This is a table of type trigram and their frequencies. Use it to search & browse the list to learn more about your study carrel.
trigram | frequency |
---|---|
one of the | 384 |
it was a | 241 |
a lot of | 222 |
out of the | 208 |
you want to | 197 |
be able to | 183 |
the united states | 180 |
a couple of | 169 |
the secret service | 165 |
the end of | 155 |
yes yes yes | 154 |
to be a | 147 |
a number of | 145 |
k k k | 141 |
some of the | 141 |
in the world | 135 |
the use of | 135 |
was going to | 134 |
as well as | 132 |
the rest of | 128 |
there was no | 127 |
on the internet | 120 |
part of the | 118 |
end of the | 117 |
there was a | 117 |
a list of | 116 |
the free software | 111 |
the first amendment | 111 |
he had been | 109 |
the first time | 107 |
in order to | 107 |
it would be | 105 |
that he had | 102 |
going to be | 101 |
it was the | 100 |
in front of | 99 |
all of the | 99 |
the fact that | 99 |
and hit enter | 98 |
of the internet | 95 |
most of the | 94 |
you have to | 94 |
of the computer | 93 |
around the world | 92 |
to the internet | 92 |
access to the | 92 |
the university of | 90 |
at the same | 89 |
a copy of | 88 |
that he was | 88 |
rest of the | 87 |
there is no | 87 |
the same time | 87 |
new york city | 86 |
if you want | 86 |
back to the | 85 |
what do you | 84 |
for the first | 83 |
he wanted to | 82 |
at the time | 81 |
to do with | 81 |
on the other | 80 |
but it was | 79 |
on the net | 78 |
many of the | 76 |
at the end | 75 |
the new york | 75 |
the kind of | 74 |
the back of | 74 |
to make a | 73 |
the number of | 72 |
the name of | 72 |
in the case | 72 |
as long as | 71 |
legion of doom | 71 |
a bunch of | 70 |
in new york | 70 |
for a moment | 69 |
there is a | 69 |
copy of the | 68 |
to talk to | 68 |
in the first | 68 |
i want to | 67 |
this is a | 67 |
that it was | 66 |
in this case | 66 |
the case of | 65 |
the e document | 65 |
a variety of | 64 |
all the time | 63 |
a series of | 63 |
the right to | 62 |
to use the | 62 |
members of the | 62 |
it is not | 62 |
library of congress | 62 |
to have a | 62 |
a way to | 62 |
the ai lab | 61 |
he had to | 61 |
it had been | 61 |
the contents of | 60 |
the gnu project | 60 |
side of the | 60 |
the cost of | 60 |
the ability to | 60 |
to get a | 59 |
more than a | 58 |
seemed to be | 58 |
as soon as | 58 |
i wanted to | 58 |
he was a | 58 |
a set of | 58 |
because of the | 57 |
of the first | 57 |
that it is | 57 |
by the time | 56 |
the middle of | 56 |
have to be | 56 |
would have to | 55 |
as far as | 55 |
what the hell | 55 |
had been a | 54 |
such as the | 54 |
for a few | 54 |
the people who | 54 |
in the middle | 54 |
to deal with | 54 |
m k y | 53 |
to be the | 53 |
the electronic frontier | 53 |
would have been | 53 |
was one of | 53 |
of the system | 53 |
harmful to minors | 52 |
there are a | 52 |
shook his head | 52 |
the ssc mac | 52 |
it was not | 52 |
to the public | 52 |
to make sure | 52 |
a group of | 52 |
i have to | 52 |
member of the | 51 |
to get the | 51 |
this was the | 51 |
and it was | 51 |
all over the | 51 |
on the phone | 50 |
that was the | 50 |
a matter of | 50 |
the world of | 50 |
do you know | 50 |
in addition to | 49 |
in the underground | 49 |
had to be | 49 |
we need to | 49 |
to find out | 49 |
electronic frontier foundation | 49 |
in the computer | 48 |
it is a | 48 |
use of the | 48 |
a great deal | 47 |
the wank worm | 47 |
the legion of | 47 |
the other side | 47 |
of the united | 47 |
a message to | 47 |
version of the | 47 |
to figure out | 46 |
he had a | 46 |
name of the | 46 |
of thousands of | 46 |
away from the | 46 |
at the university | 45 |
what kind of | 45 |
as a result | 45 |
the first place | 45 |
can be used | 45 |
one of them | 45 |
as much as | 45 |
with respect to | 45 |
free software foundation | 45 |
would like to | 44 |
in the united | 44 |
he was going | 44 |
is not a | 44 |
it was an | 44 |
of the world | 44 |
connected to the | 43 |
in terms of | 43 |
to do this | 43 |
this is the | 43 |
a long time | 43 |
what to do | 43 |
the size of | 43 |
out of his | 43 |
the other hand | 43 |
to make the | 43 |
the hacker crackdown | 42 |
in a few | 42 |
any of the | 42 |
you know what | 42 |
of the new | 41 |
much of the | 41 |
one of these | 41 |
to see if | 41 |
the digital underground | 41 |
according to the | 41 |
the computer underground | 41 |
of the most | 41 |
when he was | 41 |
of this license | 41 |
of the public | 41 |
is one of | 41 |
at a time | 41 |
the white house | 41 |
to the computer | 41 |
it was like | 41 |
the issue of | 41 |
to be able | 41 |
but it is | 40 |
a few days | 40 |
all the way | 40 |
pad and gandalf | 40 |
was the first | 40 |
of the hacker | 40 |
i have a | 40 |
more and more | 40 |
some of them | 40 |
do you want | 40 |
the phone company | 40 |
in the same | 40 |
to create a | 40 |
a few minutes | 39 |
that would be | 39 |
over to the | 39 |
come up with | 39 |
as if he | 39 |
a piece of | 39 |
front of the | 39 |
i had a | 39 |
to each other | 39 |
log on as | 39 |
for a while | 39 |
it was all | 39 |
your host system | 39 |
i had to | 39 |
be used to | 39 |
people in the | 38 |
not going to | 38 |
what is it | 38 |
i need to | 38 |
to do it | 38 |
to go to | 38 |
to look at | 38 |
of the document | 38 |
want to get | 38 |
said with a | 38 |
in the s | 38 |
to get to | 38 |
and in the | 38 |
up to the | 37 |
in the room | 37 |
it can be | 37 |
to break into | 37 |
was in the | 37 |
down on the | 37 |
were going to | 37 |
in the public | 37 |
national security agency | 37 |
it was time | 37 |
the next day | 37 |
by the end | 37 |
for more information | 37 |
know how to | 36 |
of the gnu | 36 |
in the future | 36 |
the edge of | 36 |
the department of | 36 |
each of the | 36 |
this was a | 36 |
in the morning | 36 |
the state of | 36 |
he or she | 36 |
a little more | 36 |
the process of | 36 |
the development of | 36 |
the supreme court | 36 |
a few seconds | 36 |
to make it | 36 |
the idea of | 36 |
it to the | 35 |
the internet is | 35 |
the top of | 35 |
it will be | 35 |
have access to | 35 |
across the country | 35 |
in the past | 35 |
all sorts of | 35 |
out in the | 35 |
a few years | 35 |
was no way | 35 |
a result of | 35 |
a few of | 35 |
look at the | 35 |
the library of | 35 |
the other end | 35 |
the need for | 35 |
of the work | 35 |
but he was | 35 |
as part of | 35 |
would be a | 35 |
on the table | 35 |
something like this | 34 |
a few months | 34 |
that can be | 34 |
