You are not logged in. Login Now
 0-24   25-49   50-74   75-99   100-108      
 
Author Message
25 new of 108 responses total.
memetics
response 75 of 108: Mark Unseen   Apr 15 15:50 UTC 1998

Steve,

The Tech Model Railroad Club?  I can't say I've heard of it - please enlighten
me, by email if you wish.

Hey, old is kewl, that means you have more knowledge.  As far as hacking goes,
in any sense of the word, I would have thought the older the better, as long
as you're up to date with new tech.  The speed of youth isn't particularly
useful when you've got to solve a problem through knowledge and intuition
rather than outright mental speed.

All of what you details above, reading mail, DoS, even CC numbers is ethical
I think, depending on the situation, the motive and the cause.

My history isn't up to scratch, did the media redefine the word, or did the
hackers redefine the activity?

one last note - I noticed with some sadness that in the recent web coverage
of hacking the main feature of many artivles was a survey on the definitions
of hacking and cracking - is that as close as we get to debate these days?

srw
response 76 of 108: Mark Unseen   Apr 16 03:02 UTC 1998

/Hackers/, by Steven Levy (New York: Anchor Press/Doubleday,
1984)  explains the role of TMRC pretty well. 
TMRC's web site is at http://www.mit.edu/activities/tmrc/
I was one of the contributors to that site. In particular, I wrote the 
page at http://www.mit.edu/activities/tmrc/hackers-ref.html which pretty 
well describes the feelings of us TMRC hackers about the term. 

"Crackers" was a term invented later in an attempt to deflect all the 
new meaning that the term "hackers" took on, but did not originally 
have. I think it failed. Most people do not make this distinction 
(between hackers and crackers). Follow the link to the new Hacker's 
Dictionary for the definition they give of the term hacker. I quote 
definition 8 here for you:

8. [deprecated] A malicious meddler who tries to discover sensitive 
information by poking around. Hence `password hacker', `network hacker'. 
The correct term for this sense is cracker. 

(source http://earthspace.net/jargon/jargon_23.html)

And indeed I am a long-time deprecator of that definition, though I 
don't find "cracker" satisfying. It hasn't worked. I use the term 
"vandal" now. It doesn't sound like "hacker" and it has all the right 
connotations (from my point of view).
memetics
response 77 of 108: Mark Unseen   Apr 21 17:05 UTC 1998

Hackers by Levy is one book I haven't got.  I must get that at some point,
presumably out of print by now.

I think the reason that "cracker" didn't work is because it was an invented
term.  The only people who can get away with inventing new language "on
purpose" are the mass-media.  Otherwise any invented term is seen as an
invented term - part of the point of jargon is to exclude those without the
appropriate knowledge so if old-definiton hackers want to call "computer
vandals" crackers the crackers aren't going to go along with it.  Plus in part
the definition of hacker from
http://www.mit.edu/activities/tmrc/hackers-ref.html applies, ie.:-

someone who applies ingenuity to achieve a clever result

I thinkt he means are not in dispute, it's just that the ends of hackers,
crackers, vandals whatever are seen in different ways by different groups.
For example se7en, the hacker who trashes paedophile's PC's, a good end or
a bad one?

I take that back - sometimes the means aren't ingenuious.  Downloading winnuke
and throwing it at IRCers is hardly ingenuios.

It's a pleasure talking to you srw, and I'm glad I've found GREX.  If only
to show that I am far too reliant on spell-checkers and word-processors :)

junk
response 78 of 108: Mark Unseen   May 9 18:08 UTC 1998

how to hack?  www.phonelosers.org
PLA issue #1:
      How to Hack a <i forget> BBS
hook and ladder method.
read, laugh, enjoy
cytex
response 79 of 108: Mark Unseen   May 19 12:34 UTC 1998

ok maybe this is just my opinion but have any 1 actually read the mentors last
words this is the only real deffinition of hacking any1 else that soley relies
on sombody elses work is nufin but a lamer wether he is being productive or
not tell me what u think.
morpheus
response 80 of 108: Mark Unseen   May 24 22:13 UTC 1998

Well, I don't have a lot to add to this, other than to correct Jan's 
earlier statement that anyone with lots of technical knowledge is 
immeditaly employable, and that all hackers are derilects who have no 
good reason to hack. Believe it or not, there are those of us who are 
poor enough to not have access to cool equipment.

