Difference between revisions of "2600: The Hacker Quarterly"

From Anarchivism
Jump to: navigation, search
(Downloads)
 
(7 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
{{Infobox Zine
 
{{Infobox Zine
  | name = 2600: The Hacker Quarterly
+
  | name                   = 2600: The Hacker Quarterly
  | image     = image
+
  | image                   = [[File:2600_Spring_2012.gif‎|250px|center]]
  | image_caption = image caption
+
  | image_caption           = Spring 2012 issue of 2600
  | format = [[Zines|Print]]/[[eZines|Digital]]
+
  | format                 = [[Zines|Print]]/[[eZines|Digital]]
  | editor = Emmanuel Goldstein (Eric Gordon Corley)
+
  | editor                 = Emmanuel Goldstein (Eric Gordon Corley)
  | publisher = 2600 Enterprises Inc.
+
  | publisher               = 2600 Enterprises Inc.
  | origin = New York City, New York, USA
+
  | origin                 = New York City, NY, USA
  | language = English
+
  | language               = English
  | frequency = Quarterly
+
  | frequency               = Quarterly
  | active = 1984 - Present
+
  | active                 = 1984 - Present
  | categories = Hacking, Phreaking, Computers, Technology
+
  | categories             = Hacking, Phreaking, Computers, Technology
  | number_issues = ??
+
  | number_issues           = ?
  | follows = NA
+
  | follows                 = NA
  | precedes = NA
+
  | precedes               = NA
 
  | associated_publications = NA
 
  | associated_publications = NA
  | website = [http://2600.com 2600.com]
+
  | website                 = [http://2600.com 2600.com]
 
}}
 
}}
  
Line 26: Line 26:
 
The magazine is published and edited by its co-founder Emmanuel Goldstein (a pen name of Eric Corley and allusion to George Orwell's Nineteen Eighty-Four) and his on-profit company 2600 Enterprises, Inc. ''2600'' is released on the first Friday of the month following a season change, January, April, July and October.
 
The magazine is published and edited by its co-founder Emmanuel Goldstein (a pen name of Eric Corley and allusion to George Orwell's Nineteen Eighty-Four) and his on-profit company 2600 Enterprises, Inc. ''2600'' is released on the first Friday of the month following a season change, January, April, July and October.
  
Goldstein has published a compilation of articles from the magazine entitled ''The Best of 2600: A Hacker Odyssey''. The book, an 888-page hardcover, has been available from July 28, 2008 in the US and August 8, 2008 in the UK and is published by Wiley.
+
Goldstein has published a compilation of articles from the magazine entitled ''[[The Best of 2600: A Hacker Odyssey]]''. The book, an 888-page hardcover, has been available from July 28, 2008 in the US and August 8, 2008 in the UK and is published by Wiley.
  
 
The magazine offers free advertising for subscribers. Incarcerated subscribers often take out personal ads seeking new friends and penpals.
 
The magazine offers free advertising for subscribers. Incarcerated subscribers often take out personal ads seeking new friends and penpals.
Line 40: Line 40:
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
! style="background: #F8F8FF; color: #8B8989;"|  
+
! style="background: #F8F8FF; color: #8B8989;"| Currently "only available digitally"
 
|-
 
|-
 
! style="background: #EEE9E9; color: #8B8989;"| Volume 2 (1985)
 
! style="background: #EEE9E9; color: #8B8989;"| Volume 2 (1985)
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
! style="background: #F8F8FF; color: #8B8989;"|  
+
! style="background: #F8F8FF; color: #8B8989;"| Acquired
 
|-
 
|-
 
! style="background: #EEE9E9; color: #8B8989;"| Volume 3 (1986)
 
! style="background: #EEE9E9; color: #8B8989;"| Volume 3 (1986)
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
! style="background: #F8F8FF; color: #8B8989;"|  
+
! style="background: #F8F8FF; color: #8B8989;"| Acquired
 
|-
 
|-
 
! style="background: #EEE9E9; color: #8B8989;"| Volume 4 (1987)
 
! style="background: #EEE9E9; color: #8B8989;"| Volume 4 (1987)
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
! style="background: #F8F8FF; color: #8B8989;"|  
+
! style="background: #F8F8FF; color: #8B8989;"| "Only available in full sets"
 
|-
 
|-
 
! style="background: #EEE9E9; color: #8B8989;"| Volume 5.1 (1988)
 
