]]/[[eZines|Digital]] | | format = [[Zines|Print]]/[[eZines|Digital]] | ||
| editor = Emmanuel Goldstein (Eric Gordon Corley) | | editor = Emmanuel Goldstein (Eric Gordon Corley) | ||
| publisher = 2600 Enterprises Inc. | | publisher = 2600 Enterprises Inc. | ||
− | | origin = New York City, | + | | origin = New York City, NY, USA |
| language = English | | language = English | ||
| frequency = Quarterly | | frequency = Quarterly | ||
| active = 1984 - Present | | active = 1984 - Present | ||
| categories = Hacking, Phreaking, Computers, Technology | | categories = Hacking, Phreaking, Computers, Technology | ||
− | | number_issues = | + | | number_issues = ? |
| follows = NA | | follows = NA | ||
| precedes = NA | | precedes = NA | ||
Line 26: | Line 26: | ||
The magazine is published and edited by its co-founder Emmanuel Goldstein (a pen name of Eric Corley and allusion to George Orwell's Nineteen Eighty-Four) and his on-profit company 2600 Enterprises, Inc. ''2600'' is released on the first Friday of the month following a season change, January, April, July and October. | The magazine is published and edited by its co-founder Emmanuel Goldstein (a pen name of Eric Corley and allusion to George Orwell's Nineteen Eighty-Four) and his on-profit company 2600 Enterprises, Inc. ''2600'' is released on the first Friday of the month following a season change, January, April, July and October. | ||
− | Goldstein has published a compilation of articles from the magazine entitled ''The Best of 2600: A Hacker Odyssey''. The book, an 888-page hardcover, has been available from July 28, 2008 in the US and August 8, 2008 in the UK and is published by Wiley. | + | Goldstein has published a compilation of articles from the magazine entitled ''[[The Best of 2600: A Hacker Odyssey]]''. The book, an 888-page hardcover, has been available from July 28, 2008 in the US and August 8, 2008 in the UK and is published by Wiley. |
The magazine offers free advertising for subscribers. Incarcerated subscribers often take out personal ads seeking new friends and penpals. | The magazine offers free advertising for subscribers. Incarcerated subscribers often take out personal ads seeking new friends and penpals. | ||
Line 40: | Line 40: | ||
! style="background: #F8F8FF; color: #8B8989;"| | ! style="background: #F8F8FF; color: #8B8989;"| | ||
! style="background: #F8F8FF; color: #8B8989;"| | ! style="background: #F8F8FF; color: #8B8989;"| | ||
− | ! style="background: #F8F8FF; color: #8B8989;"| | + | ! style="background: #F8F8FF; color: #8B8989;"| Currently "only available digitally" |
|- | |- | ||
! style="background: #EEE9E9; color: #8B8989;"| Volume 2 (1985) | ! style="background: #EEE9E9; color: #8B8989;"| Volume 2 (1985) | ||
! style="background: #F8F8FF; color: #8B8989;"| | ! style="background: #F8F8FF; color: #8B8989;"| | ||
! style="background: #F8F8FF; color: #8B8989;"| | ! style="background: #F8F8FF; color: #8B8989;"| | ||
− | ! style="background: #F8F8FF; color: #8B8989;"| | + | ! style="background: #F8F8FF; color: #8B8989;"| Acquired |
|- | |- | ||
! style="background: #EEE9E9; color: #8B8989;"| Volume 3 (1986) | ! style="background: #EEE9E9; color: #8B8989;"| Volume 3 (1986) | ||
! style="background: #F8F8FF; color: #8B8989;"| | ! style="background: #F8F8FF; color: #8B8989;"| | ||
! style="background: #F8F8FF; color: #8B8989;"| | ! style="background: #F8F8FF; color: #8B8989;"| | ||
− | ! style="background: #F8F8FF; color: #8B8989;"| | + | ! style="background: #F8F8FF; color: #8B8989;"| Acquired |
|- | |- | ||
! style="background: #EEE9E9; color: #8B8989;"| Volume 4 (1987) | ! style="background: #EEE9E9; color: #8B8989;"| Volume 4 (1987) | ||