would not be | 34 |
some kind of | 34 |
that they were | 34 |
up on the | 34 |
if you are | 34 |
a chance to | 34 |
no no no | 34 |
in the process | 34 |
the phone system | 34 |
of the information | 34 |
the nature of | 34 |
to be in | 34 |
i think you | 34 |
picked up the | 34 |
back of the | 34 |
and he was | 34 |
but he had | 34 |
more than one | 34 |
one of those | 34 |
in and out | 34 |
on how to | 34 |
we have a | 33 |
access to a | 33 |
of the network | 33 |
a web site | 33 |
that there was | 33 |
he tried to | 33 |
down to the | 33 |
if he was | 33 |
on the floor | 33 |
some sort of | 33 |
you know that | 33 |
want to see | 33 |
just a few | 33 |
he was not | 33 |
on the back | 33 |
in san francisco | 33 |
web pages that | 33 |
to keep the | 33 |
of the original | 33 |
send a message | 33 |
at least one | 33 |
of the people | 33 |
of the time | 33 |
and there was | 33 |
in which the | 33 |
in the early | 33 |
and out of | 32 |
on the screen | 32 |
in the us | 32 |
york city times | 32 |
in the back | 32 |
on the run | 32 |
how to use | 32 |
get out of | 32 |
it was just | 32 |
supposed to be | 32 |
looked at the | 32 |
based on the | 32 |
want to be | 32 |
of the instruction | 32 |
was the only | 32 |
the national security | 32 |
when i was | 32 |
of the day | 32 |
of the other | 32 |
was able to | 32 |
was not a | 32 |
back and forth | 32 |
only a few | 32 |
you need to | 31 |
in one of | 31 |
bill of rights | 31 |
had no idea | 31 |
on the system | 31 |
that had been | 31 |
have to do | 31 |
to connect to | 31 |
a public library | 31 |
that she was | 31 |
for a long | 31 |
great deal of | 31 |
was on the | 31 |
do you mean | 31 |
for him to | 31 |
up with a | 31 |
of the electronic | 31 |
he would be | 30 |
in the pub | 30 |
the sound of | 30 |
going to have | 30 |
the time of | 30 |
on the network | 30 |
the beginning of | 30 |
been able to | 30 |
the late s | 30 |
no matter what | 30 |
to try to | 30 |
up in the | 30 |
on the same | 30 |
university of california | 30 |
by scott mason | 30 |
that they had | 30 |
information about the | 30 |
how do you | 30 |
the hands of | 30 |
in public libraries | 30 |
he would have | 30 |
of free software | 30 |
visual depictions that | 30 |
of the room | 30 |
so that it | 29 |
it would have | 29 |
depictions that are | 29 |
nature of the | 29 |
back in the | 29 |
how to get | 29 |
of the way | 29 |
a pair of | 29 |
it came to | 29 |
going to do | 29 |
you have a | 29 |
want to know | 29 |
in his own | 29 |
one or more | 29 |
the front door | 29 |
in a way | 29 |
the list of | 29 |
they had been | 29 |
if you have | 29 |
when it came | 29 |
of all the | 29 |
and he had | 29 |
need to know | 29 |
down at the | 29 |
the way to | 29 |
of people who | 29 |
was trying to | 29 |
is in the | 29 |
that i was | 29 |
of the web | 29 |
contents of the | 29 |
the bottom of | 29 |
new york times | 29 |
large number of | 29 |
to think about | 29 |
wanted to know | 29 |
of web pages | 29 |
i was going | 28 |
substantial amount of | 28 |
and the other | 28 |
to the next | 28 |
the amount of | 28 |
over and over | 28 |
the course of | 28 |
to get into | 28 |
of the worm | 28 |
it on the | 28 |
of the e | 28 |
he had never | 28 |
was supposed to | 28 |
at the other | 28 |
was time to | 28 |
to the point | 28 |
message to the | 28 |
on the way | 28 |
at this point | 28 |
a collection of | 28 |
the federal government | 28 |
of the phone | 28 |
the atlanta three | 28 |
part of a | 28 |
an attempt to | 28 |
portion of the | 28 |
the purpose of | 28 |
copies of the | 28 |
it does not | 28 |
middle of the | 28 |
the file you | 28 |
it is the | 28 |
if he had | 28 |
out of a | 28 |
this kind of | 28 |
that kind of | 28 |
will not be | 28 |
has to be | 27 |
the worm was | 27 |
would be the | 27 |
that they are | 27 |
do you have | 27 |
in the country | 27 |
on the computer | 27 |
into the phone | 27 |
it in the | 27 |
the effects of | 27 |
constitutionally protected speech | 27 |
in the library | 27 |
and for the | 27 |
of internet access | 27 |
no way to | 27 |
the public library | 27 |
i could see | 27 |
up with the | 27 |
of the s | 27 |
it could be | 27 |
there was something | 27 |
the terms of | 27 |
want you to | 27 |
and then the | 27 |
in the air | 27 |
the most important | 27 |
you can use | 27 |
the internet and | 27 |
is dedicated to | 27 |
in some cases | 27 |
known as the | 27 |
out how to | 27 |
based restrictions on | 27 |
of his own | 27 |
he was in | 27 |
on the web | 27 |
if it is | 27 |
most of them | 27 |
in the last | 27 |
all at once | 27 |
of the free | 27 |
we have to | 26 |
that he would | 26 |
you can do | 26 |
in such a | 26 |
make sure that | 26 |
do you think | 26 |
for the most | 26 |
the story of | 26 |
if you were | 26 |
two or three | 26 |
and a half | 26 |
a substantial amount | 26 |
go to the | 26 |
at least a | 26 |
he looked at | 26 |
of his life | 26 |
of the american | 26 |
bite bite bite | 26 |
of the underground | 26 |
the last time | 26 |
a bit of | 26 |
going to get | 26 |
the early s | 26 |
set up a | 26 |
that it would | 26 |
was a good | 26 |
file you want | 26 |
none of the | 26 |
and it is | 26 |
top of the | 26 |
a member of | 26 |
want to do | 26 |
the public domain | 26 |
what he was | 26 |
what i mean | 26 |
could not be | 26 |
the same thing | 25 |
a way that | 25 |
was that the | 25 |
you can get | 25 |
i think i | 25 |
all of this | 25 |
to the other | 25 |
this is not | 25 |
of web sites | 25 |
the only way | 25 |
added to the | 25 |
mail message to | 25 |
knew how to | 25 |
must have been | 25 |
the same way | 25 |
the thought of | 25 |
some of these | 25 |
to say that | 25 |
to use it | 25 |
on one of | 25 |
up at the | 25 |
what are you | 25 |
secret service agents | 25 |
a lot more | 25 |
the basis of | 25 |
there are no | 25 |
of one of | 25 |
codified at u | 25 |
couple of days | 25 |
to the system | 25 |
was a little | 25 |
that is not | 25 |
a part of | 25 |
are going to | 25 |
on top of | 25 |
what you want | 25 |
to see the | 25 |
next to the | 25 |
a good idea | 24 |
the creation of | 24 |
the role of | 24 |
web sites that | 24 |
so that the | 24 |
the stock exchange | 24 |
of the program | 24 |
to do that | 24 |
i have been | 24 |
they do not | 24 |
to get it | 24 |
deal with the | 24 |
of the secret | 24 |
it would take | 24 |
which had been | 24 |
y operation code | 24 |
at the moment | 24 |
managed to get | 24 |
you had to | 24 |
view of the | 24 |
