A similarly fascinating and influential book for me (at age 10, mind you) was <i>Out of the Inner Circle</i>, a book whose cover featured the "computer intruder" author with a black box over his eyes. So as you might guess, it was very much following in the same outlaw hacker mold which may have been set with this very article.<p>The book, ghostwritten by Howard Rheingold in 1985, was a visceral crystallization of what I think is fair to call the punk era of hacking in the early 80's. Having just enough point of contact in personal computing to understand what was going on and just enough credulity to accept the wildness of the story, it was quite a captivating narrative. This book, a few issues of <i>Electronic Fun with Computers and Games</i> and a photocopied version of <i>The Secret Guide to Computers</i> were what really turned me on to computers as a kid in the 80's.<p>Reading a book like <i>Inner Circle</i> or an article like this may have provided a certain hero myth for hackers, the kind which sometimes seems necessary to kindle a long-term passion. A myth like what James Bond was to aspiring CIA operatives, <i>Star Trek</i> was to future JPL engineers, and now <i>The Social Network</i> is to Stanford undergrads. I think our society greatly underestimates how valuable these myths can be. Without an article about having a hand-held box that lets you put a worldwide communications network at your disposal, would there be an iPhone?
Same article as single page: <a href="http://www.slate.com/articles/technology/the_spectator/2011/10/the_article_that_inspired_steve_jobs_secrets_of_the_little_blue_.single.html" rel="nofollow">http://www.slate.com/articles/technology/the_spectator/2011/...</a>
New York Times story on one of the guys mentioned in the article (Joe Engressia):
<a href="http://www.nytimes.com/2007/08/20/us/20engressia.html" rel="nofollow">http://www.nytimes.com/2007/08/20/us/20engressia.html</a>