Grex Cyberpunk Conference

Item 67: hacking

Entered by qpqpa on Sat Jan 31 06:04:41 1998:

69 new of 108 responses total.


#40 of 108 by garima on Sat Feb 21 07:15:13 1998:

I think that "cyberkiller" wawnted to *impart* hacking knowledge to
hacker-wanna-be's; I dont think he/she wanted to be taught hacking...


#41 of 108 by lunar on Mon Mar 2 02:51:50 1998:

Is he serious?


#42 of 108 by wolfg676 on Mon Mar 2 08:53:24 1998:

Anything in this item is for educational and informational purposes only.
;)


#43 of 108 by vejiita on Tue Mar 3 04:07:51 1998:

What we got here is just 2 to 4 lines of words.....
but it makes up to 43 resp...hundred of lines...and lots of 
personal view....sure wolfg676...very educatinal ...indeed...
I think cyberkiller got his/her lesson already...:)


#44 of 108 by mta on Wed Mar 4 18:26:32 1998:

And the lesson is, there isn't anything grexers can't turn in to a lively
conversation.  ;)


#45 of 108 by eprom on Sat Mar 7 19:23:55 1998:

Well, if there are any real "hackers" out there, I need some help figuring
out this crusty win95 OS! is ms exchange suppose to come with win95? and
some applications won't run it give an error message of "something-or-other
 .DLL not found" any clue?


#46 of 108 by magnetic on Tue Mar 10 05:08:51 1998:

Yeah,  If you could please help me with my hacking I would appretiate it.
I'm trying to change my screen saver from flying windows to flying toasters.
Any ideas on how to do it? (hehehe)


#47 of 108 by aruba on Tue Mar 10 07:13:04 1998:

Now *that* sounds like a worthwhile project.  All I know is that the screen
saver in question is in the file Flying Windows.scr in your windows\system
directory.  It's just a regular exe, renamed to be an scr file.  Unfortunately
it doesn't seem to have any bitmap resources which you can modify; it must be
getting the windows from somewhere else.  The best idea I have is to 
disassemble it and find out what makes it tick, but that's probably a month's
work, even if you know assembler.


#48 of 108 by mcnally on Tue Mar 10 07:15:12 1998:

  the Flying Toasters are owned (and no doubt zealously protected) by the
  makers of the "After Dark" screen saver program.  avoid the karaoke version
  of the toaster screen saver..  aieeee!!


#49 of 108 by torch on Tue Mar 10 13:17:17 1998:

whats up with these flying toasters?  What planet are they from?  What do they
use for fuel?  What is their rate of yaw?  Do they have overseas flights or
just domestic?  Get back to me on this cause I need to go see grandmother in
Iraq.


#50 of 108 by wolfg676 on Tue Mar 10 18:13:41 1998:

Speakin of toasters, does anyone know anything about Video Toasters and what
will keep them from working?


#51 of 108 by mary on Tue Mar 10 22:57:20 1998:

Re: #49  What a stitch.  She is a hoot.


#52 of 108 by magnetic on Tue Mar 10 23:24:38 1998:

ref:#51 Hey Mary - I was booked on a flight with flying tigers but canceled
it 'cause it has to be a joke.  Tigers dont even have wings..........(hehe)


#53 of 108 by omni on Wed Mar 11 06:32:59 1998:

  Not a clue.


#54 of 108 by other on Wed Mar 11 06:51:35 1998:

video toasters are the next step in the evolution of the amiga computer.
the species couldn't survive in the computer ecosystem, so it adapted to the
video effects ecosystem.  computers have since adapted to superiority even
in this separate ecosystem, so it appears thast video toasters have to placed
on the endangered species list...


#55 of 108 by scott on Wed Mar 11 12:51:50 1998:

The "flying toasters" screen saver is actually a product of a company other
than Microsoft.  


#56 of 108 by tao on Wed Mar 11 15:31:53 1998:

I'm fond of AfterDark(tm)'s bungee-jumping cows.  As a cow bungees from
the top of the screen, she goes "MooooooOOOOOOOOooooo!!', before the
bungee cord rebounds.  Occasionally, a cow's cord will break, and she
crashes into a heap of hamburgers and hot dogs at the bottom of the 
screen.