the general public | 24 |
he knew that | 24 |
to find the | 24 |
a sort of | 24 |
do not have | 24 |
might have been | 24 |
they wanted to | 24 |
take care of | 24 |
the police had | 24 |
half of the | 24 |
not to be | 24 |
the importance of | 24 |
a kind of | 24 |
we do not | 24 |
of a computer | 24 |
of the same | 24 |
as he was | 24 |
for a second | 24 |
computers in the | 24 |
i am not | 24 |
the most part | 24 |
you get a | 24 |
out the door | 23 |
to the net | 23 |
information on the | 23 |
tens of thousands | 23 |
to the world | 23 |
internal quotation marks | 23 |
and looked at | 23 |
wanted to make | 23 |
that are obscene | 23 |
i would like | 23 |
the content of | 23 |
had to do | 23 |
of the book | 23 |
and so on | 23 |
a look at | 23 |
to have to | 23 |
the front of | 23 |
and the next | 23 |
of the national | 23 |
the history of | 23 |
gave me a | 23 |
several of the | 23 |
that was a | 23 |
to get out | 23 |
over the last | 23 |
hardware and software | 23 |
a way of | 23 |
a large number | 23 |
i tried to | 23 |
and i have | 23 |
the hell is | 23 |
for a couple | 23 |
it was his | 23 |
it made me | 23 |
of the digital | 23 |
it is also | 23 |
said as he | 23 |
the whole thing | 23 |
there were no | 23 |
there would be | 23 |
is scott mason | 23 |
other end of | 23 |
have been a | 23 |
have to go | 23 |
he had no | 23 |
as it was | 23 |
this is scott | 23 |
for the next | 23 |
first amendment rights | 23 |
lot of people | 22 |
in the meantime | 22 |
the operating system | 22 |
and how to | 22 |
as opposed to | 22 |
to talk about | 22 |
was just a | 22 |
free software movement | 22 |
on the basis | 22 |
if they were | 22 |
in the name | 22 |
to take the | 22 |
to see what | 22 |
the results of | 22 |
was not the | 22 |
in the end | 22 |
the freedom to | 22 |
the bill of | 22 |
when it comes | 22 |
to the police | 22 |
chapter is dedicated | 22 |
the only one | 22 |
first time in | 22 |
i told you | 22 |
be used for | 22 |
the need to | 22 |
for all the | 22 |
is going to | 22 |
an effort to | 22 |
many of them | 22 |
this chapter is | 22 |
the last few | 22 |
over the past | 22 |
to run the | 22 |
i think that | 22 |
to do something | 22 |
it was as | 22 |
is not the | 22 |
control of the | 22 |
to take a | 22 |
i was a | 22 |
the grateful dead | 22 |
to build a | 22 |
to strict scrutiny | 22 |
the hacker ethic | 22 |
on his own | 22 |
in this book | 22 |
look at it | 22 |
in the face | 22 |
of the message | 22 |
but there was | 22 |
again and again | 22 |
that there are | 22 |
was going on | 22 |
in many cases | 22 |
other side of | 22 |
get to the | 22 |
x y operation | 22 |
i thought you | 21 |
parts of the | 21 |
to one of | 21 |
i could have | 21 |
the computer to | 21 |
might be a | 21 |
on the line | 21 |
whether or not | 21 |
it might be | 21 |
in the next | 21 |
the age of | 21 |
the realm of | 21 |
they had a | 21 |
no matter how | 21 |
it was too | 21 |
the program counter | 21 |
i do not | 21 |
for you to | 21 |
traditional public fora | 21 |
there are several | 21 |
what about the | 21 |
but that was | 21 |
fact that the | 21 |
chapter this chapter | 21 |
well as the | 21 |
the notion of | 21 |
his or her | 21 |
your home directory | 21 |
i knew that | 21 |
you might be | 21 |
if there is | 21 |
in the house | 21 |
had not been | 21 |
the head of | 21 |
and i had | 21 |
know what to | 21 |
to ensure that | 21 |
few of the | 21 |
him in the | 21 |
what they were | 21 |
if you do | 21 |
that have been | 21 |
that you have | 21 |
way to get | 21 |
at each other | 21 |
chicago task force | 21 |
technology protection measure | 21 |
to have the | 21 |
there was an | 21 |
to know what | 21 |
that will be | 21 |
more or less | 21 |
use of a | 21 |
steve jackson games | 21 |
of the house | 21 |
will have to | 21 |
may not be | 21 |
able to get | 21 |
guide to the | 21 |
due to the | 21 |
and the first | 21 |
on a computer | 21 |
he was the | 21 |
had been in | 21 |
was about to | 21 |
from the beginning | 20 |
would be able | 20 |
and that the | 20 |
you do not | 20 |
it may be | 20 |
so he could | 20 |
the same as | 20 |
it must be | 20 |
the art of | 20 |
went to the | 20 |
they can be | 20 |
and a few | 20 |
all of which | 20 |
at the bottom | 20 |
it as a | 20 |
a sense of | 20 |
so long as | 20 |
take advantage of | 20 |
it was only | 20 |
she had been | 20 |
is responsible for | 20 |
when you connect | 20 |
had to get | 20 |
of the text | 20 |
as a whole | 20 |
operation code the | 20 |
in other words | 20 |
that no one | 20 |
the main menu | 20 |
in the u | 20 |
provision of internet | 20 |
i felt like | 20 |
is that the | 20 |
it should be | 20 |
that there is | 20 |
in favor of | 20 |
of a new | 20 |
of them were | 20 |
united states of | 20 |
with the same | 20 |
a few weeks | 20 |
via anonymous ftp | 20 |
not to mention | 20 |
all of it | 20 |
filtering software companies | 20 |
quotation marks and | 20 |
subject to strict | 20 |
on to the | 20 |
the side of | 20 |
if you can | 20 |
closed his eyes | 20 |
came up with | 20 |
the opportunity to | 20 |
you will be | 20 |
in response to | 20 |
i had no | 20 |
figure out how | 20 |
that you are | 20 |
had never been | 20 |
back into the | 20 |
was to be | 20 |
he had not | 20 |
in to the | 20 |
up the phone | 20 |
on the contrary | 20 |
on the list | 20 |
with each other | 20 |
and i was | 20 |
of the accumulator | 20 |
a mailing list | 20 |
speech on the | 19 |
was like a | 19 |
the price of | 19 |
the value of | 19 |
i was in | 19 |
the president said | 19 |
sexually explicit content | 19 |
a few hours | 19 |
she wanted to | 19 |
in on the | 19 |
the dissemination of | 19 |
corner of the | 19 |
it has been | 19 |
fraud and abuse | 19 |
should have been | 19 |
even if the | 19 |
need to be | 19 |
to do the | 19 |
a few more | 19 |
but if you | 19 |
no more than | 19 |
and citation omitted | 19 |
had become a | 19 |
there are two | 19 |
around the country | 19 |
looked at me | 19 |
at the front | 19 |
states of america | 19 |
for information on | 19 |
let out a | 19 |
in his mind | 19 |
on the subject | 19 |
to find a | 19 |
it is possible | 19 |
when you get | 19 |
he could not | 19 |
we had a | 19 |
computer fraud and | 19 |
on the edge | 19 |
was in a | 19 |
this sort of | 19 |
advantage of the | 19 |
and that was | 19 |
of this book | 19 |
interest in the | 19 |
likely to be | 19 |
with all the | 19 |
of the software | 19 |
will be able | 19 |
over the years | 19 |
access to speech | 19 |