! style="background: #F8F8FF; color: #8B8989;"| | ! style="background: #F8F8FF; color: #8B8989;"| | ||
! style="background: #F8F8FF; color: #8B8989;"| | ! style="background: #F8F8FF; color: #8B8989;"| | ||
− | ! style="background: #F8F8FF; color: #8B8989;"| | + | ! style="background: #F8F8FF; color: #8B8989;"| "Only available in full sets" |
|- | |- | ||
! style="background: #EEE9E9; color: #8B8989;"| Volume 5.1 (1988) | ! style="background: #EEE9E9; color: #8B8989;"| Volume 5.1 (1988) | ||
Line 70: | Line 70: | ||
! style="background: #F8F8FF; color: #8B8989;"| | ! style="background: #F8F8FF; color: #8B8989;"| | ||
! style="background: #F8F8FF; color: #8B8989;"| | ! style="background: #F8F8FF; color: #8B8989;"| | ||
− | ! style="background: #F8F8FF; color: #8B8989;"| | + | ! style="background: #F8F8FF; color: #8B8989;"| "Out of stock" |
|- | |- | ||
! style="background: #EEE9E9; color: #8B8989;"| Volume 5.4 (1988) | ! style="background: #EEE9E9; color: #8B8989;"| Volume 5.4 (1988) | ||
Line 100: | Line 100: | ||
! style="background: #F8F8FF; color: #8B8989;"| | ! style="background: #F8F8FF; color: #8B8989;"| | ||
! style="background: #F8F8FF; color: #8B8989;"| | ! style="background: #F8F8FF; color: #8B8989;"| | ||
− | ! style="background: #F8F8FF; color: #8B8989;"| | + | ! style="background: #F8F8FF; color: #8B8989;"| "Only available in full sets" |
|- | |- | ||
! style="background: #EEE9E9; color: #8B8989;"| Volume 7.2 (1990) | ! style="background: #EEE9E9; color: #8B8989;"| Volume 7.2 (1990) | ||
Line 145: | Line 145: | ||
! style="background: #F8F8FF; color: #8B8989;"| | ! style="background: #F8F8FF; color: #8B8989;"| | ||
! style="background: #F8F8FF; color: #8B8989;"| | ! style="background: #F8F8FF; color: #8B8989;"| | ||
− | ! style="background: #F8F8FF; color: #8B8989;"| | + | ! style="background: #F8F8FF; color: #8B8989;"| "Only available in full sets" |
|- | |- | ||
! style="background: #EEE9E9; color: #8B8989;"| Volume 9.3 (1992) | ! style="background: #EEE9E9; color: #8B8989;"| Volume 9.3 (1992) | ||
Line 155: | Line 155: | ||
! style="background: #F8F8FF; color: #8B8989;"| | ! style="background: #F8F8FF; color: #8B8989;"| | ||
! style="background: #F8F8FF; color: #8B8989;"| | ! style="background: #F8F8FF; color: #8B8989;"| | ||
− | ! style="background: #F8F8FF; color: #8B8989;"| | + | ! style="background: #F8F8FF; color: #8B8989;"| "Only available in full sets" |
|- | |- | ||
! style="background: #EEE9E9; color: #8B8989;"| Volume 10.1 (1993) | ! style="background: #EEE9E9; color: #8B8989;"| Volume 10.1 (1993) | ||
Line 568: | Line 568: | ||
|- | |- | ||
! style="background: #EEE9E9; color: #8B8989;"| Volume 30.3 (2013) | ! style="background: #EEE9E9; color: #8B8989;"| Volume 30.3 (2013) | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| Acquired | ||
+ | |- | ||
+ | ! style="background: #EEE9E9; color: #8B8989;"| Volume 30.4 (2013) | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| Acquired | ||
+ | |- | ||
+ | ! style="background: #EEE9E9; color: #8B8989;"| Volume 31.1 (2014) | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| Acquired | ||
+ | |- | ||
+ | ! style="background: #EEE9E9; color: #8B8989;"| Volume 31.2 (2014) | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| Acquired | ||
+ | |- | ||
+ | ! style="background: #EEE9E9; color: #8B8989;"| Volume 31.3 (2014) | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | |- | ||
+ | ! style="background: #EEE9E9; color: #8B8989;"| Volume 31.4 (2014) | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | |||
+ | {| border="0" cellpadding="6" cellspacing="1" style="text-align:left;" | ||
+ | ! style="background: #838B8B; color: #ffffff; text-align:center"| Digest Issue | ||