#57 of 108 by mcnally on Wed Mar 11 18:02:43 1998:

  I like their "Satori" screen saver, though I don't bother much with
  screen savers these days.  I think that EnergyStar and APM have dealt
  a serious blow to the screen-saver camp.


#58 of 108 by magnetic on Thu Mar 12 03:40:26 1998:

can you telnet from this pico  or from my account here at grex?


#59 of 108 by mcnally on Thu Mar 12 04:02:58 1998:

  Not unless you pay to become a Grex member.  Grex is pretty generous
  about providing e-mail, conferencing, chat (party), etc, but partly
  because of resource limitations and partly for other reasons most
  out-bound network services are restricted to members.


#60 of 108 by krj on Thu Mar 12 05:04:39 1998:

Where are the bungee-jumping cows?  We've bought two recent 
After Dark screen saver packages and I don't recall those...


#61 of 108 by okuma on Thu Mar 12 21:46:26 1998:

Whatever happened to cyberkiller who started all of this?


#62 of 108 by tao on Thu Mar 12 23:24:42 1998:

re 60:  I was referring to an older version, Ken.  Perhaps
the bungee cows have been discontinued in the current
versions.  But I hope not.


#63 of 108 by krj on Fri Mar 13 00:43:29 1998:

Leslie and I just searched through our Win95 versions of 
"After Dark Classics" and "After Dark 4.0."  No bungee cows.
We are bummed.


#64 of 108 by tao on Fri Mar 13 14:42:55 1998:

You have my sympathies.


#65 of 108 by remmers on Fri Mar 13 17:42:59 1998:

Re #61: The author of this item has not logged on since the
day he posted it. He may have decided that Grex is not fruitful
territory for discussions of the kind he's interested in.


#66 of 108 by albaugh on Fri Mar 13 18:17:20 1998:

let's not have a moment of silence in honor of that  :-)


#67 of 108 by gibson on Fri Mar 13 18:43:16 1998:

        No amen!


#68 of 108 by vejiita on Sat Mar 21 05:52:32 1998:

ok...pals.... how about the toasters ?...should we have amen for it ?


#69 of 108 by gibson on Sat Mar 21 09:29:15 1998:

        Lets just offer up a toast.


#70 of 108 by srw on Mon Mar 23 03:07:42 1998:

Didn't the flying toasters come from a Jefferson Airplane Album? Wasn't 
Berkely Software sued over it? Isn't that the reason that the toasters 
found themselves not well suited for even the video effects ecosystem, 
and so they are now to be found only in the grex drift items ecosystem?
<flap flap pop>


#71 of 108 by memetics on Sun Apr 5 00:23:13 1998:

lots of things to say on the above

I bet Microsoft are doing some serious logging of all that hotmail email, a
very popular hang out for all sorts of fringe types on the internet.

Hotmail addresses can be traced - in the headers the originating IP address
is listed.  And if the user of the account is doing some really nasty the ISP
that IP address traces to might be of help.

Why bother with hacking?
1) Intellectual challenge
2) To warn potential targets before someone less ethical comes along
3) Kudos

As stated - depends on the definition of "hack".  Do you mean finding the
error in the code for the ftp daemon and sneaking a root shell?  Or do you
mean running a lame script that winnuke's a University's Class B?  The former
is intelligent, the latter is vandalism.

I would have thought Grex would be popular with hackers - free telnet account,
a chance to run all sorts of things.  Plus what's the security at
cyberspace.org like, we don't get chrooted.....

Oh, and a fourth reason to hack - to gain employment.  i presume groups such
as IBM's "ethical" hackers get paid lots of money.

I forget the names - because I have v poor memory, but the two guys who set
up Apple were both phreakers ( phone system hackers ).  Don't know hackers
( white hats ) who come in, impress the sysadmin, tell him of the holes, and
then leave, its the "black hats" you need to worry about.

mcnally and other - most hackers are "script kiddies", who use "hack in a box"
t001z to make an impact.  I'm definitely a script kiddie :)

and that's that - looks like I joined the conversation too late - just when
everythign changed to toaster talk



#72 of 108 by srw on Mon Apr 6 20:46:53 1998:

your comments were interesting, though, and the toaster talk appears to 
have died down to 0 after my cutting questions in resp:70.

My hats off to hackers who can distinguish ethical hacking from the 
other kind, and who can remain ethical. I learned about hacking at the 
source of all hacking, the Tech model Railroad Club in the 1960s. yes, 
I'm old. yes, I'm square. But I am a hacker in the original sense.

