Misplaced Pages

The Hacker Files: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editContent deleted Content addedVisualWikitext
Revision as of 17:34, 21 March 2007 editBetacommand (talk | contribs)86,927 editsm removing inappropriate link per WP:EL, WP:SPAM, WP:RS, and WP:NOT← Previous edit Latest revision as of 02:02, 15 December 2024 edit undoDicklyon (talk | contribs)Autopatrolled, Extended confirmed users, Rollbackers476,451 edits rm bad link 
(71 intermediate revisions by 53 users not shown)
Line 1: Line 1:
{{Use mdy dates|date=October 2024}}
{{Supercbbox| <!--Misplaced Pages:WikiProject Comics--> {{Infobox comic book title <!--Misplaced Pages:WikiProject Comics-->
title=The Hacker Files
|image= ] |image = Hackerfilesdcu0.jpg
|caption= Cover to Hacker Files #2, artist Tom Sutton |caption = Cover to ''Hacker Files'' No. 2, artist Tom Sutton.
|schedule= monthly |schedule = monthly
|format= mini-series |format = mini-series
|publisher=] |publisher = ]
|date= August 1992 - July 1993 |date = August 1992 July 1993
|issues= 12 |issues = 12
|main_char_team= Jack Marshall<br> ]<br> ] |main_char_team = Jack Marshall<br/>]<br/>]
|writers= ] |writers = ]
|artists= |artists =
|pencillers= ] |pencillers = ]
|inkers= ] |inkers = ]
|colorists= |colorists =
|creative_team_month= August |creative_team_month = August
|creative_team_year= 1992 |creative_team_year = 1992
|creators = ], ] |creators = ], ]
}} }}


'''''The Hacker Files''''' is a twelve issue ] mini-series published from August 1992 to July 1993. It was written by ] and illustrated by ]. '''''The Hacker Files''''' is a twelve issue ] mini-series published from August 1992 to July 1993. It was written by ] and illustrated by ].<ref name="dc-ency">{{Citation | last = Greenberger | first = Robert | author-link = Robert Greenberger | contribution = Hacker Files, The | editor-last = Dougall | editor-first = Alastair | title = The DC Comics Encyclopedia | pages = 152 | publisher = ] | place = New York | year = 2008 | isbn = 978-0-7566-4119-1 | oclc = 213309017}}</ref>


==Publication history== ==Publication history==
The series written by ] novelist Lewis Shiner is notable for the first appearance of a post ] ] (Oracle). And the introduction of '''Digitronix''' computers, a brand which continued to show up in the DCU for years afterwards. The series, written by ] novelist Lewis Shiner, is notable for the first appearance of a post-] member ] (Oracle), as well as the introduction of the '''Digitronix''' computer company, a fictitious computer brand which would continue to show up in the ] for years thereafter.


In issue #1 Lewis Shiner states that he based the series and its main character Jack Marshall on a unpublished novel called ''Red Weather'' in which he detailed the experiences of a young programmer named Jack Marshall who worked for a Texas based computer company named ''Warrex'', manufacturers of the short lived ''Centurion'' computer. <ref>According to usr/hacker/mail page 25 The Hacker Files #1</ref> At the end of issue 1 in the 'letters pages' section,<ref></ref> author Lewis Shiner reveals that he'd based ''The Hacker Files'' story and comic book protagonist Jack Marshall on his unpublished novel ''Red Weather'', which he'd began developing in Summer 1978. That story dealt with a software programmer in his late-twenties named "Jack Marshall", who worked for a sinister Texas-based computer company. This in itself was inspired by Shiner's employment with ] in the ’70s who produced the Centurion family of minicomputers.<ref></ref><ref></ref>