I would like to ask you some questions, Jan. (Good lord, I think i am 
channeling Steve McGarret from Hawaii 5-0 ;-).

First, how many 16 year olds do you think know how to administer a UNIX 
system, or do other things that would make them valuable to an 
employer? I am sure that a lot of those people who are actually 
*original* hackers, as opposed to those who copy 8lgm exploits, can. 
Jan, you made the point that many of the worlds best hackers have come 
from Russia and former russian republics. Why do you think that so many 
hackers (and I am talking abou _hackers_, not aol warez or codez kids) 
are young? If you really want to get rid of hackers, hire them.

Second, how many of them do you think would actually get hired by a 
company, even if they go in and present themselves nicely? There is 
blatant discriminiation against young members of the technical elite. 
Don't forget that.

Next, why do you assume that everyone has access to systems or software 
that they need on their own to further their studies? Let's assume that 
I wanted to learn to program, say, AS-400 systems. I live in Ypsilanti, 
Michigan, and the local high school has *no* computers for students. 
(No, i am not really exagerating). What if I want to learn how to use 
these systems? Well, seeing as how I am not particularly rich, and my 
parent unit doesn't work in a technical field, I think I am screwed 
unless I steal some time on a dialup for an As-400 at a plant in 
Detroit. What does it hurt if it at 1am, the plants not operating, and 
I don't delete, modify, or even view any of *their* data?

Hell will freeze over before I am allowed to (legitately) tweak phone-
switches, or even just PBX's or PhoneMail systems. Obviosly, such 
system experience would make me readily employable, and would ensure 
that I would be more succesful than my parents. So, what does it hurt 
if I hack a few AT&T switches? I haven't installed any translation taps 
yet...

(Besides, you seldom hear of young techno-wizzes getting legitimate 
employment, but I hear stories all the time of hacker/security-types 
who are my age getting employment in a cool setting... ).

Do not lump me in with everyone else. I am a hacker, but I am not 
"bad." I need to do this to learn, until I can get my internship. My 
life is a bootstrapping process, and this is what I gotta do to get to 
the next level. 

- Andrew Christensen

(Hackers, the book by Steven Levy, btw, is not about hackers as you are 
thinking of them -- it is about those people at MIT who invented chess 
playing algorithms, the roots of AI, etc...).
morpheus
response 81 of 108: Mark Unseen   May 25 07:06 UTC 1998

Ahem. I forgot to mutter something in my previous post, so here goes:

I have seen ads for "online data backup" recently. This seemed like a 
bad idea as soon as I heard the concept, but that mention of Microsoft 
searching mail messages at hotmail.com made it pop back to the 
forefront of my mind. Why in the *world* would *anybody* feel that 
their data is "secure" if they schlep it over a net connection to some 
anonymous computer somewhere, anyways? I just don't get that.

It would seem that your data is already insecure enough if you *aren't* 
showing it off to strangers. People were wigging out a couple years ago 
over the concept of cookies being placed into  a directory by certain 
websites, as they felt it posed a security risk. WHY HAS NO ONE 
SCREAMED LOUDLY ABOUT THIS?! I dunno.
kur
response 82 of 108: Mark Unseen   Jun 11 20:02 UTC 1998

I'm trying to hack one RedHat linux 4.2.  Anyone know how to get it?
morpheus
response 83 of 108: Mark Unseen   Jun 13 15:28 UTC 1998

Your question is much too vague.