We didn't have any vandals. We at TMRC are deeply offended that in the 
popular culture the behavior of people who steal service, break root to 
read other people's mail, run denial-of-service attacks, deal in 
stolen passwords and CC numbers, and generally commit hi-tech vandalism, 
is called hacking. That stuff is all illegal and for a good 
reason. Hacking is an ethical activity, or at least it was until the 
media came in and redefined the word to include vandalism. 


#73 of 108 by srw on Mon Apr 6 20:48:14 1998:

Lots of script kiddies come to grex to run their scripts, because we are 
so open. What amazes me is that they see a point in trying to crack a 
system that has the door open and the welcome mat down.


#74 of 108 by memetics on Wed Apr 15 15:44:05 1998:

Last point first.  Disappointed to see the script kiddies using GREX as a
playground.  If I had that kind of time / ability I'd use it to better
effect than playing with a useful, friendly free service like GREX.



#75 of 108 by memetics on Wed Apr 15 15:50:21 1998:

Steve,

The Tech Model Railroad Club?  I can't say I've heard of it - please enlighten
me, by email if you wish.

Hey, old is kewl, that means you have more knowledge.  As far as hacking goes,
in any sense of the word, I would have thought the older the better, as long
as you're up to date with new tech.  The speed of youth isn't particularly
useful when you've got to solve a problem through knowledge and intuition
rather than outright mental speed.

All of what you details above, reading mail, DoS, even CC numbers is ethical
I think, depending on the situation, the motive and the cause.

My history isn't up to scratch, did the media redefine the word, or did the
hackers redefine the activity?

one last note - I noticed with some sadness that in the recent web coverage
of hacking the main feature of many artivles was a survey on the definitions
of hacking and cracking - is that as close as we get to debate these days?



#76 of 108 by srw on Thu Apr 16 03:02:01 1998:

/Hackers/, by Steven Levy (New York: Anchor Press/Doubleday,
1984)  explains the role of TMRC pretty well. 
TMRC's web site is at http://www.mit.edu/activities/tmrc/
I was one of the contributors to that site. In particular, I wrote the 
page at http://www.mit.edu/activities/tmrc/hackers-ref.html which pretty 
well describes the feelings of us TMRC hackers about the term. 

"Crackers" was a term invented later in an attempt to deflect all the 
new meaning that the term "hackers" took on, but did not originally 
have. I think it failed. Most people do not make this distinction 
(between hackers and crackers). Follow the link to the new Hacker's 
Dictionary for the definition they give of the term hacker. I quote 
definition 8 here for you:

8. [deprecated] A malicious meddler who tries to discover sensitive 
information by poking around. Hence `password hacker', `network hacker'. 
The correct term for this sense is cracker. 

(source http://earthspace.net/jargon/jargon_23.html)

And indeed I am a long-time deprecator of that definition, though I 
don't find "cracker" satisfying. It hasn't worked. I use the term 
"vandal" now. It doesn't sound like "hacker" and it has all the right 
connotations (from my point of view).


#77 of 108 by memetics on Tue Apr 21 17:05:52 1998:

Hackers by Levy is one book I haven't got.  I must get that at some point,
presumably out of print by now.

I think the reason that "cracker" didn't work is because it was an invented
term.  The only people who can get away with inventing new language "on
purpose" are the mass-media.  Otherwise any invented term is seen as an
invented term - part of the point of jargon is to exclude those without the
appropriate knowledge so if old-definiton hackers want to call "computer
vandals" crackers the crackers aren't going to go along with it.  Plus in part
the definition of hacker from
http://www.mit.edu/activities/tmrc/hackers-ref.html applies, ie.:-

someone who applies ingenuity to achieve a clever result

I thinkt he means are not in dispute, it's just that the ends of hackers,
crackers, vandals whatever are seen in different ways by different groups.
For example se7en, the hacker who trashes paedophile's PC's, a good end or
a bad one?

I take that back - sometimes the means aren't ingenuious.  Downloading winnuke
and throwing it at IRCers is hardly ingenuios.