==Story== ==Story==
Jack Marshall (Hacker) is a freelance systems analyst from ]. Fascinated with computers ever since he was a child, he grew up alongside the industry and eventually ended up working at '''Digitronix World Industries (DTX)''', a small company in ]. Maverick company president Donny Travis worked alongside Marshall to invent the Digitronix Desktop PC. Jack Marshall (Hacker) is a freelance systems analyst from ]. Fascinated with computers ever since he was a child, he grew up alongside the industry and eventually ended up working at '''Digitronix World Industries (DTX)''', a small company in ], Texas. Maverick company president Donny Travis worked alongside Marshall to invent the Digitronix Desktop PC.<ref name="dc-ency"/>

The Digitronix PC's success and profits caused rapid growth in the company, and a new senior Vice President named Walter Sutcliffe denied Marshall any profit sharing from his invention, because said profit sharing was based on a handshake agreement between Marshall and Donny Travis. Sutcliffe was one of five middle managers Donny Travis brought in from CompuTech. According to Jack, CompuTech went under due to incompetent middle management. Marshall attempted to steal his own ] for a new updated version of Digitronix' proprietary ] DROS (Digitronix Resident Operating System) but was caught and summarily terminated. But since he is the only one who truly understands DROS, he is brought in by the United States government (specifically ]) as a freelance troubleshooter whenever there is a problem.<ref name="dc-ency"/>


The Digitronix PC's success and profits caused rapid growth in the company, and a new senior Vice President named Walter Sutcliffe denied Marshall any profit sharing from his invention, because said profit sharing was based on a handshake agreement between Marshall and Donny Travis. Sutcliffe was one of five middle managers Donny Travis brought in from CompuTech. According to Jack, CompuTech went under due to incompetent middle management. Marshall attempted to steal his own ] for a new updated version of Digitronix' proprietary ] DROS (Digitronix Resident Operating System) but was caught and summarily terminated. But since he is the only one who truly understands DROS, he is brought in by the United States government, specifically ] as a freelance troubleshooter whenever there is a problem.
{{spoiler}}
==="SoftWar"=== ==="SoftWar"===
The first Story arc SoftWar dealt with a virus infecting the Digitronix computers used by the ], it had somehow spread over the ] and infected ] (Advanced Research Projects Agency), Securenet (connects to bombers and missiles) and ]. Jack compiles an ] and recounts his history with Digitronix after a confrontation with Sutcliffe. He's able to cure the virus everywhere except ] which isolated itself the moment a virus was detected. The virus takes over the Cheyenne Mountain system and uses it to begin deploying ]s. Jack uncovers a traitor in Cheyenne Mountain who dies while trying to escape, he later stops ] from accidentally launching a nuclear strike on Russia and prevents World War III.<ref>Summary of The Hacker Files issues #1-4</ref> The first Story arc SoftWar dealt with a virus infecting the Digitronix computers used by the ], it had somehow spread over the internet and infected ] (Advanced Research Projects Agency), Securenet (connects to bombers and missiles) and ]. Jack compiles an ] and recounts his history with Digitronix after a confrontation with Sutcliffe. He's able to cure the virus everywhere except ] which isolated itself the moment a virus was detected. The virus takes over the Cheyenne Mountain system and uses it to begin deploying ]s. Jack uncovers a traitor in Cheyenne Mountain who dies while trying to escape, he later stops ] from accidentally launching a nuclear strike on Russia and prevents World War III.<ref>''Summary of The Hacker Files'' issues #1–4</ref>


