Old School Computer Crime

Gourmet Eggs and Fish
Friday Fiction: Light Up!

Combating Computer Crime - cover


Combating Computer Crime
Chantico Publishing

Mary: This hi-tech manual has all sorts of helpful advice about phone modems, DOS boot disks, and identifying computer criminals. Mostly this seems to describe scenarios taken from WarGames.  There is no earthly reason this is helpful to anyone in 2013.  Why it is still on the shelf in a public library is beyond me.


Holly: What does that old-school phone receiver on the cover have to do with anything?  Also, the back cover indicates that there are “hands-on worksheets” in this book.  That’s a bad, bad idea for a public library book.  They get filled in (in ink…) the first time the book circulates.  Good to know that protection software is a “rapidly growing” market, though. They had no idea in 1992 about phishing, pharming, malware, trojans, worms, etc.  No. Idea.


Combating Computer Crime - back cover

Characteristics of the computer criminal

Security Software


  1. The lettering on those keyboard keys are so impossibly small I don’t see how anyone could use it.

    Aside from that artistic note, it’s definitely something that should be replaced with some more currently-applicable stuff.

  2. The phone on the cover obviously is meant to alert you to the section on “unauthorized pone access” via the modem. Ah, dial-up… SSSSSSSSZZZZZZZZZPPPPPPPSSSSSST!

  3. In 1973-73, our school had a time-share arrangement with a computer in another tow. Ours was just a terminal and the computing was done elsewhere. You took the phone and put the receiver in a cushioned cradle. When you typed, the signal would go to the real computer, and the terminal would produce a punched tape spewing from your machine like skeeball tickets. You could also whistle into the receiver and make it print out random letters, which was fun but pointless..

  4. Well, it’s not really like you need to see the letters on a keyboard to type. I’ve managed to entirely rub off the letters on about ten keys on mine without major damage to my typing speed.

    I’m not a great fan of over-weeding in some sections, but you know… computers have come a long way, baby. There’s a point where keeping tech books is library malpractice.

  5. I remember in the late 80s, I had a boyfriend who would tie up his phone using his modem, sometimes not even realizing he’d left it connected. A couple of times when I was trying to call him with no success, I was able to crash and disconnect the modem by whistling the correct frequency into the phone.

  6. ” They had no idea in 1992 about phishing, pharming, malware, trojans, worms, etc. No. Idea.”

    Actually, those of us involved in computers dealt with much of this (although things like phishing were more likely to be done over the phone than in email) much earlier than the 90s. I’d admit, however, it never made the nightly news.

Comments are closed.