It's a pleasure talking to you srw, and I'm glad I've found GREX.  If only
to show that I am far too reliant on spell-checkers and word-processors :)



#78 of 108 by junk on Sat May 9 18:08:39 1998:

how to hack?  www.phonelosers.org
PLA issue #1:
      How to Hack a <i forget> BBS
hook and ladder method.
read, laugh, enjoy


#79 of 108 by cytex on Tue May 19 12:34:28 1998:

ok maybe this is just my opinion but have any 1 actually read the mentors last
words this is the only real deffinition of hacking any1 else that soley relies
on sombody elses work is nufin but a lamer wether he is being productive or
not tell me what u think.


#80 of 108 by morpheus on Sun May 24 22:13:05 1998:

Well, I don't have a lot to add to this, other than to correct Jan's 
earlier statement that anyone with lots of technical knowledge is 
immeditaly employable, and that all hackers are derilects who have no 
good reason to hack. Believe it or not, there are those of us who are 
poor enough to not have access to cool equipment.

I would like to ask you some questions, Jan. (Good lord, I think i am 
channeling Steve McGarret from Hawaii 5-0 ;-).

First, how many 16 year olds do you think know how to administer a UNIX 
system, or do other things that would make them valuable to an 
employer? I am sure that a lot of those people who are actually 
*original* hackers, as opposed to those who copy 8lgm exploits, can. 
Jan, you made the point that many of the worlds best hackers have come 
from Russia and former russian republics. Why do you think that so many 
hackers (and I am talking abou _hackers_, not aol warez or codez kids) 
are young? If you really want to get rid of hackers, hire them.

Second, how many of them do you think would actually get hired by a 
company, even if they go in and present themselves nicely? There is 
blatant discriminiation against young members of the technical elite. 
Don't forget that.

Next, why do you assume that everyone has access to systems or software 
that they need on their own to further their studies? Let's assume that 
I wanted to learn to program, say, AS-400 systems. I live in Ypsilanti, 
Michigan, and the local high school has *no* computers for students. 
(No, i am not really exagerating). What if I want to learn how to use 
these systems? Well, seeing as how I am not particularly rich, and my 
parent unit doesn't work in a technical field, I think I am screwed 
unless I steal some time on a dialup for an As-400 at a plant in 
Detroit. What does it hurt if it at 1am, the plants not operating, and 
I don't delete, modify, or even view any of *their* data?

Hell will freeze over before I am allowed to (legitately) tweak phone-
switches, or even just PBX's or PhoneMail systems. Obviosly, such 
system experience would make me readily employable, and would ensure 
that I would be more succesful than my parents. So, what does it hurt 
if I hack a few AT&T switches? I haven't installed any translation taps 
yet...

(Besides, you seldom hear of young techno-wizzes getting legitimate 
employment, but I hear stories all the time of hacker/security-types 
who are my age getting employment in a cool setting... ).

Do not lump me in with everyone else. I am a hacker, but I am not 
"bad." I need to do this to learn, until I can get my internship. My 
life is a bootstrapping process, and this is what I gotta do to get to 
the next level. 

- Andrew Christensen

(Hackers, the book by Steven Levy, btw, is not about hackers as you are 
thinking of them -- it is about those people at MIT who invented chess 
playing algorithms, the roots of AI, etc...).


#81 of 108 by morpheus on Mon May 25 07:06:31 1998:

Ahem. I forgot to mutter something in my previous post, so here goes:

I have seen ads for "online data backup" recently. This seemed like a 
bad idea as soon as I heard the concept, but that mention of Microsoft 
searching mail messages at hotmail.com made it pop back to the 
forefront of my mind. Why in the *world* would *anybody* feel that 
their data is "secure" if they schlep it over a net connection to some 
anonymous computer somewhere, anyways? I just don't get that.

It would seem that your data is already insecure enough if you *aren't* 
showing it off to strangers. People were wigging out a couple years ago 
over the concept of cookies being placed into  a directory by certain 
websites, as they felt it posed a security risk. WHY HAS NO ONE 
SCREAMED LOUDLY ABOUT THIS?! I dunno.


#82 of 108 by kur on Thu Jun 11 20:02:16 1998:

I'm trying to hack one RedHat linux 4.2.  Anyone know how to get it?


#83 of 108 by morpheus on Sat Jun 13 15:28:31 1998:

Your question is much too vague.

There are many different flaws in Linux, many of which can be exploited 
to allow root access.


#84 of 108 by srw on Mon Jul 6 05:57:35 1998:

Well, Andrew, I am not a hacker in the sense that you are, but rather in the
sense that Stephen Levy depicts. These two senses of the word confuse people.
I am not happy that people now use the term we used to use for our activities
to describe what you do when you break into systems for your own purposes.