==="Operation Moonwitch"=== ==="Operation Moonwitch"===
The Operation Moonwitch storyline was based on real world ], a ] crackdown on "illegal computer hacking activities that took place in 1990. The operation is named after a decoy message board used by the Federal Government called ''Moon Witch''. Someone got ahold of the ''] document'' which details how the national emergency response system works, and then they put the document online in a real world ] named '']''. The government uses the theft and publication of the document as an excuse to dismantle the Hacker subculture. They arrest Sue Denim of the Speed Metal Kids after copies of the document are planted on their personal computers, and Oracle (Barbara Gordon) who downloaded a copy from Phrack as apart of an investigation. Barbara accidentally shoots a Federal agent who had burst into her bedroom, but his vest saves him, in federal prison she uses the alias ''Amy Beddoes'' from her days with the ]. Jack Marshall finds a copy on his own machine and deletes it, he's able to trace that copy back to Digitronix World Industries. ] of ] calls in the assistance of ] Hal Jordan on behalf of Sue Denim and Oracle, but Jack Marshall gets there first. ] is able to prove that the file originated at Digitronix and all the detainees are set free.<ref></ref> The Operation Moonwitch storyline was based on real world ], a ] crackdown on illegal computer hacking activities that took place in 1990. The operation is named after a decoy message board used by the Federal Government called ''Moon Witch''. Someone got hold of the ''] document'' which details how the national emergency response system works, and then they put the document online in a real world ] named '']''. The government uses the theft and publication of the document as an excuse to dismantle the Hacker subculture. They arrest Sue Denim of the Speed Metal Kids after copies of the document are planted on their personal computers, and Oracle (Barbara Gordon) who downloaded a copy from Phrack as part of an investigation. Barbara accidentally shoots a Federal agent who had burst into her bedroom, but his vest saves him, in federal prison she uses the alias ''Amy Beddoes'' from her days with the ]. Jack Marshall finds a copy on his own machine and deletes it, he's able to trace that copy back to Digitronix World Industries. ] of ] calls in the assistance of ] ] on behalf of Sue Denim and Oracle, but Jack Marshall gets there first. ] is able to prove that the file originated at Digitronix and all the detainees are set free.].]]
]]]


==="Working-Class Hero"=== ==="Working-Class Hero"===
Jack confronts his former co-worker Yoshio Natsume. Yoshio is the nephew of Tohiro Natsume whose Japanese company originally supplied Digitronix with cheap computer chips he bought on the Black Market from the ], but he later built chip foundries on the Chinese mainland. Jack confronts Yoshio with evidence of his complicity in the Pentagon Virus and the E911 document leak. Jack discovers that Yoshio was framed by Sutcliffe who has been using his ] account and password. Yoshio introduces Jack to Yan Qing a Chinese exile and a survivor of the ], her fiance Yi who worked at a Digitronix assembly plant in China, had discovered an undocumented feature in the machine he was working on, it automatically recorded all spoken conversation in its local environment and stored it in a hidden ] on the machine's optical ]. He disappeared soon after sharing this fact with a close friend from the plant. Jack schedules a meeting with his ex-wife Kathy Spencer who works in Digitronix' hardware division, and who designed the security hardware that protects all Digitronix plants. Kathy gives Jack a device which should get him past a plant's electronic security. Jack goes to China intending to break into one of the assembly plants, but his arrival is anticipated by Sutcliffe. Due to a botched infiltration Jack and Yoshio and captured by Sutcliffe and thrown into a holding cell with Yi. While in that cell they begin to see the outlines of the '']'' conspiracy, the true reason for the virus, and how the information retrieved from the computers would be routed by the virus and co-ordinated by Tohiro Natsume's newest project a ] with 64 ]s. They escape from the cell using Kathy's anti-security device, and sneak Yi out of China by shipping him to the US in an equipment box.<ref>Summary of The Hacker Files issues #7-10</ref> Jack confronts his former co-worker Yoshio Natsume. Yoshio is the nephew of Tohiro Natsume whose Japanese company originally supplied Digitronix with cheap computer chips he bought on the Black Market from the Yakuza, but he later built chip foundries on the Chinese mainland. Jack confronts Yoshio with evidence of his complicity in the Pentagon Virus and the E911 document leak. Jack discovers that Yoshio was framed by Sutcliffe who has been using his ] account and password. Yoshio introduces Jack to Yan Qing a Chinese exile and a survivor of the ], her fiance Yi who worked at a Digitronix assembly plant in China, had discovered an ] in the machine he was working on, it automatically recorded all spoken conversation in its local environment and stored it in a hidden ] on the machine's optical ]. He disappeared soon after sharing this fact with a close friend from the plant. Jack schedules a meeting with his ex-wife Kathy Spencer who works in Digitronix' hardware division, and who designed the security hardware that protects all Digitronix plants. Kathy gives Jack a device which should get him past a plant's electronic security. Jack goes to China intending to break into one of the assembly plants, but his arrival is anticipated by Sutcliffe. Due to a botched infiltration Jack and Yoshio and captured by Sutcliffe and thrown into a holding cell with Yi. While in that cell they begin to see the outlines of the '']'' conspiracy, the true reason for the virus, and how the information retrieved from the computers would be routed by the virus and co-ordinated by Tohiro Natsume's newest project a ] with 64 ]s. They escape from the cell using Kathy's anti-security device, and sneak Yi out of China by shipping him to the US in an equipment box.<ref>''Summary of The Hacker Files'' issues #7–10</ref>