There are many different flaws in Linux, many of which can be exploited 
to allow root access.
srw
response 84 of 108: Mark Unseen   Jul 6 05:57 UTC 1998

Well, Andrew, I am not a hacker in the sense that you are, but rather in the
sense that Stephen Levy depicts. These two senses of the word confuse people.
I am not happy that people now use the term we used to use for our activities
to describe what you do when you break into systems for your own purposes.

I respect that you do not do harm, but I don't think that makes it OK.
novocain
response 85 of 108: Mark Unseen   Jul 7 15:33 UTC 1998

Well, maybe im a couple of pposts too late, but yeah... windoze actually uses
one of the fonts for the sprite in the flying windows saver... there are some
commonly avail. debug codes to change the pix. to any of the others; a one
byte alteration (since ya only gotta change the offset) ... im new here.. some
one mail me! ;)
vhd
response 86 of 108: Mark Unseen   Oct 20 19:55 UTC 1998

        You all seem to be quite misguided on the purpose of hacking.  Why,
How and who?  I am a sysadmin and have had a great interest for unix, network
security.  By most standards (The general public) hackers are malicious and
negative.  We are not.  I have bypassed security on my network several times
to cheack for holes that could couse my network some trouble.  REAL hackers
are concered with preserving the time and money that sysadmins put into thier
systems.  NOT with "deleting stuff" and "hacking webpages".  A real hacker
is interested is network security as much as he is concered with ethics.  I
cannot stand it when a "hacker" tied to break root on a server that provides
a free service I frown upon him/her.  The issue of hackers on grex is not a
big one.  A bunch of script kiddies will come on and eventually get bored due
to "loss of interest."  The majority of these "script kiddies" are about 12-14
years old.  So all those that write to this board and talk about how "elite"
they are and if you want to learn how to hack mail them.  Rubish.  
Dont even talk about this on a public board.  Goodbye and Email me if you
would like to talk about REAL computer security, though i probly wont have
time to read it all, and might only look at some.  

-vhd-
hc
response 87 of 108: Mark Unseen   Oct 21 12:53 UTC 1998

Hmmmm.... I think it's safe to say that anyone interested in boosting their
security knowledge is better off picking up books and reading, not emailing
people to ask the age old "how do you hack" question.  As for the flying
toassters, I seem to remember that when the Bill 'n Opus screen savers came
out, there was a sceen saver that had Opus shooting down toasters with a
shotgun... They got nabbed for copyright violation though, and they had to
pull them off the shelves...
morpheus
response 88 of 108: Mark Unseen   Nov 8 03:48 UTC 1998

Srw,

There is nothing wrong with hacking. Really.

To those of you who think hacking (in the intrusion of computers sense) 
is the root of all evil (no pun intended, and that executing a few 
commands for the sole sake of getting su privs on a system that belongs 
to a large corporation is akin to invading your house and raping 
someone, I suggest that you get a life. Really.

I, personally, would 

 * be able to sleep
 * be able to go on a date
 * be able to eat, and most importantly
 * be able to ignore it

if some miscreant invaded my companies computers, so long as their 
intentions were quite obviously harmless (ie, they didn't delete 
payrolls files, disconnect phonelines, etc.).

So, I would like to humbly suggest that all of you holier-than-thou 
hackers get laid. F'real.

On a side note, I totally agree with hc. Occasionally, it is helpful to 
have someone to ask questions of (source code CAN be really fucking 
confusing at times), but all in all the best way to learn about 
security is thru hands on experience (everyone reading this has a 
computer or access to a computer, so get and install Linux, 
Free/Open/NetBSD, xFree86, and so on -- they are all, well, FREE).

andrew

P.S.
Heh, cool, didn't know that srw was a tmrc guy! That rocks! Hmm, as I 
recall, the tmrc'ers were into blueboxing... defend *that*, please.
scott
response 89 of 108: Mark Unseen   Nov 8 13:21 UTC 1998

Hmm... how do you *know* somebody isn't going to cause any harm?  Maybe they
poke around for hours doing nothing bad, then wipe / just before leaving as
a calling card.
morpheus
response 90 of 108: Mark Unseen   Nov 9 00:02 UTC 1998

Well, here's an example of BORING but HARMLESS. From behaviour like the
following it is easy to see that nothing really shitty is going to be
done, probably. Of course, if you are REALLY worried, it isn't real hard
to get a call traced. I encourage all starch-suits out their to do this
and ask the hacker in question what their up to if you feel the need. It
is a bit better than calling the fbi into it.

user hacks in, changes motd, spends 14 hours in
#Boring_Losers_Jerk_Off_here_f'server on mirc, then types who and logs
off.