I respect that you do not do harm, but I don't think that makes it OK.


#85 of 108 by novocain on Tue Jul 7 15:33:02 1998:

Well, maybe im a couple of pposts too late, but yeah... windoze actually uses
one of the fonts for the sprite in the flying windows saver... there are some
commonly avail. debug codes to change the pix. to any of the others; a one
byte alteration (since ya only gotta change the offset) ... im new here.. some
one mail me! ;)


#86 of 108 by vhd on Tue Oct 20 19:55:34 1998:

        You all seem to be quite misguided on the purpose of hacking.  Why,
How and who?  I am a sysadmin and have had a great interest for unix, network
security.  By most standards (The general public) hackers are malicious and
negative.  We are not.  I have bypassed security on my network several times
to cheack for holes that could couse my network some trouble.  REAL hackers
are concered with preserving the time and money that sysadmins put into thier
systems.  NOT with "deleting stuff" and "hacking webpages".  A real hacker
is interested is network security as much as he is concered with ethics.  I
cannot stand it when a "hacker" tied to break root on a server that provides
a free service I frown upon him/her.  The issue of hackers on grex is not a
big one.  A bunch of script kiddies will come on and eventually get bored due
to "loss of interest."  The majority of these "script kiddies" are about 12-14
years old.  So all those that write to this board and talk about how "elite"
they are and if you want to learn how to hack mail them.  Rubish.  
Dont even talk about this on a public board.  Goodbye and Email me if you
would like to talk about REAL computer security, though i probly wont have
time to read it all, and might only look at some.  

-vhd-


#87 of 108 by hc on Wed Oct 21 12:53:34 1998:

Hmmmm.... I think it's safe to say that anyone interested in boosting their
security knowledge is better off picking up books and reading, not emailing
people to ask the age old "how do you hack" question.  As for the flying
toassters, I seem to remember that when the Bill 'n Opus screen savers came
out, there was a sceen saver that had Opus shooting down toasters with a
shotgun... They got nabbed for copyright violation though, and they had to
pull them off the shelves...


#88 of 108 by morpheus on Sun Nov 8 03:48:16 1998:

Srw,

There is nothing wrong with hacking. Really.

To those of you who think hacking (in the intrusion of computers sense) 
is the root of all evil (no pun intended, and that executing a few 
commands for the sole sake of getting su privs on a system that belongs 
to a large corporation is akin to invading your house and raping 
someone, I suggest that you get a life. Really.

I, personally, would 

 * be able to sleep
 * be able to go on a date
 * be able to eat, and most importantly
 * be able to ignore it

if some miscreant invaded my companies computers, so long as their 
intentions were quite obviously harmless (ie, they didn't delete 
payrolls files, disconnect phonelines, etc.).

So, I would like to humbly suggest that all of you holier-than-thou 
hackers get laid. F'real.

On a side note, I totally agree with hc. Occasionally, it is helpful to 
have someone to ask questions of (source code CAN be really fucking 
confusing at times), but all in all the best way to learn about 
security is thru hands on experience (everyone reading this has a 
computer or access to a computer, so get and install Linux, 
Free/Open/NetBSD, xFree86, and so on -- they are all, well, FREE).

andrew

P.S.
Heh, cool, didn't know that srw was a tmrc guy! That rocks! Hmm, as I 
recall, the tmrc'ers were into blueboxing... defend *that*, please.


#89 of 108 by scott on Sun Nov 8 13:21:42 1998:

Hmm... how do you *know* somebody isn't going to cause any harm?  Maybe they
poke around for hours doing nothing bad, then wipe / just before leaving as
a calling card.


#90 of 108 by morpheus on Mon Nov 9 00:02:04 1998:

Well, here's an example of BORING but HARMLESS. From behaviour like the
following it is easy to see that nothing really shitty is going to be
done, probably. Of course, if you are REALLY worried, it isn't real hard
to get a call traced. I encourage all starch-suits out their to do this
and ask the hacker in question what their up to if you feel the need. It
is a bit better than calling the fbi into it.

user hacks in, changes motd, spends 14 hours in
#Boring_Losers_Jerk_Off_here_f'server on mirc, then types who and logs
off.

This is just an example, fo course.