==="Showdown"=== ==="Showdown"===
Yoshio discovers a massive mobilization of Digitronix personnel and hardware being sent to a secret facility at ] in ], ], ] language modules, and experimental ] buses. They figure out that Digitronix is building a working globally networked ] which they intend to use to process a few million ]s of stolen government and industrial secrets. Jack uses a Digitronix ] to contact ] headquarters in ], and offers them a cure for the Pentagon virus. When he gets there he tells Hal Jordan and the rest of the JLE what Digitronix is really up to. ] scouts the installation at superspeed and runs into a door knocking himself out, he is captured by Digitronix security but escapes them when he wakes up. Jack uses the ] interface to hack the AI which looks like Sutcliffe, he confronts it inside a game of ''Code of the West''. Jack had designed a compact videogame for the DTX PC called ''Code of the West'', it is also a ] which is ] into the operating system of every Digitronix PC. Jack uses this game to define the rules of the fight between himself and the AI. The AI makes sure there is no possible way for it to lose the game. Jack deliberately loses to the AI, allowing it to kill him him in the game, because "''There's a million ways to END the game by losing...but NONE to end it by WINNING. And since you CAN'T lose...you're going to be here a LONG time''". And he leaves the AI playing the game, stuck in a ]. Yoshio is put in charge of Digitronix, and no charges are filed against the company.<ref>Summary of The Hacker Files issues #11-12</ref> Yoshio discovers a massive mobilization of Digitronix personnel and hardware being sent to a secret facility at ] in Kazakhstan, ], ] language modules, and experimental ] buses. They figure out that Digitronix is building a working globally networked artificial intelligence which they intend to use to process a few million ]s of stolen government and industrial secrets.<ref name="dc-ency"/> Jack uses a Digitronix ] to contact ] headquarters in London, and offers them a cure for the Pentagon virus. When he gets there he tells Hal Jordan and the rest of the JLE what Digitronix is really up to. ] scouts the installation at superspeed and runs into a door knocking himself out, he is captured by Digitronix security but escapes them when he wakes up. Jack uses the ] interface to hack the AI which looks like Sutcliffe, he confronts it inside a game of ''Code of the West''. Jack had designed a compact videogame for the DTX PC called ''Code of the West'', it is also a ] which is ] into the operating system of every Digitronix PC. Jack uses this game to define the rules of the fight between himself and the AI. The AI makes sure there is no possible way for it to lose the game. Jack deliberately loses to the AI, allowing it to kill him in the game, because "''There's a million ways to END the game by losing...but NONE to end it by WINNING. And since you CAN'T lose...you're going to be here a LONG time''". He leaves the AI playing the game, stuck in a ]. Yoshio is put in charge of Digitronix, and no charges are filed against the company.<ref>''Summary of The Hacker Files'' issues #11–12</ref>
{{endspoilers}}


