Introduction -- pt. 1. Kevin : the dark-side hacker -- pt. 2. Pengo and project equalizers -- pt. 3. RTM -- Epilogue -- Notes on sources -- Acknowledgements -- Index.