Shop Teenage Mutant Ninja Turtles
Buy used:
$53.95
Used: Good | Details
Sold by teddybear
Condition: Used: Good
Access codes and supplements are not guaranteed with used items.
Added to

Sorry, there was a problem.

There was an error retrieving your Wish Lists. Please try again.

Sorry, there was a problem.

List unavailable.
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the author

Something went wrong. Please try your request again later.

The Best of 2600: A Hacker Odyssey 1st Edition

4.5 4.5 out of 5 stars 60 ratings

Since 1984, the quarterly magazine 2600 has provided fascinating articles for readers who are curious about technology. Find the best of the magazine’s writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker’s perspective. Included are stories about the creation of the infamous tone dialer “red box” that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks.

Customer reviews

4.5 out of 5 stars
60 global ratings

Review this product

Share your thoughts with other customers

Customers say

Customers find the book a valuable reference and an interesting read. They appreciate the great stories from an era before their time, including adventures about brave kids making a stand against tyranny. The content is described as amazing, with a curated selection of the best articles from 2600 magazine. Readers also mention that the book provides a great history of hacking and perspective on the hacker culture.

AI-generated from the text of customer reviews

13 customers mention "Value for money"12 positive1 negative

Customers find the book a valuable reference and investment. They describe it as an interesting read with priceless wisdom. Readers also mention it's fun and unique, calling it a masterpiece.

"...The book is organized by decade. The stories are varied and quite fascinating, most of them also amusing or just plain hilarious...." Read more

"This is an incredible book that has had a permanent place on my coffee table since I first purchased it...." Read more

"...It provides so much value in terms of how hackers operate, their way of thinking... I loved (almost) every page of it...." Read more

"...Great book." Read more

9 customers mention "Story quality"9 positive0 negative

Customers enjoy the stories in the book. They find them interesting, with some involving obsolete ideas. The stories are described as adventure stories about brave and rebellious kids making a stand against tyranny. Readers describe the book as an exploration of knowledge, history, and perspective on the hacker culture. It is a time capsule back to the 80s, where phone phreaking and shenanigans were commonplace.

"...I've only begun to dig in and already the stories are interesting - stories from an era before my time! The book is organized by decade...." Read more

"...picks up in the late 90's and early 2000's, so it was a return dose of nostalgia for me...." Read more

"...An amazing look at the history of an important zine." Read more

"This is a time capsule back to the 80s where phone phreaking and shenanigans in good fun were happening all over in a gray area. Great book." Read more

8 customers mention "Content quality"8 positive0 negative

Customers find the book's content great. They say it contains a curated selection of the best articles from 2600, a quarterly magazine. The book is packed with great articles on topics like the Red Box and FBI raids. It provides a lot of knowledge over the years in one place.

"...This book contains a curated selection of the best articles from 2600, a quarterly magazine by and for hackers and phreakers...." Read more

"...It's a hefty collection of articles that have run in the legendary hacker zine 2600, and the selections give an excellent feeling of what it's like..." Read more

"...By far, this is the most influential of them and if it was up to me, it would be a permanent requirement for everyone who steps in any security..." Read more

"This books contains selected articles from the magazine 2600...." Read more

7 customers mention "History of hacking"7 positive0 negative

Customers enjoy the history of hacking. They find it a great resource for knowledge, history, and perspective on the hacker culture.

"...As such, it's an amazing historical record of phreaking, hacking, social engineering, and more!..." Read more

"...read as a technical guide, but as an anthology and history book about the culture of hacking...." Read more

"I love the stories of how hacking was started, the journeys that these people witnessed, and how..." Read more

"The hacker ethos is beautifully captured in this anthology...." Read more

Low impact
2 out of 5 stars
Low impact
The magazine costs only a couple of bucks and the information in it is worth about as much.Don't expect to learn anything useful from this book. It's a bunch of hot air. Useless blabber. While reading this you understand the chasam in skill between the author's of this magazine and it's readership and real hackers who could actually accomplish anything impressive with a computer.
Thank you for your feedback
Sorry, there was an error
Sorry we couldn't load the review

Top reviews from the United States

  • Reviewed in the United States on March 2, 2011
    For anyone who has any interest in technology, this will be a great investment. I've only begun to dig in and already the stories are interesting - stories from an era before my time! The book is organized by decade. The stories are varied and quite fascinating, most of them also amusing or just plain hilarious. I look forward to reading more of it.

    If you are a nerd or really into computers, this is a must. It will help you to understand and better appreciate the technology that today is taken quite for granted, simply because it's no longer impressive compared to what's out there now on the cutting edge, and because today's younger generations grew up with it. But think on this: any search website provides you with search results for the ENTIRE INTERNET in less than a second. Every second of every day, people travel through the air all over the entire world. Satellites communicate tirelessly with almost anything and provide us most of the everyday pleasures which we also take for granted - streaming video, online games, and phone service, just to name a few. Video conferencing is common and affordable, allowing you to talk to loved ones face-to-face from the other side of the world. Phones can now function as your media player, personal planner, and portable gaming system all in one. Many phones and other small devices today are orders of magnitude more powerful than the first mainframe computers, which took up an entire room of a building.