in the hacker | 19 |
public libraries to | 19 |
a handful of | 19 |
arrived at the | 19 |
the power of | 19 |
you and your | 19 |
and they were | 19 |
in the way | 19 |
one of his | 19 |
go back to | 19 |
the time the | 19 |
so that they | 19 |
the private sector | 19 |
want me to | 19 |
with a few | 19 |
to do anything | 19 |
to communicate with | 19 |
was out of | 19 |
along with the | 19 |
i want you | 19 |
on the front | 19 |
you have the | 19 |
returned to the | 19 |
looked like a | 19 |
to see you | 19 |
to tell me | 19 |
to speak to | 19 |
of the wank | 19 |
president of the | 19 |
trying to get | 19 |
findings of fact | 19 |
to work on | 19 |
i am sure | 19 |
under this license | 19 |
to the new | 19 |
there was the | 19 |
or at least | 19 |
what was going | 19 |
it comes to | 19 |
state of the | 19 |
considered to be | 19 |
narrowly tailored to | 19 |
development of the | 18 |
if it was | 18 |
up and down | 18 |
what is the | 18 |
is the most | 18 |
used by the | 18 |
at the main | 18 |
at that time | 18 |
a little bit | 18 |
off to the | 18 |
a moment later | 18 |
to comply with | 18 |
you and i | 18 |
seem to be | 18 |
the web site | 18 |
used to be | 18 |
in the eye | 18 |
in his chair | 18 |
they were in | 18 |
less restrictive alternatives | 18 |
the system is | 18 |
the quality of | 18 |
he had seen | 18 |
board of directors | 18 |
had come to | 18 |
seemed to have | 18 |
over the internet | 18 |
she was a | 18 |
that he could | 18 |
it was also | 18 |
they have a | 18 |
against the wall | 18 |
head of the | 18 |
to know about | 18 |
as if the | 18 |
it was in | 18 |
figure out what | 18 |
around the room | 18 |
yes yes no | 18 |
the first two | 18 |
to the same | 18 |
to do was | 18 |
can also be | 18 |
how to do | 18 |
that they can | 18 |
could be used | 18 |
give me a | 18 |
people who are | 18 |
of the legion | 18 |
he began to | 18 |
research and education | 18 |
world war ii | 18 |
when it was | 18 |
was only a | 18 |
the first thing | 18 |
in the course | 18 |
point of view | 18 |
know what i | 18 |
of constitutionally protected | 18 |
the source code | 18 |
to be used | 18 |
the instruction word | 18 |
over the next | 18 |
out to the | 18 |
there was nothing | 18 |
the type of | 18 |
the span team | 18 |
it looks like | 18 |
based on a | 18 |
give you a | 18 |
that could be | 18 |
and then i | 18 |
that the government | 18 |
to new york | 18 |
he did not | 18 |
your system administrator | 18 |
the part of | 18 |
wanted to be | 18 |
available to the | 18 |
in the humanities | 18 |
back on the | 18 |
the room and | 18 |
this is where | 18 |
marks and citation | 18 |
of the police | 18 |
he decided to | 18 |
he was being | 18 |
people on the | 18 |
internet access in | 17 |
computer in the | 17 |
the two hackers | 17 |
it was one | 17 |
there will be | 17 |
number of the | 17 |
it was to | 17 |
to the first | 17 |
been on the | 17 |
he had the | 17 |
out for a | 17 |
prime suspect and | 17 |
that you can | 17 |
to the original | 17 |
sent to the | 17 |
and to the | 17 |
you are a | 17 |
each of these | 17 |
are a number | 17 |
of the line | 17 |
the joey plus | 17 |
being able to | 17 |
by the computer | 17 |
are in the | 17 |
they had to | 17 |
into the computer | 17 |
of the best | 17 |
he needed to | 17 |
he told me | 17 |
the last of | 17 |
to me that | 17 |
i have no | 17 |
of federal funds | 17 |
in most cases | 17 |
he was on | 17 |
we were all | 17 |
the us secret | 17 |
looking at the | 17 |
interest in preventing | 17 |
result of the | 17 |
he thought of | 17 |
which you can | 17 |
of them had | 17 |
was also a | 17 |
of the net | 17 |
the form of | 17 |
there were a | 17 |
i wish i | 17 |
to the end | 17 |
as it is | 17 |
of the press | 17 |
of the joey | 17 |
is that it | 17 |
no yes yes | 17 |
he told the | 17 |
because it was | 17 |
on a single | 17 |
are used to | 17 |
send an e | 17 |
after a few | 17 |
them to the | 17 |
the best way | 17 |
the next instruction | 17 |
he shook his | 17 |
the open source | 17 |
in the city | 17 |
he felt a | 17 |
that there were | 17 |
up and running | 17 |
in the directory | 17 |
the subject of | 17 |
not in the | 17 |
to be on | 17 |
the living room | 17 |
somewhere in the | 17 |
that this was | 17 |
no one else | 17 |
they will be | 17 |
to be an | 17 |
the level of | 17 |
this book is | 17 |
out of it | 17 |
at the top | 17 |
responsible for the | 17 |
light of the | 17 |
the hackers had | 17 |
a call from | 17 |
any member of | 17 |
him on the | 17 |
two of the | 17 |
everyone in the | 17 |
where he had | 17 |
the concept of | 17 |
what was the | 17 |
a few moments | 17 |
but this was | 17 |
to the extent | 17 |
in charge of | 17 |
has been a | 17 |
as you can | 17 |
front of him | 17 |
what he had | 17 |
she would have | 17 |
learned how to | 17 |
wide range of | 17 |
in the form | 17 |
but in the | 17 |
the next few | 17 |
think about it | 17 |
in the background | 17 |
all kinds of | 17 |
on behalf of | 17 |
over the world | 17 |
talk to you | 17 |
take it back | 17 |
of the file | 17 |
work on the | 17 |
shook her head | 17 |
thank you for | 17 |
been in the | 17 |
in the system | 17 |
went back to | 17 |
to believe that | 17 |
the ability of | 16 |
that we have | 16 |
or not to | 16 |
more than just | 16 |
want to keep | 16 |
not have to | 16 |
a moment to | 16 |
do with the | 16 |
page of the | 16 |
and no one | 16 |
of the project | 16 |
i think the | 16 |
the problem of | 16 |
to change the | 16 |
of the city | 16 |
down the street | 16 |
to tell you | 16 |
the board of | 16 |
back in his | 16 |
they want to | 16 |
a program that | 16 |
might want to | 16 |
to do so | 16 |
in the other | 16 |
to run a | 16 |
size of a | 16 |
attention to the | 16 |
the ones who | 16 |
how did you | 16 |
even if it | 16 |
similar to the | 16 |
harajuku fun madness | 16 |
would be no | 16 |
to write a | 16 |
so it was | 16 |
for an instant | 16 |
a month or | 16 |
because it is | 16 |
of interest to | 16 |
sides of the | 16 |
to a computer | 16 |
more than the | 16 |
stared at the | 16 |
seems to be | 16 |
what it was | 16 |
a picture of | 16 |
the man who | 16 |
happened to be | 16 |
a computer system | 16 |
the is hackers | 16 |
of the ai | 16 |
with internet access | 16 |
all in the | 16 |
it was more | 16 |
in an effort | 16 |
pass pass pass | 16 |
the joey ii | 16 |
what i was | 16 |
where n is | 16 |
up in a | 16 |
more information on | 16 |
will be a | 16 |
law enforcement agencies | 16 |