! style="background: #EEE9E9; color: #8B8989;"| Volume 5.1 (1988)
Line 70: Line 70:
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
! style="background: #F8F8FF; color: #8B8989;"|  
+
! style="background: #F8F8FF; color: #8B8989;"| "Out of stock"
 
|-
 
|-
 
! style="background: #EEE9E9; color: #8B8989;"| Volume 5.4 (1988)
 
! style="background: #EEE9E9; color: #8B8989;"| Volume 5.4 (1988)
Line 100: Line 100:
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
! style="background: #F8F8FF; color: #8B8989;"|  
+
! style="background: #F8F8FF; color: #8B8989;"| "Only available in full sets"
 
|-
 
|-
 
! style="background: #EEE9E9; color: #8B8989;"| Volume 7.2 (1990)
 
! style="background: #EEE9E9; color: #8B8989;"| Volume 7.2 (1990)
Line 145: Line 145:
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
! style="background: #F8F8FF; color: #8B8989;"|  
+
! style="background: #F8F8FF; color: #8B8989;"| "Only available in full sets"
 
|-
 
|-
 
! style="background: #EEE9E9; color: #8B8989;"| Volume 9.3 (1992)
 
! style="background: #EEE9E9; color: #8B8989;"| Volume 9.3 (1992)
Line 155: Line 155:
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
! style="background: #F8F8FF; color: #8B8989;"|  
+
! style="background: #F8F8FF; color: #8B8989;"| "Only available in full sets"
 
|-
 
|-
 
! style="background: #EEE9E9; color: #8B8989;"| Volume 10.1 (1993)
 
! style="background: #EEE9E9; color: #8B8989;"| Volume 10.1 (1993)
Line 568: Line 568:
 
|-
 
|-
 
! style="background: #EEE9E9; color: #8B8989;"| Volume 30.3 (2013)
 
! style="background: #EEE9E9; color: #8B8989;"| Volume 30.3 (2013)
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"| Acquired
 +
|-
 +
! style="background: #EEE9E9; color: #8B8989;"| Volume 30.4 (2013)
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"| Acquired
 +
|-
 +
! style="background: #EEE9E9; color: #8B8989;"| Volume 31.1 (2014)
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"| Acquired
 +
|-
 +
! style="background: #EEE9E9; color: #8B8989;"| Volume 31.2 (2014)
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"| Acquired
 +
|-
 +
! style="background: #EEE9E9; color: #8B8989;"| Volume 31.3 (2014)
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
|-
 +
! style="background: #EEE9E9; color: #8B8989;"| Volume 31.4 (2014)
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
|-
 +
|}
 +
 +
 +
{| border="0" cellpadding="6" cellspacing="1" style="text-align:left;"
 +
! style="background: #838B8B; color: #ffffff; text-align:center"| Digest Issue
 +
! style="background: #838B8B; color: #ffffff; text-align:center"| User
 +
! style="background: #838B8B; color: #ffffff; text-align:center"| Link
 +
! style="background: #838B8B; color: #ffffff; text-align:center"| Notes
 +
|-
 +
! style="background: #EEE9E9; color: #8B8989;"| The Hacker Digest - Volume 1
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
|-
 +
! style="background: #EEE9E9; color: #8B8989;"| The Hacker Digest - Volume 2
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
|-
 +
! style="background: #EEE9E9; color: #8B8989;"| The Hacker Digest - Volume 3
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
|-
 +
! style="background: #EEE9E9; color: #8B8989;"| The Hacker Digest - Volume 25
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
|-
 +
! style="background: #EEE9E9; color: #8B8989;"| The Hacker Digest - Volume 26
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
|-
 
|-
! style="background: #EEE9E9; color: #8B8989;"| Volume 30.4 (2013)
+
! style="background: #EEE9E9; color: #8B8989;"| The Hacker Digest - Volume 27
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
|-
 +
! style="background: #EEE9E9; color: #8B8989;"| The Hacker Digest - Volume 28
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
|-
 +
! style="background: #EEE9E9; color: #8B8989;"| The Hacker Digest - Volume 29
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
|-
 +
|}
 +
 