Alternaly, they might do something like run a mathematical c program.

I used to do that when I was really young and didn't have legit access
to fast computers.

But, that rapidly grew boring, so I would usually go see a movie instead
of sticking around and doing any har,...

Which leads me to my point: besides the TMRC class of hackers, their are
two LARGE subsets of "miscreant" hackers.

Class 1: Bored kids like myself
Class 2: Professionals.

See, the way I figure it, class 1 actually helps you boring starch
collared types out, by giving your security a boot in the pants. If your
info is valuable enough to be worried (to the point of construing it the
same way as home invasion) when some bored teen takes a peek at it, then
it is damn well valuable enough for competitors with genuinly naughty
intents to break into. So, realize this and realize that class 1 hackers
help out computer securitys evolution to an extent.

Well, I gotta get back to being a starch-collar type now, good bye all.


#91 of 108 by jimdagem on Mon Nov 9 01:45:48 1998:

d00d, if you are really a hacker, don't go around showing off.  'Hey, duuuhhh,
I'm a h@(k3r!  Wanna know how to do it?'  Only tell when asked.


#92 of 108 by raven on Wed Nov 11 01:04:02 1998:

re #90 Why are you so interested in classifying people.  There are people
who aren't starched shirts & who are in fact in fact radical like myself
that think cracking is a bad idea unless it is done for political ends.
Just breaking into a system for the hell of it is vandalism IMO.  Breaking
into a military system to say out how the government wastes our money
on killing machines is an act of good conscience IMO.  Ofcourse again
this is a matter of perspective <shrug>.


#93 of 108 by morpheus on Wed Nov 11 06:05:30 1998:

"unless it is done for political ends?" HOW THE FUCK does *that* make 
it OK? If it is vandalism to break into a system and NOT do anything, 
then it would probably be vandalism too if someone actually changed 
something. No offense, but that is the worst justification I have heard 
in a LONG time. And that assesment comes from me, a certified 
"miscreat."

Politics is the absolute worst reason to do damage to a system, for the 
simple reason that none of us have identical political ideals. While 
your political views (and mine) tend to lean towards showing off what 
idiots the people in the pentagon are, someone elses may lean towards 
showing how they need to institute corporal punishment and prayer in 
school. How would you and I feel if the Christian Coalition hacked onto 
the whitehouse webpage and placed their political agenda there? Not so 
hot, I presume. So, the point is, politics doesn't really justify 
vandalism, certainly not in this country at least. 

(Or, is it time for the revolution? ;-)

Of course, you are probably thinking of hacking politically in an 
information gathering sense. That isn't really an option. For instance, 
in the past I have had call records from the phone switches at military 
bases. I saw that most of the numbers called were to phone sex lines 
(yes, I went through and called the numbers I saw listed), BUT if I was 
to distribute that information (because I am pissed that my tax dollars 
go towards helping service men jerk off, and I wanted to see it 
changed), I would be under risk of prosecution for having GOTTEN the 
information (top secret proprty of the US Gov and all that shit) in the 
first place, which would suck. So, not a lot can happen this way. 
(Before you start talking about taking it to the journalists, take a 
look at the hackers in the media right now and how they are portrayed, 
and try to imagine a hacker deliberately doing ANYTHINg that would risk 
him/her being portrated like that). 

By the way, I can almost promise you that anything interesting in the 
governments computers is off limits. It was a fluke of luck that got me 
the phone records, and they didn't really have anything THAT 
interesting on them --  besides 1-900-Wet-fuck. The governments 
security (despite what the pentagon claims when they are asking for 
another billion to improve computer security) is VERY high, at least on 
the machines that actually have protected information. 

Well, I am running on a bit, but in part one reason I classified other 
groups (the starch-shirts) is because one of the starch-suits 
representative srw "classified" me, which irritates me to no end, cuz I 
can promise you that I am neither what you saw in the movie Hackers nor 
WarGames nor Revenge of the Nerds. case in point, I wear neither pocket 
protectors nor leather pants on a regular basis, and my grades don't 
normally suck. All told, i think I tend more towards Matthew Broderick 
as Ferris Buhler than Matther Broderick as David Lightman ;-) So, don't 
get the wrong image of me: outside of work I don't spend THAT much time 
in front of the computer. The time i spend AT work is done so that I 
can get money to do things like travel (gotta visit my girlfriend, who 
i met over the sidewalk, not over the internet). My computer is about 4 
years old. Point being, I am not a nerd in the truly classical sense 
(hah, betcha didn't know that their *was* such a thing as a classic 
nerd). 