+ | ! style="background: #838B8B; color: #ffffff; text-align:center"| User | ||
+ | ! style="background: #838B8B; color: #ffffff; text-align:center"| Link | ||
+ | ! style="background: #838B8B; color: #ffffff; text-align:center"| Notes | ||
+ | |- | ||
+ | ! style="background: #EEE9E9; color: #8B8989;"| The Hacker Digest - Volume 1 | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | |- | ||
+ | ! style="background: #EEE9E9; color: #8B8989;"| The Hacker Digest - Volume 2 | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | |- | ||
+ | ! style="background: #EEE9E9; color: #8B8989;"| The Hacker Digest - Volume 3 | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | |- | ||
+ | ! style="background: #EEE9E9; color: #8B8989;"| The Hacker Digest - Volume 25 | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | |- | ||
+ | ! style="background: #EEE9E9; color: #8B8989;"| The Hacker Digest - Volume 26 | ||
! style="background: #F8F8FF; color: #8B8989;"| | ! style="background: #F8F8FF; color: #8B8989;"| | ||
! style="background: #F8F8FF; color: #8B8989;"| | ! style="background: #F8F8FF; color: #8B8989;"| | ||
! style="background: #F8F8FF; color: #8B8989;"| | ! style="background: #F8F8FF; color: #8B8989;"| | ||
|- | |- | ||
− | ! style="background: #EEE9E9; color: #8B8989;"| Volume | + | ! style="background: #EEE9E9; color: #8B8989;"| The Hacker Digest - Volume 27 |
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | |- | ||
+ | ! style="background: #EEE9E9; color: #8B8989;"| The Hacker Digest - Volume 28 | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | |- | ||
+ | ! style="background: #EEE9E9; color: #8B8989;"| The Hacker Digest - Volume 29 | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | |||
+ | {| border="0" cellpadding="6" cellspacing="1" style="text-align:left;" | ||
+ | ! style="background: #838B8B; color: #ffffff; text-align:center"| Book | ||
+ | ! style="background: #838B8B; color: #ffffff; text-align:center"| User | ||
+ | ! style="background: #838B8B; color: #ffffff; text-align:center"| Link | ||
+ | ! style="background: #838B8B; color: #ffffff; text-align:center"| Notes | ||
+ | |- | ||
+ | ! style="background: #EEE9E9; color: #8B8989;"| The Best of 2600: A Hacker Odyssey (July 28, 2008) | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | |- | ||
+ | ! style="background: #EEE9E9; color: #8B8989;"| The Best of 2600, Collector's Edition: A Hacker Odyssey (February 3, 2009) | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | ! style="background: #F8F8FF; color: #8B8989;"| | ||
+ | |- | ||
+ | ! style="background: #EEE9E9; color: #8B8989;"| Dear Hacker: Letters to the Editor of 2600 (June 21, 2010) | ||
! style="background: #F8F8FF; color: #8B8989;"| | ! style="background: #F8F8FF; color: #8B8989;"| | ||
! style="background: #F8F8FF; color: #8B8989;"| | ! style="background: #F8F8FF; color: #8B8989;"| | ||
Line 583: | Line 676: | ||
[[Category:Zines]] | [[Category:Zines]] | ||
− | [[Category: | + | [[Category:Ezines]] |
Latest revision as of 17:46, 2 August 2014
Spring 2012 issue of 2600 | |
Format | Print/Digital |
---|---|
Editor | Emmanuel Goldstein (Eric Gordon Corley) |
Publisher | 2600 Enterprises Inc. |
Origin | New York City, NY, USA |
Language | English |
Frequency | Quarterly |
Active | 1984 - Present |
Topics | Hacking, Phreaking, Computers, Technology |
Number of Issues | ? |
Follows | NA |
Precedes | NA |
Associated Publications | NA |
Website | 2600.com |
2600: The Hacker Quarterly is an American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well as general news concerning the computer "underground" and left wing, and sometimes (but not recently), anarchism|anarchist issues.