 +
 
 +
{| border="0" cellpadding="6" cellspacing="1" style="text-align:left;"
 +
! style="background: #838B8B; color: #ffffff; text-align:center"| Book
 +
! style="background: #838B8B; color: #ffffff; text-align:center"| User
 +
! style="background: #838B8B; color: #ffffff; text-align:center"| Link
 +
! style="background: #838B8B; color: #ffffff; text-align:center"| Notes
 +
|-
 +
! style="background: #EEE9E9; color: #8B8989;"| The Best of 2600: A Hacker Odyssey (July 28, 2008)
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
|-
 +
! style="background: #EEE9E9; color: #8B8989;"| The Best of 2600, Collector's Edition: A Hacker Odyssey (February 3, 2009)
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
! style="background: #F8F8FF; color: #8B8989;"|
 +
|-
 +
! style="background: #EEE9E9; color: #8B8989;"| Dear Hacker: Letters to the Editor of 2600 (June 21, 2010)
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
 
! style="background: #F8F8FF; color: #8B8989;"|  
Line 579: Line 672:
 
|}
 
|}
  
==References==
+
==External Links==
 
[http://2600.com Official Site]
 
[http://2600.com Official Site]
  
 
[[Category:Zines]]
 
[[Category:Zines]]
 +
[[Category:Ezines]]

Latest revision as of 17:46, 2 August 2014

2600: The Hacker Quarterly
2600 Spring 2012.gif
Spring 2012 issue of 2600
Format Print/Digital
Editor Emmanuel Goldstein (Eric Gordon Corley)
Publisher 2600 Enterprises Inc.
Origin New York City, NY, USA
Language English
Frequency Quarterly
Active 1984 - Present
Topics Hacking, Phreaking, Computers, Technology
Number of Issues ?
Follows NA
Precedes NA
Associated Publications NA
Website 2600.com

2600: The Hacker Quarterly is an American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well as general news concerning the computer "underground" and left wing, and sometimes (but not recently), anarchism|anarchist issues.

Title

The magazine's name comes from the phreaker discovery in the 1960s that the transmission of a 2600 hertz tone (which could be produced perfectly with a plastic toy whistle given away free with Cap'n Crunch cereal discovered by friends of John Draper) over a long-distance trunk connection gained access to "operator mode" and allowed the user to explore aspects of the telephone system that were not otherwise accessible. The magazine was given its name by David Ruderman, who co-founded the magazine with his college friend, Eric Corley.It was first published in 1984, coinciding with the book of the same name and the break-up of AT&T. Ruderman ended his direct involvement with the magazine three years later.

Publication and Subscription

The magazine is published and edited by its co-founder Emmanuel Goldstein (a pen name of Eric Corley and allusion to George Orwell's Nineteen Eighty-Four) and his on-profit company 2600 Enterprises, Inc. 2600 is released on the first Friday of the month following a season change, January, April, July and October.

Goldstein has published a compilation of articles from the magazine entitled The Best of 2600: A Hacker Odyssey. The book, an 888-page hardcover, has been available from July 28, 2008 in the US and August 8, 2008 in the UK and is published by Wiley.

The magazine offers free advertising for subscribers. Incarcerated subscribers often take out personal ads seeking new friends and penpals.