    If any of this got you thinking or even curious about technology, give this book a read. You don't need to be a "hacker" to understand it. Most of the articles are written for (and sometimes, by) people who are not themselves hackers.

    Overall, a great value and great stories contained within.
    One person found this helpful
    Report
  • Reviewed in the United States on July 18, 2016
    This is an incredible book that has had a permanent place on my coffee table since I first purchased it. This book contains a curated selection of the best articles from 2600, a quarterly magazine by and for hackers and phreakers. As such, it's an amazing historical record of phreaking, hacking, social engineering, and more! There's something here for everyone, regardless of previous knowledge, skill level, and hat color (be advised, this book DOES contain records and instructions for acts of questionable legality, use only as an educational tool, not a field manual). Over the years, I've lent this book to countless friends. It has a comprehensive index in the back, which makes it a great reference book. I've cited articles in this book for papers and reports written for both work and school many times. I can't say enough good things about this book. If you're interested in hacking, phreaking, social engineering, or similar subjects, you need this.
  • Reviewed in the United States on December 7, 2017
    I was born in 1984, the same year this magazine launched. I first discovered 2600 in the early 2000's and kept a subscription through most of the decade. This book is split into roughly 2 halves and I loved both of them for very different reasons.

    The first half covers the early days of hacking as phone phreaks sought to understand and manipulate the carcass of what was once AT&T. Reading about the glory days when you could blue box your way to free calls, or use a common police scanner to listen in on cell phone calls was the ultimately history book for a geek like me. The second half really picks up in the late 90's and early 2000's, so it was a return dose of nostalgia for me. I actually remembered several of the articles from my days as a high school senior, fighting the power, and hoping to surf the web beyond my school system's firewall.

    If you've got even a tiny interest in the history of the web and technology, you'll probably enjoy this book. If you love to tinker and understand how things work, I know you'll love it.
    2 people found this helpful
    Report
  • Reviewed in the United States on March 24, 2015
    Nearly all of the technical information gathered in this volume is obsolete, but that shouldn't discourage you from checking it out. It's a hefty collection of articles that have run in the legendary hacker zine 2600, and the selections give an excellent feeling of what it's like to be a subscriber to the publication. There's a lot of focus on some of the highlights of the past couple of decades: the great series of articles on the Red Box, the notorious FBI raids and crackdowns that are discussed in Bruce Sterling's book "The Hacker Crackdown", and plenty of Kevin Mitnick and Bernie S. info. An amazing look at the history of an important zine.
  • Reviewed in the United States on October 24, 2019
    My security library consists of almost 200 books. By far, this is the most influential of them and if it was up to me, it would be a permanent requirement for everyone who steps in any security course/college/university. It provides so much value in terms of how hackers operate, their way of thinking... I loved (almost) every page of it. Obviously, you will find some dated articles, but it's like going back in time and reliving all those years.. Highly recommended. To everyone who Loves infosec.
    2 people found this helpful
    Report
  • Reviewed in the United States on December 12, 2021
    This is a time capsule back to the 80s where phone phreaking and shenanigans in good fun were happening all over in a gray area. Great book.
  • Reviewed in the United States on May 29, 2010
    Generally when something is the "best" it is actually really really good. This book is full of average and slightly above average. Worth reading but not amazing.
  • Reviewed in the United States on October 16, 2012
    What good is a book with a bunch of outdated information? 2600 is a reference to the 2600Hz tone that in the past could be used to trick land line phones to enable free long distance calls. While this no longer works, what is valuable than the knowledge (much of which is outdated) in this book is the priceless wisdom (which is forever valuable).

    This book is very political and represents the opinions of many non-conformists. An example the essays over the hysteria over computer crime compared to regular crime. For example stealing a physical object vs copying a file. If a file is copied the original is left intact. This is much different than stealing it which the original owner wouldn't have it anymore.

Top reviews from other countries

  • Patrick
    5.0 out of 5 stars Five Stars
    Reviewed in Canada on August 31, 2017
    If you like this stuff you're gunna love this book.
  • N. Barron
    5.0 out of 5 stars Absolutely superb piece of hacker history
    Reviewed in the United Kingdom on March 13, 2009
    2600 magazine is always an entertaining and informative read, and this long awaited compendium of articles is equally good. If you're familiar with 2600 then you probably own a copy already.

    Inside this book you'll find first hand reports from those involved in many of the events that have been poorly reported and distorted by "experts" elsewhere (such as the Kevin Mitnick case, covered by books like Takedown and Cyberpunk). There's also a fascinating slice of computer history showing the evolution of the Internet from geek toy to mainstream business tool.

    For the techies there are plenty of explanatory articles, including the best technical description of GSM I've seen anywhere. There are also plenty of laugh-out-loud hacker stories.

    This is not a "how to break into xxx" book, it's a book about real hackers, and it is superb value for money. If you have the slightest interest in computer security you should own it.
  • Tiggy
    5.0 out of 5 stars 2600
    Reviewed in the United Kingdom on January 15, 2013
    its a compilation of the best bits of 2600. its a good read. it'll bring back lots of memories & what not. buy it, its a giggle