==Speed Metal Kids== ==Speed Metal Kids==
The ] Kids are teenage hackers who worship internet personalities like Hacker and Oracle, and who serve as his assistants. The Speed Metal Kids are teenage hackers who worship internet personalities like Hacker and Oracle, and who serve as his assistants:
*'''Sue Denim''' - Fifteen year old ] fan. * '''Sue Denim''' fifteen-year-old ] fan.
*'''Phreaky Phreddy''' - As in ], * '''Phreaky Phreddy''' as in ].
*'''Master Blaster''' - A thirteen year old ] video game buff. * '''Master Blaster''' a thirteen-year-old African-American video game buff.


==Digitronix PC== ==Digitronix PC==
The Digitronix PC (DTX PC) of 1992 is an inexpensive ] ] that can also serve as a business capable ] or a ]. It boasted 100 ] of ], an ] monitor and optical disk storage, possibly based on the ]'s ]. It also had built in compatibility with ]\] formats and had built in ], as well as advanced digital audio and video editing capacity on-chip, possibly as ]s similar to the ]. The Digitronix PC (DTX PC) of 1992 is an inexpensive ] personal computer that can also serve as a business capable ] or a ]. It boasted 100 ] of ], an ] monitor and optical disk storage, possibly based on the ]'s ]. It also had built in compatibility with ]\] formats and had built in ], as well as advanced digital audio and video editing capacity on-chip, possibly as ]s similar to the ].


==DROS==<!-- This section is linked from ] -->
==DROS==
DROS is the ''Digitronix Resident Operating System'', a free copy of DROS was bundled with every machine. Lewis Shiner gives detailed information on the inner workings of DROS in the '''usr/hacker/mail''' section at the back of the first two issues. Because series consultant Alan Wexelblat had warned him that ] wasn't considered secure enough for government installation (in 1992), he decided that DROS would look like UNIX but would not exactly be UNIX. Kim Fairchild another series consultant suggested that he use ] as DROS' resident ]. In DROS file blocks are graphically represented as rows of stacked rectangular blocks. All commands shown when Jack interacts with DROS are Unix commands. As in UNIX, ] and ], there are user and superuser accounts.<ref>According to usr/hacker/mail page 25 The Hacker Files #1 and 2</ref> DROS is the ''Digitronix Resident Operating System'', a free copy of DROS was bundled with every machine. Lewis Shiner gives detailed information on the inner workings of DROS in the '''usr/hacker/mail''' section at the back of the first two issues. Because series consultant Alan Wexelblat had warned him that ] wasn't considered secure enough for government installation (in 1992), he decided that DROS would look like UNIX but would not exactly be UNIX. Kim Fairchild, another series consultant, suggested that he use ] as DROS' resident ]. In DROS file blocks are graphically represented as rows of stacked rectangular blocks. All commands shown when Jack interacts with DROS are Unix commands. As in UNIX, ] and ], there are user and superuser accounts.<ref>According to usr/hacker/mail page 25, ''The Hacker Files'' No. 1 and 2</ref>


===Command line examples=== ===Command line examples===
Line 68: Line 66:
|} |}


==Trivia== ==Notes==
*In issue #11 of the series Digitronix technicians in Kazakhstan demonstrate an early prototype virtual reality computer interface that may be the same one later used by Barbara Gordon (Oracle). * In issue No. 11 of the series Digitronix technicians in Kazakhstan demonstrate an early prototype virtual reality computer interface that may be the same one later used by Barbara Gordon (Oracle).
*The letters printed in issues #3-12 were taken from online letter columns that Shiner setup on ] and ] bulletin boards. Some of the letters were from computer industry professionals and enthusiasts who often corrected technical errors they had found in previous issues. * The letters printed in issues #3–12 were taken from online letter columns that Shiner setup on ] and ] bulletin boards. Some of the letters were from computer industry professionals and enthusiasts who often corrected technical errors they had found in previous issues.
* The cover to issue #8 shows a DTX (Digitronix) ] optical storage disk (possibly a hybrid magneto-optical/] drive), with a 40 megabyte to 2 gigabyte storage capacity and a DTX ]. The optical storaqe disk is labeled as "], ], ] and ] compatible". * The cover to issue No. 8 shows a DTX (Digitronix) ] optical storage disk (possibly a hybrid magneto-optical/] drive), with a 40 megabyte to 2 gigabyte storage capacity and a DTX ]. The optical storage disk is labeled as "], ], ] and ] compatible".
* According to the book's ] entry, Digitronix computers are supposedly used by both ] and Oracle. * According to the book's '']'' entry, Digitronix computers are supposedly used by both ] and Oracle.