Downloads

Issue User Link Notes
Volume 1 (1984) Currently "only available digitally"
Volume 2 (1985) Acquired
Volume 3 (1986) Acquired
Volume 4 (1987) "Only available in full sets"
Volume 5.1 (1988)
Volume 5.2 (1988)
Volume 5.3 (1988) "Out of stock"
Volume 5.4 (1988)
Volume 6.1 (1989) Acquired
Volume 6.2 (1989) Acquired
Volume 6.3 (1989) Acquired
Volume 6.4 (1989) Acquired
Volume 7.1 (1990) "Only available in full sets"
Volume 7.2 (1990)
Volume 7.3 (1990)
Volume 7.4 (1990)
Volume 8.1 (1991) Acquired
Volume 8.2 (1991) Acquired
Volume 8.3 (1991) Acquired
Volume 8.4 (1991) Acquired
Volume 9.1 (1992)
Volume 9.2 (1992) "Only available in full sets"
Volume 9.3 (1992)
Volume 9.4 (1992) "Only available in full sets"
Volume 10.1 (1993) Acquired
Volume 10.2 (1993) Acquired
Volume 10.3 (1993) Acquired
Volume 10.4 (1993) Acquired
Volume 11.1 (1994) Acquired
Volume 11.2 (1994) Acquired
Volume 11.3 (1994) Acquired
Volume 11.4 (1994) Acquired
Volume 12.1 (1995) Acquired
Volume 12.2 (1995) Acquired
Volume 12.3 (1995) Acquired
Volume 12.4 (1995) Acquired
Volume 13.1 (1996) Acquired
Volume 13.2 (1996) Acquired
Volume 13.3 (1996) Acquired
Volume 13.4 (1996) Acquired
Volume 14.1 (1997) Acquired
Volume 14.2 (1997) Acquired
Volume 14.3 (1997) Acquired
Volume 14.4 (1997) Acquired
Volume 15.1 (1998) Acquired
Volume 15.2 (1998) Acquired
Volume 15.3 (1998) Acquired
Volume 15.4 (1998) Acquired
Volume 16.1 (1999) Acquired
Volume 16.2 (1999) Acquired
Volume 16.3 (1999) Acquired
Volume 16.4 (1999) Acquired
Volume 17.1 (2000) Acquired
Volume 17.2 (2000) Acquired
Volume 17.3 (2000) Acquired
Volume 17.4 (2000) Acquired
Volume 18.1 (2001) Acquired
Volume 18.2 (2001) Acquired
Volume 18.3 (2001) Acquired
Volume 18.4 (2001) Acquired
Volume 19.1 (2002) Acquired
Volume 19.2 (2002) Acquired
Volume 19.3 (2002) Acquired
Volume 19.4 (2002) Acquired
Volume 20.1 (2003) Acquired
Volume 20.2 (2003) Acquired
Volume 20.3 (2003) Acquired
Volume 20.4 (2003) Acquired
Volume 21.1 (2004) Acquired
Volume 21.2 (2004) Acquired
Volume 21.3 (2004) Acquired
Volume 21.4 (2004) Acquired
Volume 22.1 (2005) Acquired
Volume 22.2 (2005) Acquired
Volume 22.3 (2005) Acquired
Volume 22.4 (2005) Acquired
Volume 23.1 (2006) Acquired
Volume 23.2 (2006) Acquired
Volume 23.3 (2006) Acquired
Volume 23.4 (2006) Acquired
Volume 24.1 (2007) Acquired
Volume 24.2 (2007) Acquired
Volume 24.3 (2007) Acquired
Volume 24.4 (2007) Acquired
Volume 25.1 (2008) Acquired
Volume 25.2 (2008) Acquired
Volume 25.3 (2008) Acquired
Volume 25.4 (2008) Acquired
Volume 26.1 (2009) Acquired
Volume 26.2 (2009) Acquired
Volume 26.3 (2009) Acquired
Volume 26.4 (2009) Acquired
Volume 27.1 (2010) Acquired
Volume 27.2 (2010) Acquired
Volume 27.3 (2010) Acquired
Volume 27.4 (2010) Acquired
Volume 28.1 (2011) Acquired
Volume 28.2 (2011) Acquired
Volume 28.3 (2011) Acquired
Volume 28.4 (2011) Acquired
Volume 29.1 (2012) Acquired
Volume 29.2 (2012) Acquired
Volume 29.3 (2012) Acquired
Volume 29.4 (2012) Acquired
Volume 30.1 (2013) Acquired
Volume 30.2 (2013) Acquired
Volume 30.3 (2013) Acquired
Volume 30.4 (2013) Acquired
Volume 31.1 (2014) Acquired
Volume 31.2 (2014) Acquired
Volume 31.3 (2014)
Volume 31.4 (2014)


Digest Issue User Link Notes
The Hacker Digest - Volume 1
The Hacker Digest - Volume 2
The Hacker Digest - Volume 3
The Hacker Digest - Volume 25
The Hacker Digest - Volume 26
The Hacker Digest - Volume 27
The Hacker Digest - Volume 28
The Hacker Digest - Volume 29


Book User Link Notes
The Best of 2600: A Hacker Odyssey (July 28, 2008)
The Best of 2600, Collector's Edition: A Hacker Odyssey (February 3, 2009)
Dear Hacker: Letters to the Editor of 2600 (June 21, 2010)

External Links

Official Site