There is a difference between having access to information and having the savvy it takes to interpret it -- Clifford Stoll
In the beginning (back in the '80s), the global network was based on trust. It was a time of harmony, where innovation and discoveries happily coexisted. No one wanted to be labeled as a dictator by not allowing free access to their systems.
However, as always happens, someone realized the power of information and was corrupted by it. The good intentions of knowledge acquisition by the hacker community, enlightened beings admired by many, were gradually considered as dangerous.
Cliff Stoll, author of The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage, was an astronomer dedicated to the design of telescopic optics at the University of Berkeley. His computer knowledge earned him a position as an assistant systems administrator at the computer center of the Lawrence Berkeley Laboratory when he could no longer continue his work in astronomy in 1986.
After auditing the use of the lab computers, which were leased to the students, he found a difference of 75 cents. He began the challenge of finding the user who had not paid for his time of use. This challenge led him on a journey to come face to face with the intruder, whose objective was not to compromise the university system, but instead to compromise the most important government agencies in the country.
This is a classic story of spies during the Cold War, which actually did happen. It's a walk through the past that helps us to understand many of today's system security concerns.
In a more personal way, as a systems administrator and proud tech geek, I love this book about the dawn of Unix. It's a story about the first generation of hackers, giving us a vision of the birth of the operating system, its protocols, and the first significant events at the Internet level. It's great to read first hand how the scourge of the Morris worm was experienced. Cliff Stoll is a superstar of the development of the use of Unix and a great storyteller. I consider this book essential for understanding and raising awareness of the importance of the security of our managed systems and how to creatively use the tools that we have nearby.
Cliff Stoll's book is essential reading for today's sysadmin.
Plus: Other recommended resources
- Clifford Stoll (May 1988). "Stalking the wily Hacker". Association for Computing Machinery (ACM)
- Clifford Stoll: Clifford Stoll on Everything – 18 minutes with an Agile mind. TED conference February 2006
- What's the answer to the number sequence given by Robert Morris of the NSA?
I hope you like it. Stay home and enjoy some good content.
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
326 pages.
4.23 stars on Goodreads.
Available where books are sold.
[ Want to test your sysadmin skills? Take a skills assessment today. ]
About the author
Browse by channel
Automation
The latest on IT automation for tech, teams, and environments
Artificial intelligence
Updates on the platforms that free customers to run AI workloads anywhere
Open hybrid cloud
Explore how we build a more flexible future with hybrid cloud
Security
The latest on how we reduce risks across environments and technologies
Edge computing
Updates on the platforms that simplify operations at the edge
Infrastructure
The latest on the world’s leading enterprise Linux platform
Applications
Inside our solutions to the toughest application challenges
Original shows
Entertaining stories from the makers and leaders in enterprise tech
Products
- Red Hat Enterprise Linux
- Red Hat OpenShift
- Red Hat Ansible Automation Platform
- Cloud services
- See all products
Tools
- Training and certification
- My account
- Customer support
- Developer resources
- Find a partner
- Red Hat Ecosystem Catalog
- Red Hat value calculator
- Documentation
Try, buy, & sell
Communicate
About Red Hat
We’re the world’s leading provider of enterprise open source solutions—including Linux, cloud, container, and Kubernetes. We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.
Select a language
Red Hat legal and privacy links
- About Red Hat
- Jobs
- Events
- Locations
- Contact Red Hat
- Red Hat Blog
- Diversity, equity, and inclusion
- Cool Stuff Store
- Red Hat Summit