This is just an example, fo course.

Alternaly, they might do something like run a mathematical c program.

I used to do that when I was really young and didn't have legit access
to fast computers.

But, that rapidly grew boring, so I would usually go see a movie instead
of sticking around and doing any har,...

Which leads me to my point: besides the TMRC class of hackers, their are
two LARGE subsets of "miscreant" hackers.

Class 1: Bored kids like myself
Class 2: Professionals.

See, the way I figure it, class 1 actually helps you boring starch
collared types out, by giving your security a boot in the pants. If your
info is valuable enough to be worried (to the point of construing it the
same way as home invasion) when some bored teen takes a peek at it, then
it is damn well valuable enough for competitors with genuinly naughty
intents to break into. So, realize this and realize that class 1 hackers
help out computer securitys evolution to an extent.

Well, I gotta get back to being a starch-collar type now, good bye all.
jimdagem
response 91 of 108: Mark Unseen   Nov 9 01:45 UTC 1998

d00d, if you are really a hacker, don't go around showing off.  'Hey, duuuhhh,
I'm a h@(k3r!  Wanna know how to do it?'  Only tell when asked.
raven
response 92 of 108: Mark Unseen   Nov 11 01:04 UTC 1998

re #90 Why are you so interested in classifying people.  There are people
who aren't starched shirts & who are in fact in fact radical like myself
that think cracking is a bad idea unless it is done for political ends.
Just breaking into a system for the hell of it is vandalism IMO.  Breaking
into a military system to say out how the government wastes our money
on killing machines is an act of good conscience IMO.  Ofcourse again
this is a matter of perspective <shrug>.
morpheus
response 93 of 108: Mark Unseen   Nov 11 06:05 UTC 1998

"unless it is done for political ends?" HOW THE FUCK does *that* make 
it OK? If it is vandalism to break into a system and NOT do anything, 
then it would probably be vandalism too if someone actually changed 
something. No offense, but that is the worst justification I have heard 
in a LONG time. And that assesment comes from me, a certified 
"miscreat."

Politics is the absolute worst reason to do damage to a system, for the 
simple reason that none of us have identical political ideals. While 
your political views (and mine) tend to lean towards showing off what 
idiots the people in the pentagon are, someone elses may lean towards 
showing how they need to institute corporal punishment and prayer in 
school. How would you and I feel if the Christian Coalition hacked onto 
the whitehouse webpage and placed their political agenda there? Not so 
hot, I presume. So, the point is, politics doesn't really justify 
vandalism, certainly not in this country at least. 

(Or, is it time for the revolution? ;-)

Of course, you are probably thinking of hacking politically in an 
information gathering sense. That isn't really an option. For instance, 
in the past I have had call records from the phone switches at military 
bases. I saw that most of the numbers called were to phone sex lines 
(yes, I went through and called the numbers I saw listed), BUT if I was 
to distribute that information (because I am pissed that my tax dollars 
go towards helping service men jerk off, and I wanted to see it 
changed), I would be under risk of prosecution for having GOTTEN the 
information (top secret proprty of the US Gov and all that shit) in the 
first place, which would suck. So, not a lot can happen this way. 
(Before you start talking about taking it to the journalists, take a 
look at the hackers in the media right now and how they are portrayed, 
and try to imagine a hacker deliberately doing ANYTHINg that would risk 
him/her being portrated like that). 