Title
The magazine's name comes from the phreaker discovery in the 1960s that the transmission of a 2600 hertz tone (which could be produced perfectly with a plastic toy whistle given away free with Cap'n Crunch cereal discovered by friends of John Draper) over a long-distance trunk connection gained access to "operator mode" and allowed the user to explore aspects of the telephone system that were not otherwise accessible. The magazine was given its name by David Ruderman, who co-founded the magazine with his college friend, Eric Corley.It was first published in 1984, coinciding with the book of the same name and the break-up of AT&T. Ruderman ended his direct involvement with the magazine three years later.
Publication and Subscription
The magazine is published and edited by its co-founder Emmanuel Goldstein (a pen name of Eric Corley and allusion to George Orwell's Nineteen Eighty-Four) and his on-profit company 2600 Enterprises, Inc. 2600 is released on the first Friday of the month following a season change, January, April, July and October.
Goldstein has published a compilation of articles from the magazine entitled The Best of 2600: A Hacker Odyssey. The book, an 888-page hardcover, has been available from July 28, 2008 in the US and August 8, 2008 in the UK and is published by Wiley.
The magazine offers free advertising for subscribers. Incarcerated subscribers often take out personal ads seeking new friends and penpals.
Downloads
Issue | User | Link | Notes |
---|---|---|---|
Volume 1 (1984) | Currently "only available digitally" | ||
Volume 2 (1985) | Acquired | ||
Volume 3 (1986) | Acquired | ||
Volume 4 (1987) | "Only available in full sets" | ||
Volume 5.1 (1988) | |||
Volume 5.2 (1988) | |||
Volume 5.3 (1988) | "Out of stock" | ||
Volume 5.4 (1988) | |||
Volume 6.1 (1989) | Acquired | ||
Volume 6.2 (1989) | Acquired | ||
Volume 6.3 (1989) | Acquired | ||
Volume 6.4 (1989) | Acquired | ||
Volume 7.1 (1990) | "Only available in full sets" | ||
Volume 7.2 (1990) | |||
Volume 7.3 (1990) | |||
Volume 7.4 (1990) | |||
Volume 8.1 (1991) | Acquired | ||
Volume 8.2 (1991) | Acquired | ||
Volume 8.3 (1991) | Acquired | ||
Volume 8.4 (1991) | Acquired | ||
Volume 9.1 (1992) | |||
Volume 9.2 (1992) | "Only available in full sets" | ||
Volume 9.3 (1992) | |||
Volume 9.4 (1992) | "Only available in full sets" | ||
Volume 10.1 (1993) | Acquired | ||
Volume 10.2 (1993) | Acquired | ||
Volume 10.3 (1993) | Acquired | ||
Volume 10.4 (1993) | Acquired | ||
Volume 11.1 (1994) | Acquired | ||
Volume 11.2 (1994) | Acquired | ||
Volume 11.3 (1994) | Acquired | ||
Volume 11.4 (1994) | Acquired | ||
Volume 12.1 (1995) | Acquired | ||
Volume 12.2 (1995) | Acquired | ||
Volume 12.3 (1995) | Acquired | ||
Volume 12.4 (1995) | Acquired | ||
Volume 13.1 (1996) | Acquired | ||
Volume 13.2 (1996) | Acquired | ||
Volume 13.3 (1996) | Acquired | ||
Volume 13.4 (1996) | Acquired | ||
Volume 14.1 (1997) | Acquired | ||
Volume 14.2 (1997) | Acquired | ||
