610:
419:
38:(Lord Flathead) was an associate. In 1984, Landreth was convicted of hacking computer systems, and accessing NASA and Department of Defense computer data. In 1986, he disappeared (from which he re-appeared a year later). Landreth's and Howard Rheingold's book,
152:"Confessions Of A Hacker: Here Is The Cracker'S Story Of Adolescent Innocence And Ingenuity, Mixed With Corporate And Government Intrigue, That Ultimately Led To His Arrest By The FBI"
340:
151:
211:
681:
647:
313:
405:
368:
194:
483:
573:
74:
671:
125:
640:
184:
161:
238:
268:
633:
23:
345:
418:
65:
40:
676:
457:
97:
305:
666:
609:
8:
621:
579:
616:
This biographical article relating to a computer specialist in the United States is a
395:
269:"A Hacker Vanishes : Computer Whiz, Missing Since September, a Source of Mystery"
583:
569:
531:
462:
438:
401:
300:
273:
190:
186:
Viral Loop: From
Facebook to Twitter, How Today's Smartest Businesses Grow Themselves
70:
27:
30:
activities during the early 1980s within a cracking club called "The Inner Circle".
561:
527:
512:
391:
60:
451:
553:
309:
617:
296:"A Hacker Vanishes Computer Whiz, Missing Since September, a Source of Mystery"
660:
295:
565:
212:"MySpace Cofounder Tom Anderson Was A Real Life "WarGames" Hacker in 1980s"
156:
35:
484:"The Untold Story of the Teen Hackers Who Transformed the Early Internet"
437:
Center for
Education and Research in Information Assurance and Security,
411:
433:
369:"Bill Landreth: The Cracker & Out Of The Inner Circle & Pig Sty"
143:
216:
244:
488:
102:
31:
397:
Out of the Inner Circle: A Hacker's Guide to
Computer Security
66:
Out of the Inner Circle: A Hacker's Guide to
Computer Security
41:
Out of the Inner Circle: A Hacker's Guide to
Computer Security
118:
260:
231:
203:
92:
90:
443:
504:
87:
126:"William T Landreth, Born 04/05/1963 in California"
44:, published in 1986, is considered a best-seller.
98:"Genius Computer Hacker Now Living On The Streets"
389:
383:
658:
176:
545:
641:
648:
634:
551:
209:
182:
513:"Are computer hacker break-ins ethical?"
510:
552:Halvorson, Michael J. (29 April 2020).
659:
456:Graduate Studies, Dept. of Psychology
449:
266:
183:Penenberg, Adam L. (13 October 2009).
341:"Hacker Is Down And Out In San Diego"
335:
333:
331:
210:Arrington, Michael (30 August 2008).
604:
511:Spafford, Eugene H. (January 1992).
149:
22:(born April 5, 1963) is an American
13:
682:American computer specialist stubs
328:
50:As of 2016 he was still homeless.
14:
693:
47:In 1989, Landreth was homeless.
608:
417:
267:Gorman, Tom (11 December 1986).
520:Journal of Systems and Software
476:
425:
361:
316:from the original on 2016-03-21
189:. Hachette Books. p. 166.
288:
1:
434:Psychology and Computer Crime
80:
620:. You can help Knowledge by
532:10.1016/0164-1212(92)90079-Y
239:"A brief history of hacking"
7:
10:
698:
603:
346:The Sydney Morning Herald
554:"Hackers and cyberpunks"
130:CaliforniaBirthIndex.org
69:(Microsoft Press, 1985)
53:
672:American cybercriminals
566:10.1145/3368274.3368282
452:"A New Hacker Taxonomy"
458:University of Manitoba
450:Rogers, Marc (2000).
304:. December 11, 1986.
20:William Troy Landreth
371:. September 26, 2011
400:. Microsoft Press.
431:Marc Rogers (ed.)
164:on 3 December 2020
629:
628:
463:Purdue University
439:Purdue University
407:978-0-14-087139-5
392:Rheingold, Howard
301:Los Angeles Times
274:Los Angeles Times
196:978-1-4013-9493-6
689:
650:
643:
636:
612:
605:
595:
594:
592:
590:
549:
543:
542:
540:
538:
517:
508:
502:
501:
499:
497:
492:. April 14, 2016
480:
474:
473:
471:
469:
447:
441:
429:
423:
422:
421:
415:
390:Landreth, Bill;
387:
381:
380:
378:
376:
365:
359:
358:
356:
354:
337:
326:
325:
323:
321:
292:
286:
285:
283:
281:
264:
258:
257:
255:
253:
235:
229:
228:
226:
224:
207:
201:
200:
180:
174:
173:
171:
169:
160:. Archived from
150:Landreth, Bill.