Another justification for my classification is the fact that the 
classifications I made were broad enough to be accurate. The only thing 
I have done wrong is assume that srw is a starch-shirt.

fuckit, this has gone on a bit. i will post now.


#94 of 108 by freeze0 on Sat Mar 27 16:09:58 1999:

i need to learn about hacking through telnet, can you please send me something
to explain  at earl_steyn@hotmail.com



#95 of 108 by scott on Sat Mar 27 17:25:06 1999:

Is there no end to these cracker-wannabe morons?


#96 of 108 by morpheus on Mon Apr 26 02:47:27 1999:

well, you had to wait a whole month for my response to that obviously
rhetorical question, so I will make it stellar:
Nope.
(grin)


#97 of 108 by scott on Mon Apr 26 18:01:04 1999:

It was sort-of a rhetorical question.  It was really aimed at the idiot who
entered this item.  :)


#98 of 108 by detcom on Mon May 31 06:46:49 1999:

tehre is a real diffrence in the culture. hackers dont hamr systems, they go
in and they  explore, and they are normaly non milicious. the crakcers are
the ones that you need to worrk about....... unfortunatly ethere is a
treyotype, and that needs to be destroyed


#99 of 108 by mook on Sun Nov 7 04:00:19 1999:

And this all leads back to the source....
cyberkiller "Anyone wanna know how to hack?  E-mail me at my elite hotmail
account" 
well, maybe his message was not that idiotic but I feel rather bashing after
reading all 97 responses...but I am sitting in a booth running lights for a
very boring play....2 hours of talk :(
My view on hacking is that hacking in the real terminology as it was once
intended is now dead, or really close to death.  TMRC is what I think of, and
although I am only 16 I totally agree with the TMRC views on hacking.
I am not a hacker, but I am into network security, and when I feel the urge
to break into a system, I e-mail the admin and ask for permission to hack his
system.  Most systems I hack are picked out by what software they run and what
experience I need.  For example, my latest attacks were on a FreeBSD system
with Apache and some proxy stuff.  I know the admin and have my own shell to
the system, and we are good friends now....Friends because I asked if I could
try to break into his system.  I see nothing wrong with an urge to get into
a system, and I know thatpeople don't hire 16 year olds as admins,,,However
I am my school network admin.  I think that if you do want to hack, ask the
admin first, get an ok then try your luck... One you will be better, because
you can choose systems that you need practice with, and two you can gain some
very good relationships with people.

See ya-Mook



#100 of 108 by eronius on Wed Jan 19 08:11:11 2000:

the entire thread made an interesting reading. those who feel the same should
thank the elite hacker with a hotmail a/c. we need more people like that. :|
Mook's idea of asking somebody's permission to hack their system is funny.
but really it's a good idea. but not all sysadmins will allow that. not
everyone of them is that friendly.


#101 of 108 by pwdfile on Sat Feb 5 15:40:21 2000:

 . 


#102 of 108 by d1abl0s on Wed Sep 27 16:35:53 2000:

dude you are the lamest person in the world, a hotmail account what the hell
are you thinking. I bet you have the latest version of sub7 right. ha ha your
nothing but a fool.


#103 of 108 by manthac on Fri Dec 29 18:53:59 2000:

HAHAHA


Does any body here think that it is funny that hacking itself is  illegal even
if you do not look or mess with anything? The law Invasion of computer privacy
lol.  Its dumb.


#104 of 108 by cholist on Wed Jan 10 15:16:56 2001:

then give me some credit card number!!


#105 of 108 by scott on Wed Jan 10 19:06:55 2001:

Welllll.... I hate to start giving out numbers I hacked so hard for, but
here's one I can't use because it's only got another $35,000 left on it:
1234-5678-9012-3456
Expires May 2002.


#106 of 108 by cholist on Thu Jan 11 18:33:14 2001:

ha.. ha..ha


#107 of 108 by snipher on Wed Jan 17 04:22:57 2001:

you are a classic cyberkiller - hotmail also = crap


#108 of 108 by happyboy on Wed Jan 17 12:12:52 2001:

><
--  <--- stern look.


There are no more items selected.

You have several choices: