THE HACKER'S HANDBOOK

local echo, set parity bits, show non-visible control codes etc. In a typical hack, you may have only vague information about the . target computer and much of the 'fun' to be obtained from the . sport of hacking is seeing how quickly you can work out what the . remote computer wants to 'see' - and how to make your machine . respond. ................
................