By the way, I can almost promise you that anything interesting in the 
governments computers is off limits. It was a fluke of luck that got me 
the phone records, and they didn't really have anything THAT 
interesting on them --  besides 1-900-Wet-fuck. The governments 
security (despite what the pentagon claims when they are asking for 
another billion to improve computer security) is VERY high, at least on 
the machines that actually have protected information. 

Well, I am running on a bit, but in part one reason I classified other 
groups (the starch-shirts) is because one of the starch-suits 
representative srw "classified" me, which irritates me to no end, cuz I 
can promise you that I am neither what you saw in the movie Hackers nor 
WarGames nor Revenge of the Nerds. case in point, I wear neither pocket 
protectors nor leather pants on a regular basis, and my grades don't 
normally suck. All told, i think I tend more towards Matthew Broderick 
as Ferris Buhler than Matther Broderick as David Lightman ;-) So, don't 
get the wrong image of me: outside of work I don't spend THAT much time 
in front of the computer. The time i spend AT work is done so that I 
can get money to do things like travel (gotta visit my girlfriend, who 
i met over the sidewalk, not over the internet). My computer is about 4 
years old. Point being, I am not a nerd in the truly classical sense 
(hah, betcha didn't know that their *was* such a thing as a classic 
nerd). 

Another justification for my classification is the fact that the 
classifications I made were broad enough to be accurate. The only thing 
I have done wrong is assume that srw is a starch-shirt.

fuckit, this has gone on a bit. i will post now.
freeze0
response 94 of 108: Mark Unseen   Mar 27 16:09 UTC 1999

i need to learn about hacking through telnet, can you please send me something
to explain  at earl_steyn@hotmail.com

scott
response 95 of 108: Mark Unseen   Mar 27 17:25 UTC 1999

Is there no end to these cracker-wannabe morons?
morpheus
response 96 of 108: Mark Unseen   Apr 26 02:47 UTC 1999

well, you had to wait a whole month for my response to that obviously
rhetorical question, so I will make it stellar:
Nope.
(grin)
scott
response 97 of 108: Mark Unseen   Apr 26 18:01 UTC 1999

It was sort-of a rhetorical question.  It was really aimed at the idiot who
entered this item.  :)
detcom
response 98 of 108: Mark Unseen   May 31 06:46 UTC 1999

tehre is a real diffrence in the culture. hackers dont hamr systems, they go
in and they  explore, and they are normaly non milicious. the crakcers are
the ones that you need to worrk about....... unfortunatly ethere is a
treyotype, and that needs to be destroyed
mook
response 99 of 108: Mark Unseen   Nov 7 04:00 UTC 1999

And this all leads back to the source....
cyberkiller "Anyone wanna know how to hack?  E-mail me at my elite hotmail
account" 
well, maybe his message was not that idiotic but I feel rather bashing after
reading all 97 responses...but I am sitting in a booth running lights for a
very boring play....2 hours of talk :(
My view on hacking is that hacking in the real terminology as it was once
intended is now dead, or really close to death.  TMRC is what I think of, and
although I am only 16 I totally agree with the TMRC views on hacking.
I am not a hacker, but I am into network security, and when I feel the urge
to break into a system, I e-mail the admin and ask for permission to hack his
system.  Most systems I hack are picked out by what software they run and what
experience I need.  For example, my latest attacks were on a FreeBSD system
with Apache and some proxy stuff.  I know the admin and have my own shell to
the system, and we are good friends now....Friends because I asked if I could
try to break into his system.  I see nothing wrong with an urge to get into
a system, and I know thatpeople don't hire 16 year olds as admins,,,However
I am my school network admin.  I think that if you do want to hack, ask the
admin first, get an ok then try your luck... One you will be better, because
you can choose systems that you need practice with, and two you can gain some
very good relationships with people.

See ya-Mook

 0-24   25-49   50-74   75-99   100-108      
Response Not Possible: You are Not Logged In
 

- Backtalk version 1.3.30 - Copyright 1996-2006, Jan Wolter and Steve Weiss