147:
141:
140:
138:
136:
122:
116:
115:
113:
111:
106:. March 20, 1989
94:
61:Howard Rheingold
26:notable for his
697:
696:
692:
691:
690:
688:
687:
686:
657:
656:
655:
654:
601:
599:
598:
588:
586:
576:
550:
546:
536:
534:
515:
509:
505:
495:
493:
482:
481:
477:
467:
465:
448:
444:
430:
426:
416:
408:
388:
384:
374:
372:
367:
366:
362:
352:
350:
349:. April 3, 1989
339:
338:
329:
319:
317:
294:
293:
289:
279:
277:
265:
261:
251:
249:
237:
236:
232:
222:
220:
208:
204:
197:
181:
177:
167:
165:
148:
144:
134:
132:
124:
123:
119:
109:
107:
96:
95:
88:
83:
59:Bill Landreth;
56:
17:
16:American hacker
12:
11:
5:
695:
685:
684:
679:
674:
669:
653:
652:
645:
638:
630:
627:
626:
613:
597:
596:
574:
544:
503:
475:
442:
424:
406:
382:
360:
327:
287:
259:
230:
202:
195:
175:
142:
117:
85:
84:
82:
79:
78:
77:
55:
52:
15:
9:
6:
4:
3:
2:
694:
683:
680:
678:
677:Living people
675:
673:
670:
668:
665:
664:
662:
651:
646:
644:
639:
637:
632:
631:
625:
623:
619:
614:
611:
607:
606:
602:
585:
581:
577:
575:9781450377584
571:
567:
563:
559:
555:
548:
533:
529:
525:
521:
514:
507:
496:September 13,
491:
490:
485:
479:
464:
460:
459:
453:
446:
440:
436:
435:
428:
420:
413:
409:
403:
399:
398:
393:
386:
370:
364:
348:
347:
342:
336:
334:
332:
315:
311:
307:
303:
302:
297:
291:
276:
275:
270:
263:
248:
246:
243:encyclopedia.
240:
234:
219:
218:
213:
206:
198:
192:
188:
187:
179:
163:
159:
158:
153:
146:
131:
127:
121:
105:
104:
99:
93:
91:
86:
76:
75:0-914845-36-5
72:
68:
67:
62:
58:
57:
51:
48:
45:
43:
42:
37:
33:
29:
25:
21:
622:expanding it
615:
600:
587:. Retrieved
557:
547:
535:. Retrieved
526:(1): 41–47.
523:
519:
506:
494:. Retrieved
487:
478:
466:. Retrieved
455:
445:
432:
427:
410:– via
396:
385:
373:. Retrieved
363:
351:. Retrieved
344:
318:. Retrieved
299:
290:
278:. Retrieved
272:
262:
250:. Retrieved
242:
233:
221:. Retrieved
215:
205:
185:
178:
166:. Retrieved
162:the original
157:Sun Sentinel
155:
145:
133:. Retrieved
129:
120:
108:. Retrieved
101:
64:
49:
46:
39:
36:Tom Anderson
19:
18:
667:1964 births
589:23 November
558:Code Nation
537:22 November
468:23 November
412:archive.org
320:February 3,
280:22 November
252:22 November
223:22 November
168:22 November
135:23 November
110:23 November
34:cofounder,
661:Categories
353:August 22,
217:TechCrunch
81:References
584:218489632
310:292511917
245:kaspersky
394:(1985).
375:April 9,
314:Archived
306:ProQuest
28:cracking
489:Gizmodo
103:AP NEWS
32:MySpace
582:
572:
404:
308:
193:
73:
24:hacker
580:S2CID
516:(PDF)
54:Works
618:stub
591:2022
570:ISBN
539:2022
498:2021
470:2022
402:ISBN
377:2013
355:2022
322:2011
282:2022
254:2022
247:.com
225:2022
191:ISBN
170:2022
137:2022
112:2022
71:ISBN
562:doi
528:doi
63:.
663::
578:.
568:.
560:.
556:.
524:17
522:.
518:.
486:.
461:.
454:.
343:.
330:^
312:.
298:.
271:.
241:.
214:.
154:.
128:.
100:.
89:^
649:e
642:t
635:v
624:.
593:.
564::
541:.
530::
500:.
472:.
414:.
379:.
357:.
324:.
284:.
256:.
227:.
199:.
172:.
139:.
114:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.