The Cuckoo’s Egg, traducido al castellano como El huevo del cuco escrito por Clifford Stoll en narra una historia de espionaje en las. Libros de segunda mano (posteriores a ) – Literatura – Narrativa – Terror, Misterio y Policíaco: El huevo del cuco – clifford stoll. Compra, venta y subastas de. El huevo del Cuco (Clifford Stoll). 5 likes. Book. El huevo del Cuco (Clifford Stoll). Book. 5 people like this topic. Want to like this Page? Sign up for Facebook .

Author: Voodoot Gall
Country: Netherlands
Language: English (Spanish)
Genre: Science
Published (Last): 8 March 2005
Pages: 129
PDF File Size: 12.81 Mb
ePub File Size: 19.27 Mb
ISBN: 792-1-72654-127-5
Downloads: 56189
Price: Free* [*Free Regsitration Required]
Uploader: Dolmaran

Retrieved from ” https: Fun and easy read for computer nerds. Psig rated it it was ok Dec 25, An entertaining read but a bit thin in the character department.

El huevo del cuco – Clifford Stoll – Google Books

A neat, true account of an 80s computer admin tracking one of the earlier hackers. So many good things to say about the book. It’s irritating that he tries to patchwork it together with tales of his ‘zany’ Bay Area lifestyle, as if he’s writing an episode of Quincy.

The ending gave you the details of what was actually happening at the other end of the wire, which happened to be much more interested than the end we follow throughout the book. Paperbackpages. For someone who likes old school technology or is interested with reading about a guy investing time into a hacker this would be a good read.

El huevo del cuco

Stoll traced the error to an unauthorized user who had apparently used 9 seconds of computer time and not paid for it. Eventually Stoll hypothesized that since modem bills are cheaper at night, and most people have school or a day job and would only have a lot of free time for hacking at night, the hacker was in a time zone some distance to the east.


The FBI in particular was uninterested as no large sum of money was involved. The middle was constant repetition of the same scenario: Or Brian, you might be correct.

There was ancillary proof of this when a Hungarian spy contacted the fictitious SDInet at LBL by mail, based on information he could only have obtained through Hess. It was okay cufo it’s not the kind of book I am going to remember. Miles rated it it was ok Jun 05, A lot of the geekery is horribly familiar.

El huevo del cuco by Clifford Stoll (2 star ratings)

Books by Clifford Stoll. Trivia About The Cuckoo’s Egg Google’s ngram viewer shows that it occurs the most in yes years agowhereas “ball of wax” was popular in, then grew in popularity from to the present. Open Preview See a Problem? Webarchive template wayback links Pages to import images to Wikidata. After all, “bailiwick” is commonly found in contemporary textbooks. After all, “bailiwick” is commonly found in contemporary …more I suspect that it shows heuvo he appreciates older literature.

Bryan Oh rated it it was ok Sep 17, The beginning set you up for an exciting tail of computer hacking and counter-hacking.

Shyue Chou Chuang rated it it was ok Jul 07, I definitely liked the premise. Preview — El huevo del cuco by Clifford Stoll.

Just a moment while we sign you in to your Goodreads account. Vishwassohal rated it it was ok Mar 02, To ask other readers questions about El huevo del cucoplease sign up. Confirming my feeling that hacking is, though scary, really rather dull.


Tim Butler rated it it was ok May 30, The book’s ok if you assume he’s genuinely a non-writer writing about something interesting that happened to him. For the number sequence, see Look-and-say sequence.

NSA is rumored to tape record every transatlantic cuck conversation. This page was last edited on 1 Novemberat Although the book and the technology are very dlifford at this point “ohmigod how many more times is this book going to say ‘electronic mail'”it’s often beneficial to understand the foundations upon I have extremely mixed feelings about this book.

Thanks for telling us about the problem. But somehow I got extremely bored with it. He also noted that the hacker tended to be active around the middle of the day, Pacific time. He saw that the hacker was using a baud connection and realized that the intrusion was coming through a telephone modem connection. Although the book and the technology are very dated at this point “ohmigod how many more times is this book going to say ‘electronic mail'”it’s often beneficial to understand the foundations upon which modern technology is based.

For the science fiction novel by C. If you like books and love to build cool products, we may be looking for you.