Volume 14.3 (1997) | Acquired | ||
Volume 14.4 (1997) | Acquired | ||
Volume 15.1 (1998) | Acquired | ||
Volume 15.2 (1998) | Acquired | ||
Volume 15.3 (1998) | Acquired | ||
Volume 15.4 (1998) | Acquired | ||
Volume 16.1 (1999) | Acquired | ||
Volume 16.2 (1999) | Acquired | ||
Volume 16.3 (1999) | Acquired | ||
Volume 16.4 (1999) | Acquired | ||
Volume 17.1 (2000) | Acquired | ||
Volume 17.2 (2000) | Acquired | ||
Volume 17.3 (2000) | Acquired | ||
Volume 17.4 (2000) | Acquired | ||
Volume 18.1 (2001) | Acquired | ||
Volume 18.2 (2001) | Acquired | ||
Volume 18.3 (2001) | Acquired | ||
Volume 18.4 (2001) | Acquired | ||
Volume 19.1 (2002) | Acquired | ||
Volume 19.2 (2002) | Acquired | ||
Volume 19.3 (2002) | Acquired | ||
Volume 19.4 (2002) | Acquired | ||
Volume 20.1 (2003) | Acquired | ||
Volume 20.2 (2003) | Acquired | ||
Volume 20.3 (2003) | Acquired | ||
Volume 20.4 (2003) | Acquired | ||
Volume 21.1 (2004) | Acquired | ||
Volume 21.2 (2004) | Acquired | ||
Volume 21.3 (2004) | Acquired | ||
Volume 21.4 (2004) | Acquired | ||
Volume 22.1 (2005) | Acquired | ||
Volume 22.2 (2005) | Acquired | ||
Volume 22.3 (2005) | Acquired | ||
Volume 22.4 (2005) | Acquired | ||
Volume 23.1 (2006) | Acquired | ||
Volume 23.2 (2006) | Acquired | ||
Volume 23.3 (2006) | Acquired | ||
Volume 23.4 (2006) | Acquired | ||
Volume 24.1 (2007) | Acquired | ||
Volume 24.2 (2007) | Acquired | ||
Volume 24.3 (2007) | Acquired | ||
Volume 24.4 (2007) | Acquired | ||
Volume 25.1 (2008) | Acquired | ||
Volume 25.2 (2008) | Acquired | ||
Volume 25.3 (2008) | Acquired | ||
Volume 25.4 (2008) | Acquired | ||
Volume 26.1 (2009) | Acquired | ||
Volume 26.2 (2009) | Acquired | ||
Volume 26.3 (2009) | Acquired | ||
Volume 26.4 (2009) | Acquired | ||
Volume 27.1 (2010) | Acquired | ||
Volume 27.2 (2010) | Acquired | ||
Volume 27.3 (2010) | Acquired | ||
Volume 27.4 (2010) | Acquired | ||
Volume 28.1 (2011) | Acquired | ||
Volume 28.2 (2011) | Acquired | ||
Volume 28.3 (2011) | Acquired | ||
Volume 28.4 (2011) | Acquired | ||
Volume 29.1 (2012) | Acquired | ||
Volume 29.2 (2012) | Acquired | ||
Volume 29.3 (2012) | Acquired | ||
Volume 29.4 (2012) | Acquired | ||
Volume 30.1 (2013) | Acquired | ||
Volume 30.2 (2013) | Acquired | ||
Volume 30.3 (2013) | Acquired | ||
Volume 30.4 (2013) | Acquired | ||
Volume 31.1 (2014) | Acquired | ||
Volume 31.2 (2014) | Acquired | ||
Volume 31.3 (2014) | |||
Volume 31.4 (2014) |
Digest Issue | User | Link | Notes |
---|---|---|---|
The Hacker Digest - Volume 1 | |||
The Hacker Digest - Volume 2 | |||
The Hacker Digest - Volume 3 | |||
The Hacker Digest - Volume 25 | |||
The Hacker Digest - Volume 26 | |||
The Hacker Digest - Volume 27 | |||
The Hacker Digest - Volume 28 | |||
The Hacker Digest - Volume 29 |
Book | User | Link | Notes |
---|---|---|---|
The Best of 2600: A Hacker Odyssey (July 28, 2008) | |||
The Best of 2600, Collector's Edition: A Hacker Odyssey (February 3, 2009) | |||
Dear Hacker: Letters to the Editor of 2600 (June 21, 2010) |