==References== ==References==
{{Reflist}}
<div class="references-small">
<references />
</div>


==External links== ==External links==
* *
* * {{Webarchive|url=https://web.archive.org/web/20110410032230/http://cu-digest.org/phracks/phrack-40 |date=April 10, 2011}}
* *
*

{{-}}


] {{DEFAULTSORT:Hacker Files}}
] ]
] ]
]

Latest revision as of 02:02, 15 December 2024

The Hacker Files
Cover to Hacker Files No. 2, artist Tom Sutton.
Publication information
PublisherDC Comics
Schedulemonthly
Formatmini-series
Publication dateAugust 1992 – July 1993
No. of issues12
Main character(s)Jack Marshall
Barbara Gordon
Sarge Steel
Creative team as of August 1992
Created byLewis Shiner, Tom Sutton
Written byLewis Shiner
Penciller(s)Tom Sutton
Inker(s)Mark Buckingham

The Hacker Files is a twelve issue DC Comics mini-series published from August 1992 to July 1993. It was written by Lewis Shiner and illustrated by Tom Sutton.

Publication history

The series, written by cyberpunk novelist Lewis Shiner, is notable for the first appearance of a post-Suicide Squad member Barbara Gordon (Oracle), as well as the introduction of the Digitronix computer company, a fictitious computer brand which would continue to show up in the DCU for years thereafter.

At the end of issue 1 in the 'letters pages' section, author Lewis Shiner reveals that he'd based The Hacker Files story and comic book protagonist Jack Marshall on his unpublished novel Red Weather, which he'd began developing in Summer 1978. That story dealt with a software programmer in his late-twenties named "Jack Marshall", who worked for a sinister Texas-based computer company. This in itself was inspired by Shiner's employment with Warrex Computer Corp. in the ’70s who produced the Centurion family of minicomputers.

Story

Jack Marshall (Hacker) is a freelance systems analyst from Raleigh, North Carolina. Fascinated with computers ever since he was a child, he grew up alongside the industry and eventually ended up working at Digitronix World Industries (DTX), a small company in Dallas, Texas. Maverick company president Donny Travis worked alongside Marshall to invent the Digitronix Desktop PC.

The Digitronix PC's success and profits caused rapid growth in the company, and a new senior Vice President named Walter Sutcliffe denied Marshall any profit sharing from his invention, because said profit sharing was based on a handshake agreement between Marshall and Donny Travis. Sutcliffe was one of five middle managers Donny Travis brought in from CompuTech. According to Jack, CompuTech went under due to incompetent middle management. Marshall attempted to steal his own codebase for a new updated version of Digitronix' proprietary operating system DROS (Digitronix Resident Operating System) but was caught and summarily terminated. But since he is the only one who truly understands DROS, he is brought in by the United States government (specifically Sarge Steel) as a freelance troubleshooter whenever there is a problem.

