My first exposure to a computer was an 8-bit micro called a Commodore 64. At 14, I owned what was considered a state of the art computer. This was no mere collection of wire, silicon and plastic; it was a gateway to another world. My magic box had sound, graphics and communication abilities that set it apart from the green-screened data terminals of its time.
Of course, you could write small programs in BASIC, buy a videogame from Child World or even animate a rudimentary movie. However, it was the unit's RS232 port that made computing come alive; by attaching a modem to the RS232, I was able to connect to the rest of the world.
The online world of the early 1980s was nothing like the internet of today. There were no web pages, streaming video sites, instant messenger clients or peer-to-peer file sharing. Instead, if you had a friend in the know, you could find your way to what was called an electronic bulletin board system, more commonly known as a BBS.
A BBS was where those in the know came to play. Armed with a 300 baud modem and 1541 disk drive, I was soon calling into computers and intermingling among phone phreaks, hackers, crackers and pirates. Suddenly, I knew people with names like The Improper Bostonian, Dr. Atomic and The Toxic Avenger. Just like the CB users of a decade before, BBS users went by handles.
Handles served a double purpose. By assuming another name, hackers afforded themselves a level of anonymity. After all, many of them participated in activities that fell into legal gray areas. Secondly, the prestige a cool alias could bring was better than anything Charles Atlas could offer in comic book ads.
The BBS of the 1980s was a primitive beast. It could handle just one user's phone call at a time! A relatively active BBS received 40 or more calls a day and had message boards and a download section.
The download section of many BBSes contained two areas: One for commoners, people who hadn't yet established themselves; the other for those users considered "elite" (cool) by the SYSOP, the proprietor of the BBS. This second area had all the latest pirated games, utilities for hacking computer systems and text files describing how to break into all sorts of mainframes.
The BBS scene had two major commodities: pirated software (warez) and information. The newer the warez, the more valuable it was as a commodity. It was actually possible to obtain one- or two-day-old software that had already been stripped of its copy protection; we called breaking through a program's security "cracking." A person earned his "elite" status by becoming the purveyor of the latest pirated software.
Information could turn a humble BBS citizen into a member of the elite. This information included instructions on how to hack programs and computer systems, guidelines on how to break copy protection schemes, or lists of phone numbers and access codes to other systems. The crown jewels of many download sections were special text files, called "G-Files," that were occasionally available for download, provided you knew where to look.