it was going | 16 |
a program called | 16 |
of scholarly communication | 16 |
to have been | 16 |
stallman says he | 16 |
up by the | 16 |
they were all | 16 |
less than a | 16 |
to send a | 16 |
it seems that | 16 |
who you are | 16 |
the remainder of | 16 |
goes to the | 16 |
looking for a | 16 |
one or two | 16 |
within a few | 16 |
if he were | 16 |
and all the | 16 |
the future of | 16 |
end of a | 16 |
appeared on the | 16 |
most of his | 16 |
chairman of the | 16 |
the completion of | 16 |
all the same | 16 |
as he had | 16 |
many of these | 16 |
how to make | 16 |
them in the | 16 |
of computer crime | 16 |
of millions of | 16 |
on the bed | 16 |
yes no yes | 16 |
she had to | 16 |
get into the | 16 |
and if you | 16 |
in many ways | 16 |
little more than | 16 |
did you get | 16 |
of the u | 16 |
us secret service | 16 |
that she had | 16 |
the computer screen | 16 |
involved in the | 16 |
could have been | 16 |
might as well | 16 |
they are not | 16 |
a wide range | 16 |
to understand the | 16 |
in the late | 16 |
to to to | 16 |
his computer and | 16 |
wall street journal | 16 |
as if to | 16 |
easy to use | 16 |
way to the | 16 |
but they were | 16 |
the australian hackers | 16 |
none of them | 16 |
the sort of | 16 |
the bay bridge | 16 |
available on the | 16 |
in search of | 16 |
we can do | 16 |
by means of | 16 |
of the machine | 15 |
all of its | 15 |
the way it | 15 |
states secret service | 15 |
to my feet | 15 |
was the same | 15 |
he turned to | 15 |
in the front | 15 |
to go back | 15 |
wide variety of | 15 |
i hope you | 15 |
the right of | 15 |
to pay for | 15 |
on your screen | 15 |
on the road | 15 |
to give up | 15 |
general public license | 15 |
for the sake | 15 |
the question of | 15 |
of the material | 15 |
no reason to | 15 |
felt like a | 15 |
opened the door | 15 |
by the way | 15 |
of the telephone | 15 |
on the well | 15 |
as good as | 15 |
if you will | 15 |
i got a | 15 |
you want me | 15 |
out the window | 15 |
picture of the | 15 |
across the network | 15 |
what it is | 15 |
he was sure | 15 |
to use a | 15 |
nothing to do | 15 |
it was still | 15 |
i can do | 15 |
university of texas | 15 |
him as a | 15 |
analysis of the | 15 |
could see the | 15 |
gave him a | 15 |
what had happened | 15 |
in relation to | 15 |
him to the | 15 |
time of the | 15 |
access to all | 15 |
all the people | 15 |
thought it was | 15 |
he was doing | 15 |
the context of | 15 |
the outside world | 15 |
there may be | 15 |
said he was | 15 |
the point of | 15 |
the way he | 15 |
do the same | 15 |
it for the | 15 |
out of my | 15 |
get a list | 15 |
the sake of | 15 |
use of electronic | 15 |
out to be | 15 |
on your host | 15 |
have to say | 15 |
hundreds of thousands | 15 |
what he wanted | 15 |
may not have | 15 |
amount of time | 15 |
had a lot | 15 |
years after the | 15 |
the face of | 15 |
kind of thing | 15 |
going to take | 15 |
a man who | 15 |
for the last | 15 |
the one that | 15 |
of the data | 15 |
department of defense | 15 |
or any other | 15 |
off the record | 15 |
you get the | 15 |
be in the | 15 |
that they have | 15 |
to go on | 15 |
i would have | 15 |
of the more | 15 |
to take advantage | 15 |
to call the | 15 |
there was only | 15 |
back to his | 15 |
at the ai | 15 |
to know that | 15 |
how could he | 15 |
an interest in | 15 |
terms of this | 15 |
for me to | 15 |
for so long | 15 |
and tried to | 15 |
sitting in the | 15 |
octal digits through | 15 |
front of a | 15 |
the hacker community | 15 |
had tried to | 15 |
his hands on | 15 |
is designed to | 15 |
that is the | 15 |
restrictions on speech | 15 |
it possible to | 15 |
that sort of | 15 |
to return to | 15 |
a glass of | 15 |
for all of | 15 |
those who would | 15 |
the eyes of | 15 |
of the hackers | 15 |
of new york | 15 |
in exchange for | 15 |
to do is | 15 |
the way they | 15 |
under the terms | 15 |
not long after | 15 |
along with a | 15 |
of the library | 15 |
into the room | 15 |
and i will | 15 |
out of their | 15 |
more of the | 15 |
can be found | 15 |
world of the | 15 |
the two of | 15 |
for the past | 15 |
violate the first | 15 |
the prospect of | 15 |
that it had | 15 |
i put my | 15 |
of the two | 15 |
used in the | 15 |
said that the | 15 |
the other two | 15 |
of their own | 15 |
will be the | 15 |
may have been | 15 |
familiar with the | 15 |
which is a | 15 |
all of them | 15 |
to ask you | 15 |
about the same | 15 |
to participate in | 15 |
only way to | 15 |
the center of | 15 |
as i can | 15 |
united states secret | 15 |
the operation of | 15 |
anywhere in the | 15 |
in the original | 15 |
into the system | 15 |
in the subject | 15 |
it that way | 15 |
see something like | 15 |
the costs of | 15 |
the room was | 15 |
the best of | 15 |
when i got | 15 |
and on the | 15 |
in the text | 15 |
in his hands | 15 |
national science foundation | 15 |
out of your | 15 |
that lets you | 15 |
much the same | 15 |
bits of the | 15 |
bottom of the | 15 |
millions of dollars | 15 |
looked down at | 15 |
what would happen | 15 |
more about the | 15 |
none none none | 15 |
of the entire | 15 |
you to the | 14 |
talking about the | 14 |
the real world | 14 |
black and white | 14 |
and some of | 14 |
of the board | 14 |
have to tell | 14 |
in the digital | 14 |
the computer system | 14 |
the loss of | 14 |
know about the | 14 |
you can find | 14 |
sat on the | 14 |
out of here | 14 |
when he had | 14 |
included in the | 14 |
department of homeland | 14 |
the computer is | 14 |
the executive staff | 14 |
was talking about | 14 |
the time he | 14 |
he had ever | 14 |
to look for | 14 |
world wide web | 14 |
to read the | 14 |
where you can | 14 |
of the computers | 14 |
to be done | 14 |
had broken into | 14 |
going to tell | 14 |
up from the | 14 |
a wide variety | 14 |
why do you | 14 |
going to go | 14 |
he could see | 14 |
up from his | 14 |
if they are | 14 |
the person who | 14 |
to get on | 14 |
it into a | 14 |
as we have | 14 |
and began to | 14 |
wanted to get | 14 |
the computer security | 14 |
was beginning to | 14 |
long as you | 14 |
regardless of the | 14 |
the existence of | 14 |
and log in | 14 |
had not yet | 14 |
a database of | 14 |
web site that | 14 |
i was just | 14 |
to get up | 14 |
was only one | 14 |
was blocked by | 14 |
the release of | 14 |
keep up with | 14 |
vice president of | 14 |
was looking for | 14 |
protected by the | 14 |
to work with | 14 |
large amount of | 14 |
perhaps the most | 14 |
to become a | 14 |
it had a | 14 |
piece of software | 14 |
way of life | 14 |
this instruction will | 14 |
e document was | 14 |
will tell you | 14 |
respect to the | 14 |
of a large | 14 |
i help you | 14 |
that public libraries | 14 |
that they could | 14 |
let go of | 14 |
who had been | 14 |
they would be | 14 |
n is octal | 14 |
in the accumulator | 14 |
with access to | 14 |
how many people | 14 |
in a manner | 14 |
also known as | 14 |
section of the | 14 |
able to use | 14 |
the computer will | 14 |
or in the | 14 |
she said with | 14 |
in the dark | 14 |
on the cheek | 14 |
level level level | 14 |
how the hell | 14 |
in the long | 14 |
our findings of | 14 |
there were only | 14 |
at the door | 14 |
like he was | 14 |
of it all | 14 |
anonymous ftp from | 14 |
edge of the | 14 |
thing to do | 14 |
need to talk | 14 |
i told him | 14 |
no one in | 14 |
was at the | 14 |
for the world | 14 |
take a look | 14 |
content on the | 14 |
material harmful to | 14 |
at the thought | 14 |
is the first | 14 |
of the law | 14 |
pointed at the | 14 |
of the filtering | 14 |
as many as | 14 |
but i have | 14 |
and the others | 14 |
the answer to | 14 |
seem to have | 14 |
operation code this | 14 |
from the us | 14 |
percent of the | 14 |
he said to | 14 |
since he had | 14 |
for that matter | 14 |
his eyes and | 14 |
time in the | 14 |
appeared to be | 14 |
run by the | 14 |
and the national | 14 |
on the door | 14 |
is octal digits | 14 |
there were other | 14 |
that many of | 14 |
that this is | 14 |
use of software | 14 |
response to the | 14 |
of software filters | 14 |
a few times | 14 |
so much as | 14 |
at one point | 14 |
over the phone | 14 |
to keep it | 14 |
the door and | 14 |
that i had | 14 |
the lisp machine | 14 |
might be able | 14 |
look in the | 14 |
you wanted to | 14 |
if you get | 14 |
place in the | 14 |
i thought i | 14 |
a fraction of | 14 |
do you need | 14 |
we want to | 14 |
portions of the | 14 |
of computers and | 14 |
operation of the | 14 |
size of the | 14 |
the difference between | 14 |
trying to make | 14 |
from the internet | 14 |
i would be | 14 |
the police and | 14 |
to develop a | 14 |
at the computer | 14 |
and it would | 14 |
the worm had | 14 |
yes no no | 14 |
were in the | 14 |
get back to | 14 |
sexually explicit material | 14 |
out into the | 14 |
in the new | 14 |
the filtering software | 14 |
pick up the | 14 |
for those who | 14 |
of the many | 14 |
had managed to | 14 |
log in as | 14 |
using the internet | 14 |
if there were | 14 |
to ask the | 14 |
there are many | 14 |
do you understand | 14 |
the afp had | 14 |
have the same | 14 |
in the hands | 14 |
versions of the | 14 |
the next time | 14 |
was that he | 14 |
said to the | 14 |
network information center | 14 |
to your host | 14 |
a computer network | 14 |
to show that | 14 |
days of the | 14 |
and by the | 14 |
to get in | 14 |
at the office | 14 |
well as a | 14 |
that are not | 14 |
for them to | 14 |
be used by | 14 |
speech that is | 14 |
it looked like | 14 |
addition to the | 14 |
usenet is not | 14 |
that if you | 14 |
he and his | 14 |
the world to | 13 |
work in the | 13 |
that the police | 13 |
is used to | 13 |
part of his | 13 |
bulletin board systems | 13 |
each other in | 13 |
one in the | 13 |
and abuse task | 13 |
way to make | 13 |
needed to be | 13 |
at one of | 13 |
there has been | 13 |
you can also | 13 |
internet use policies | 13 |
of a million | 13 |
i know what | 13 |
in touch with | 13 |
by the government | 13 |
the freedom league | 13 |
history of the | 13 |
to which he | 13 |
abuse task force | 13 |
of course it | 13 |
a n a | 13 |
to the free | 13 |
to determine whether | 13 |
it turned out | 13 |
of the various | 13 |
across the street | 13 |
ready to go | 13 |
this was not | 13 |
hands of the | 13 |
use the term | 13 |
of the situation | 13 |
can be reached | 13 |
aware of the | 13 |
have their own | 13 |
the power to | 13 |
for the rest | 13 |
the time to | 13 |
among other things | 13 |
or more of | 13 |
need to get | 13 |
which was blocked | 13 |
associated with the | 13 |
a computer virus | 13 |
now and again | 13 |
to get them | 13 |
a host of | 13 |
and the government | 13 |
in a while | 13 |
of the few | 13 |
he looked up | 13 |
number of sites | 13 |
the names of | 13 |
send mail to | 13 |
free documentation license | 13 |
hell of a | 13 |
you know about | 13 |
he said he | 13 |
link to the | 13 |
be a good | 13 |
it seems to | 13 |
is going on | 13 |
that you were | 13 |
get the file | 13 |
much of it | 13 |
an example of | 13 |
australian federal police | 13 |
the first to | 13 |
if there are | 13 |
in conjunction with | 13 |
not be able | 13 |
if it had | 13 |
the web pages | 13 |
is no way | 13 |
i had the | 13 |
the only thing | 13 |
on the street | 13 |
related to the | 13 |
that would have | 13 |
and the world | 13 |
it felt like | 13 |
cost of the | 13 |
blocked web sites | 13 |
that does not | 13 |
internet use policy | 13 |
out on the | 13 |
to those who | 13 |
so they could | 13 |
understanding of the | 13 |
it is in | 13 |
the day before | 13 |
and in a | 13 |
should not be | 13 |
to all the | 13 |
the floor and | 13 |
of homeland security | 13 |
only a small | 13 |
a lot to | 13 |
in the news | 13 |
long as they | 13 |
on your own | 13 |
not have been | 13 |
the internet to | 13 |
not seem to | 13 |
no idea what | 13 |
lots of people | 13 |
would not have | 13 |
director of the | 13 |
in a computer | 13 |
in accordance with | 13 |
a computer and | 13 |
is subject to | 13 |
for more than | 13 |
you might want | 13 |
the front page | 13 |
of a second | 13 |
you may not | 13 |
the presence of | 13 |
the one who | 13 |
the risk of | 13 |
he took a | 13 |
the summer of | 13 |
as fast as | 13 |
on the market | 13 |
do it in | 13 |
number of people | 13 |
at this time | 13 |
have a good | 13 |
have a look | 13 |
the war on | 13 |
to keep his | 13 |
something of a | 13 |
vast amounts of | 13 |
is no longer | 13 |
to tell the | 13 |
back of his | 13 |
a system that | 13 |
on a network | 13 |
sort of thing | 13 |
of the problem | 13 |
his head in | 13 |
long as the | 13 |
trust anyone over | 13 |
the world wide | 13 |
would you like | 13 |
to ask for | 13 |
felt as though | 13 |
as i could | 13 |
i could do | 13 |
them out of | 13 |
leave the subject | 13 |
who would be | 13 |
or child pornography | 13 |
of the current | 13 |
you know how | 13 |
computers and the | 13 |
he seemed to | 13 |
in electronic form | 13 |
to listen to | 13 |
has become a | 13 |
i know you | 13 |
he had had | 13 |
of the memory | 13 |
and child pornography | 13 |
a public forum | 13 |
effects of the | 13 |
for this book | 13 |
just as he | 13 |
reached for the | 13 |
the lack of | 13 |
during the s | 13 |
author of the | 13 |
he was also | 13 |
gnu general public | 13 |
onto the floor | 13 |
so that you | 13 |
what if the | 13 |
to go through | 13 |
could see that | 13 |
what did you | 13 |
dozen or so | 13 |
in love with | 13 |
you try to | 13 |
i had been | 13 |
program counter is | 13 |
which can be | 13 |
just as the | 13 |
value of the | 13 |
and you know | 13 |
paper tape reader | 13 |
no no yes | 13 |
code this instruction | 13 |
that may be | 13 |
look at this | 13 |
his chair and | 13 |
how are you | 13 |
just in case | 13 |
on its own | 13 |
use the internet | 13 |
the address of | 13 |
need for a | 13 |
was that it | 13 |
people who have | 13 |
proved to be | 13 |
but they are | 13 |
the possibility of | 13 |
as a way | 13 |
first of all | 13 |
the chicago task | 13 |
on a system | 13 |
i went to | 13 |
to tell him | 13 |
you in the | 13 |
receipt of federal | 13 |
and of course | 13 |
to give it | 13 |
this is how | 13 |
content of the | 13 |
thought about it | 13 |
want it to | 13 |
case of minors | 13 |
group of people | 13 |
went on to | 13 |
my name is | 13 |
in the newsgroup | 13 |
been known to | 13 |
the point where | 13 |
once in a | 13 |
around the table | 13 |
on the ground | 13 |
and there were | 13 |
that they would | 13 |
and went to | 12 |
the work of | 12 |
followed by a | 12 |
dealing with the | 12 |
a place to | 12 |
thought he was | 12 |
via the internet | 12 |
even in the | 12 |
do with it | 12 |
he could have | 12 |
maximum for shifts | 12 |
it was better | 12 |
you have any | 12 |
to get back | 12 |
preservation and access | 12 |
that was when | 12 |
there have been | 12 |
because he was | 12 |
believe that the | 12 |
that the library | 12 |
and can be | 12 |
of its own | 12 |
did not have | 12 |
are to be | 12 |
know what it | 12 |
that in the | 12 |
that the e | 12 |
the president was | 12 |
see richard stallman | 12 |
that they will | 12 |
he waited for | 12 |
sooner or later | 12 |
it to a | 12 |
waited for the | 12 |
they were not | 12 |
there are also | 12 |
digital equipment corporation | 12 |
at that moment | 12 |
of the year | 12 |
be used as | 12 |
no yes no | 12 |
his father had | 12 |
looked up from | 12 |
felt a little | 12 |
wanted to see | 12 |
to respond to | 12 |
a host system | 12 |
ssc mac will | 12 |
just a little | 12 |
appears to be | 12 |
so easy to | 12 |
australia pty ltd | 12 |
if there was | 12 |
told me that | 12 |
staring at the | 12 |
available in the | 12 |
automated classification systems | 12 |
to see who | 12 |
the only person | 12 |
the government to | 12 |
for a little | 12 |
the computer industry | 12 |
an operating system | 12 |
or harmful to | 12 |
more like a | 12 |
it to you | 12 |
wanted to go | 12 |
a pile of | 12 |
you want a | 12 |
piece of the | 12 |
himself in the | 12 |
been working on | 12 |
of some of | 12 |
welcome to the | 12 |
a half dozen | 12 |
couple of years | 12 |
to insure that | 12 |
the network to | 12 |
this is an | 12 |
that the first | 12 |
the gnu general | 12 |
you can be | 12 |
was a big | 12 |
of the government | 12 |
and waited for | 12 |
up to my | 12 |
at the beginning | 12 |
he was still | 12 |
and one of | 12 |
going to say | 12 |
tailored to further | 12 |
a phone call | 12 |
to do a | 12 |
of san francisco | 12 |
i took a | 12 |
he thought about | 12 |
a little while | 12 |
the internet worm | 12 |
was as if | 12 |
free software operating | 12 |
a cup of | 12 |
as if it | 12 |
for the purpose | 12 |
she could not | 12 |
table of contents | 12 |
the system was | 12 |
it to your | 12 |
other than the | 12 |
n operation code | 12 |
he kissed her | 12 |
did you know | 12 |
best way to | 12 |
of the story | 12 |
even if he | 12 |
the victoria police | 12 |
no idea how | 12 |
have been in | 12 |
to worry about | 12 |
for some time | 12 |
be sent to | 12 |
they were the | 12 |
file in your | 12 |
supreme court has | 12 |
about how to | 12 |
frequently asked questions | 12 |
he said with | 12 |
the status of | 12 |
needs to be | 12 |
may be the | 12 |
any kind of | 12 |
of the linux | 12 |
but i could | 12 |
be found in | 12 |
in the software | 12 |
on the use | 12 |
the office of | 12 |
sites in the | 12 |
is also a | 12 |
his head and | 12 |
had access to | 12 |
with the new | 12 |
what you have | 12 |
as an example | 12 |
the ftp site | 12 |
in their own | 12 |
in a network | 12 |
a technology protection | 12 |
file transfer protocol | 12 |
during the day | 12 |
prime suspect had | 12 |
it up and | 12 |
from the other | 12 |
it is difficult | 12 |
had been so | 12 |
of the in | 12 |
for the entire | 12 |
it seemed to | 12 |
to see a | 12 |
you get it | 12 |
it in a | 12 |
he looked around | 12 |
story of the | 12 |
couple of months | 12 |
the guy who | 12 |
of the screen | 12 |
subject to the | 12 |
the span office | 12 |
of the night | 12 |
was part of | 12 |
to focus on | 12 |
is a very | 12 |
the bed and | 12 |
that cipa is | 12 |
development of a | 12 |
chappell music australia | 12 |
the provision of | 12 |
sound of the | 12 |
meant to be | 12 |
to know where | 12 |
she looked at | 12 |
the police were | 12 |
in your mailbox | 12 |
was the last | 12 |
of the university | 12 |
would be to | 12 |
it is impossible | 12 |
it or not | 12 |
that was not | 12 |
back from the | 12 |
a deep breath | 12 |
can be a | 12 |
the equivalent of | 12 |
the modified version | 12 |
at any rate | 12 |
and took a | 12 |
a text file | 12 |
they have been | 12 |
text and image | 12 |
by the first | 12 |
to provide a | 12 |
we believe that | 12 |
the hacker was | 12 |
of all of | 12 |
substantial amounts of | 12 |
columbus day virus | 12 |
it into the | 12 |
rather than a | 12 |
to the office | 12 |
side by side | 12 |
had nothing to | 12 |
the system and | 12 |
even if they | 12 |
in the book | 12 |
back to me | 12 |
you are using | 12 |
but there are | 12 |
the information rich | 12 |
beginning of the | 12 |
the spirit of | 12 |
a large amount | 12 |
take a few | 12 |
it was so | 12 |
people who were | 12 |
and the internet | 12 |
tend to be | 12 |
you want it | 12 |
i love you | 12 |
first amendment values | 12 |
told the court | 12 |
science honors program | 12 |
over my head | 12 |
it must have | 12 |
in the wrong | 12 |
the result of | 12 |
come to the | 12 |
with the computer | 12 |
she had a | 12 |
he went to | 12 |
much as a | 12 |
i can tell | 12 |
the command line | 12 |
to know how | 12 |
he told her | 12 |
digits through of | 12 |
out of bed | 12 |
to the united | 12 |
knew he was | 12 |
public libraries that | 12 |
could think of | 12 |
to the electronic | 12 |
the smiley face | 12 |
down at his | 12 |
in the electronic | 12 |
used by permission | 12 |
not at all | 12 |
that of the | 12 |
office of the | 12 |
amount of speech | 12 |
to improve the | 12 |
all i could | 12 |
he found a | 12 |
and that he | 12 |
reference to the | 12 |
of the us | 12 |
the san francisco | 12 |
to san francisco | 12 |
where he was | 12 |
for the same | 12 |
the receipt of | 12 |
structure of the | 12 |
are a few | 12 |
department of energy | 12 |
has not been | 12 |
gain access to | 12 |
want to call | 12 |
to your computer | 12 |
to work out | 12 |
are you doing | 12 |
of speech that | 12 |
and there is | 12 |
by n h | 12 |
or publicly perform | 12 |
to reach the | 12 |
have no idea | 12 |
but there were | 12 |
much of a | 12 |
in any way | 12 |
with the other | 12 |
connect to the | 12 |
the civil libertarians | 12 |
preventing patrons from | 12 |
if he could | 12 |
looked at her | 12 |
the phone number | 12 |
gnu free documentation | 12 |
address of the | 12 |
how can you | 12 |
to be sure | 12 |
part of this | 12 |
all of his | 12 |
far as i | 12 |
to make their | 12 |
of george washington | 12 |
the new joey | 12 |
and the computer | 12 |
was a long | 12 |
at your host | 12 |
of the group | 12 |
while he was | 12 |
warner chappell music | 12 |
of electronic texts | 12 |
less restrictive alternative | 12 |
best of all | 12 |
the internet in | 12 |
now it was | 12 |
in a large | 12 |
the distribution of | 12 |
and you can | 12 |
is a good | 12 |
and his mother | 12 |
you can see | 12 |
the phone and | 12 |
the national science | 12 |
your own computer | 12 |
the last thing | 12 |
it had to | 12 |
the world in | 12 |
end of record | 12 |
here and there | 12 |
as in the | 12 |
you get to | 12 |
and then you | 12 |
in the near | 12 |
in light of | 12 |
the rights of | 11 |
free of charge | 11 |
such as compuserve | 11 |
to take it | 11 |
he knew he | 11 |
in the field | 11 |
edu in the | 11 |
to get his | 11 |
sat in the | 11 |
words and music | 11 |
learn how to | 11 |
growing number of | 11 |
though he had | 11 |
hackers and phreakers | 11 |
with all of | 11 |
unwillingly exposed to | 11 |
the way the | 11 |
quality of the | 11 |
in the midst | 11 |
and how they | 11 |
the first few | 11 |
as i was | 11 |
blocked by the | 11 |
two of them | 11 |
would take a | 11 |
be asked for | 11 |
he picked up | 11 |
took a deep | 11 |
something about it | 11 |
they have to | 11 |
is known as | 11 |
in a public | 11 |
need to do | 11 |
but he could | 11 |
united states and | 11 |
he was just | 11 |
was full of | 11 |
of the word | 11 |
three or four | 11 |
maybe it was | 11 |
rational basis review | 11 |
to realize that | 11 |
of the state | 11 |
if you wanted | 11 |
computer crimes unit | 11 |
there for a | 11 |
depending on the | 11 |
compared to the | 11 |
a line printer | 11 |
was a major | 11 |
to the front | 11 |
administered for the | 11 |
that is a | 11 |
he could do | 11 |
there was one | 11 |
be on the | 11 |
the internet as | 11 |
on either side | 11 |
and we were | 11 |
of filtering software | 11 |
for internet access | 11 |
the public to | 11 |
it to be | 11 |
i guess i | 11 |
deal with it | 11 |
find out what | 11 |
instead of a | 11 |
from now on | 11 |
instruction in the | 11 |
in the real | 11 |
trying to figure | 11 |
far as the | 11 |
the computer was | 11 |
to the people | 11 |
vast majority of | 11 |
one of our | 11 |
where i was | 11 |
was back in | 11 |
and you want | 11 |
that is what | 11 |
be the first | 11 |
and then a | 11 |
were on the | 11 |
into a computer | 11 |
that we can | 11 |
trying to do | 11 |
it was very | 11 |
that i could | 11 |
the support of | 11 |
but for the | 11 |
to come up | 11 |
chicago computer fraud | 11 |
at carnegie mellon | 11 |
all over america | 11 |
because they are | 11 |
if you had | 11 |
extra position and | 11 |
a bit more | 11 |
bulletin board system | 11 |
next instruction in | 11 |
pointed out that | 11 |
war on the | 11 |
not want to | 11 |
block access to | 11 |
in the mail | 11 |
else in the | 11 |
in a world | 11 |
to hundreds of | 11 |
lot of time | 11 |
to the information | 11 |
will be used | 11 |
that do not | 11 |
the source of | 11 |
i think we | 11 |
of electronic resources | 11 |
list of all | 11 |
to his own | 11 |
on the wall | 11 |
under the first | 11 |
you can tell | 11 |
to violate the | 11 |
the president of | 11 |
looked at him | 11 |
what was happening | 11 |
one extra position | 11 |
want to send | 11 |
where the hell | 11 |
lot of things | 11 |
was such a | 11 |
it is an | 11 |
it with the | 11 |
they were going | 11 |
and then there | 11 |
internet use logs | 11 |
how long it | 11 |
not only the | 11 |
dedicated to the | 11 |
to check the | 11 |
preventing the dissemination | 11 |
you would have | 11 |
creator of the | 11 |
a computer program | 11 |
but she was | 11 |
aspects of the | 11 |
want to go | 11 |
you will have | 11 |
you know it | 11 |
could be a | 11 |
her left hand | 11 |
the software industry | 11 |
see what i | 11 |
but when he | 11 |
and this is | 11 |
the sense of | 11 |
had been able | 11 |
prevent patrons from | 11 |
the way we | 11 |
back to you | 11 |
of public libraries | 11 |
and they had | 11 |
a day or | 11 |
her eyes and | 11 |
the world and | 11 |
of a local | 11 |
league of women | 11 |
up to a | 11 |
the start of | 11 |
system based on | 11 |
the government has | 11 |
made it possible | 11 |
it was hard | 11 |
on his desk | 11 |
ssc mac should | 11 |
the privacy of | 11 |
you tell me | 11 |
in an electronic | 11 |
case of a | 11 |
on which the | 11 |
that of a | 11 |
when they were | 11 |
the next morning | 11 |
message to a | 11 |
of what the | 11 |
at least in | 11 |
few years ago | 11 |
way through the | 11 |
n a n | 11 |
even though the | 11 |
the computing center | 11 |
in the old | 11 |
the central processor | 11 |
the spook said | 11 |
to meet the | 11 |
he left the | 11 |
able to do | 11 |
the advent of | 11 |
all the other | 11 |
you want and | 11 |
in some ways | 11 |
a long way | 11 |
soon as i | 11 |
secret service had | 11 |
to meet you | 11 |
and there are | 11 |
list of the | 11 |