"SoftWar"

The first Story arc SoftWar dealt with a virus infecting the Digitronix computers used by the Pentagon, it had somehow spread over the internet and infected Arpanet (Advanced Research Projects Agency), Securenet (connects to bombers and missiles) and Milnet. Jack compiles an anti-virus and recounts his history with Digitronix after a confrontation with Sutcliffe. He's able to cure the virus everywhere except Cheyenne Mountain Complex which isolated itself the moment a virus was detected. The virus takes over the Cheyenne Mountain system and uses it to begin deploying ICBMs. Jack uncovers a traitor in Cheyenne Mountain who dies while trying to escape, he later stops General Wade Eiling from accidentally launching a nuclear strike on Russia and prevents World War III.

"Operation Moonwitch"

The Operation Moonwitch storyline was based on real world Operation Sundevil, a United States Secret Service crackdown on illegal computer hacking activities that took place in 1990. The operation is named after a decoy message board used by the Federal Government called Moon Witch. Someone got hold of the E911 document which details how the national emergency response system works, and then they put the document online in a real world zine named Phrack. The government uses the theft and publication of the document as an excuse to dismantle the Hacker subculture. They arrest Sue Denim of the Speed Metal Kids after copies of the document are planted on their personal computers, and Oracle (Barbara Gordon) who downloaded a copy from Phrack as part of an investigation. Barbara accidentally shoots a Federal agent who had burst into her bedroom, but his vest saves him, in federal prison she uses the alias Amy Beddoes from her days with the Suicide Squad. Jack Marshall finds a copy on his own machine and deletes it, he's able to trace that copy back to Digitronix World Industries. Catherine Cobert of Justice League International calls in the assistance of Green Lantern Hal Jordan on behalf of Sue Denim and Oracle, but Jack Marshall gets there first. Oracle is able to prove that the file originated at Digitronix and all the detainees are set free.

Jack Marshall, art by Tom Sutton.

"Working-Class Hero"

Jack confronts his former co-worker Yoshio Natsume. Yoshio is the nephew of Tohiro Natsume whose Japanese company originally supplied Digitronix with cheap computer chips he bought on the Black Market from the Yakuza, but he later built chip foundries on the Chinese mainland. Jack confronts Yoshio with evidence of his complicity in the Pentagon Virus and the E911 document leak. Jack discovers that Yoshio was framed by Sutcliffe who has been using his superuser account and password. Yoshio introduces Jack to Yan Qing a Chinese exile and a survivor of the Tiananmen Square protests of 1989, her fiance Yi who worked at a Digitronix assembly plant in China, had discovered an undocumented feature in the machine he was working on, it automatically recorded all spoken conversation in its local environment and stored it in a hidden partition on the machine's optical hard drive. He disappeared soon after sharing this fact with a close friend from the plant. Jack schedules a meeting with his ex-wife Kathy Spencer who works in Digitronix' hardware division, and who designed the security hardware that protects all Digitronix plants. Kathy gives Jack a device which should get him past a plant's electronic security. Jack goes to China intending to break into one of the assembly plants, but his arrival is anticipated by Sutcliffe. Due to a botched infiltration Jack and Yoshio and captured by Sutcliffe and thrown into a holding cell with Yi. While in that cell they begin to see the outlines of the Aleph conspiracy, the true reason for the virus, and how the information retrieved from the computers would be routed by the virus and co-ordinated by Tohiro Natsume's newest project a supercomputer with 64 parallel processors. They escape from the cell using Kathy's anti-security device, and sneak Yi out of China by shipping him to the US in an equipment box.

"Showdown"

Yoshio discovers a massive mobilization of Digitronix personnel and hardware being sent to a secret facility at Tyuratam in Kazakhstan, parallel processors, Prolog language modules, and experimental fiber optic buses. They figure out that Digitronix is building a working globally networked artificial intelligence which they intend to use to process a few million gigabytes of stolen government and industrial secrets. Jack uses a Digitronix videophone to contact Justice League Europe headquarters in London, and offers them a cure for the Pentagon virus. When he gets there he tells Hal Jordan and the rest of the JLE what Digitronix is really up to. Wally West scouts the installation at superspeed and runs into a door knocking himself out, he is captured by Digitronix security but escapes them when he wakes up. Jack uses the virtual reality interface to hack the AI which looks like Sutcliffe, he confronts it inside a game of Code of the West. Jack had designed a compact videogame for the DTX PC called Code of the West, it is also a backdoor which is hardcoded into the operating system of every Digitronix PC. Jack uses this game to define the rules of the fight between himself and the AI. The AI makes sure there is no possible way for it to lose the game. Jack deliberately loses to the AI, allowing it to kill him in the game, because "There's a million ways to END the game by losing...but NONE to end it by WINNING. And since you CAN'T lose...you're going to be here a LONG time". He leaves the AI playing the game, stuck in a recursive loop. Yoshio is put in charge of Digitronix, and no charges are filed against the company.

Speed Metal Kids

The Speed Metal Kids are teenage hackers who worship internet personalities like Hacker and Oracle, and who serve as his assistants:

  • Sue Denim – fifteen-year-old heavy metal fan.
  • Phreaky Phreddy – as in phone phreaking.
  • Master Blaster – a thirteen-year-old African-American video game buff.

Digitronix PC

The Digitronix PC (DTX PC) of 1992 is an inexpensive OEM personal computer that can also serve as a business capable workstation or a clustered file server. It boasted 100 megabytes of ram, an HDTV monitor and optical disk storage, possibly based on the NeXTcube's magneto-optical drive. It also had built in compatibility with NTSC\PAL formats and had built in composite video out, as well as advanced digital audio and video editing capacity on-chip, possibly as coprocessors similar to the Amiga.

DROS

DROS is the Digitronix Resident Operating System, a free copy of DROS was bundled with every machine. Lewis Shiner gives detailed information on the inner workings of DROS in the usr/hacker/mail section at the back of the first two issues. Because series consultant Alan Wexelblat had warned him that UNIX wasn't considered secure enough for government installation (in 1992), he decided that DROS would look like UNIX but would not exactly be UNIX. Kim Fairchild, another series consultant, suggested that he use emacs as DROS' resident text editor. In DROS file blocks are graphically represented as rows of stacked rectangular blocks. All commands shown when Jack interacts with DROS are Unix commands. As in UNIX, BSD and Linux, there are user and superuser accounts.

Command line examples

/dev/sd0a
pent1.dod.com:/usr/share
rm vcom.doc

Notes

  • In issue No. 11 of the series Digitronix technicians in Kazakhstan demonstrate an early prototype virtual reality computer interface that may be the same one later used by Barbara Gordon (Oracle).
  • The letters printed in issues #3–12 were taken from online letter columns that Shiner setup on GEnie and CompuServe bulletin boards. Some of the letters were from computer industry professionals and enthusiasts who often corrected technical errors they had found in previous issues.
  • The cover to issue No. 8 shows a DTX (Digitronix) SCSI optical storage disk (possibly a hybrid magneto-optical/DVD RAM drive), with a 40 megabyte to 2 gigabyte storage capacity and a DTX mainboard. The optical storage disk is labeled as "Macintosh, NeXT, DOS and Novell compatible".
  • According to the book's Who's Who entry, Digitronix computers are supposedly used by both Batman and Oracle.

References

  1. ^ Greenberger, Robert (2008), "Hacker Files, The", in Dougall, Alastair (ed.), The DC Comics Encyclopedia, New York: Dorling Kindersley, p. 152, ISBN 978-0-7566-4119-1, OCLC 213309017
  2. The Hacker Files #1: usr/hacker/mail
  3. Lewis Shiner Autobiography: Life As We Know It
  4. Bitsavers.org: Centurion Business Computers PDF
  5. Summary of The Hacker Files issues #1–4
  6. Summary of The Hacker Files issues #7–10
  7. Summary of The Hacker Files issues #11–12
  8. According to usr/hacker/mail page 25, The Hacker Files No. 1 and 2

External links

Categories: