69 new of 108 responses total.
I think that "cyberkiller" wawnted to *impart* hacking knowledge to hacker-wanna-be's; I dont think he/she wanted to be taught hacking...
Is he serious?
Anything in this item is for educational and informational purposes only. ;)
What we got here is just 2 to 4 lines of words..... but it makes up to 43 resp...hundred of lines...and lots of personal view....sure wolfg676...very educatinal ...indeed... I think cyberkiller got his/her lesson already...:)
And the lesson is, there isn't anything grexers can't turn in to a lively conversation. ;)
Well, if there are any real "hackers" out there, I need some help figuring out this crusty win95 OS! is ms exchange suppose to come with win95? and some applications won't run it give an error message of "something-or-other .DLL not found" any clue?
Yeah, If you could please help me with my hacking I would appretiate it. I'm trying to change my screen saver from flying windows to flying toasters. Any ideas on how to do it? (hehehe)
Now *that* sounds like a worthwhile project. All I know is that the screen saver in question is in the file Flying Windows.scr in your windows\system directory. It's just a regular exe, renamed to be an scr file. Unfortunately it doesn't seem to have any bitmap resources which you can modify; it must be getting the windows from somewhere else. The best idea I have is to disassemble it and find out what makes it tick, but that's probably a month's work, even if you know assembler.
the Flying Toasters are owned (and no doubt zealously protected) by the makers of the "After Dark" screen saver program. avoid the karaoke version of the toaster screen saver.. aieeee!!
whats up with these flying toasters? What planet are they from? What do they use for fuel? What is their rate of yaw? Do they have overseas flights or just domestic? Get back to me on this cause I need to go see grandmother in Iraq.
Speakin of toasters, does anyone know anything about Video Toasters and what will keep them from working?
Re: #49 What a stitch. She is a hoot.
ref:#51 Hey Mary - I was booked on a flight with flying tigers but canceled it 'cause it has to be a joke. Tigers dont even have wings..........(hehe)
Not a clue.
video toasters are the next step in the evolution of the amiga computer. the species couldn't survive in the computer ecosystem, so it adapted to the video effects ecosystem. computers have since adapted to superiority even in this separate ecosystem, so it appears thast video toasters have to placed on the endangered species list...
The "flying toasters" screen saver is actually a product of a company other than Microsoft.
I'm fond of AfterDark(tm)'s bungee-jumping cows. As a cow bungees from the top of the screen, she goes "MooooooOOOOOOOOooooo!!', before the bungee cord rebounds. Occasionally, a cow's cord will break, and she crashes into a heap of hamburgers and hot dogs at the bottom of the screen.
I like their "Satori" screen saver, though I don't bother much with screen savers these days. I think that EnergyStar and APM have dealt a serious blow to the screen-saver camp.
can you telnet from this pico or from my account here at grex?
Not unless you pay to become a Grex member. Grex is pretty generous about providing e-mail, conferencing, chat (party), etc, but partly because of resource limitations and partly for other reasons most out-bound network services are restricted to members.
Where are the bungee-jumping cows? We've bought two recent After Dark screen saver packages and I don't recall those...
Whatever happened to cyberkiller who started all of this?
re 60: I was referring to an older version, Ken. Perhaps the bungee cows have been discontinued in the current versions. But I hope not.
Leslie and I just searched through our Win95 versions of "After Dark Classics" and "After Dark 4.0." No bungee cows. We are bummed.
You have my sympathies.
Re #61: The author of this item has not logged on since the day he posted it. He may have decided that Grex is not fruitful territory for discussions of the kind he's interested in.
let's not have a moment of silence in honor of that :-)
No amen!
ok...pals.... how about the toasters ?...should we have amen for it ?
Lets just offer up a toast.
Didn't the flying toasters come from a Jefferson Airplane Album? Wasn't Berkely Software sued over it? Isn't that the reason that the toasters found themselves not well suited for even the video effects ecosystem, and so they are now to be found only in the grex drift items ecosystem? <flap flap pop>
lots of things to say on the above I bet Microsoft are doing some serious logging of all that hotmail email, a very popular hang out for all sorts of fringe types on the internet. Hotmail addresses can be traced - in the headers the originating IP address is listed. And if the user of the account is doing some really nasty the ISP that IP address traces to might be of help. Why bother with hacking? 1) Intellectual challenge 2) To warn potential targets before someone less ethical comes along 3) Kudos As stated - depends on the definition of "hack". Do you mean finding the error in the code for the ftp daemon and sneaking a root shell? Or do you mean running a lame script that winnuke's a University's Class B? The former is intelligent, the latter is vandalism. I would have thought Grex would be popular with hackers - free telnet account, a chance to run all sorts of things. Plus what's the security at cyberspace.org like, we don't get chrooted..... Oh, and a fourth reason to hack - to gain employment. i presume groups such as IBM's "ethical" hackers get paid lots of money. I forget the names - because I have v poor memory, but the two guys who set up Apple were both phreakers ( phone system hackers ). Don't know hackers ( white hats ) who come in, impress the sysadmin, tell him of the holes, and then leave, its the "black hats" you need to worry about. mcnally and other - most hackers are "script kiddies", who use "hack in a box" t001z to make an impact. I'm definitely a script kiddie :) and that's that - looks like I joined the conversation too late - just when everythign changed to toaster talk
your comments were interesting, though, and the toaster talk appears to have died down to 0 after my cutting questions in resp:70. My hats off to hackers who can distinguish ethical hacking from the other kind, and who can remain ethical. I learned about hacking at the source of all hacking, the Tech model Railroad Club in the 1960s. yes, I'm old. yes, I'm square. But I am a hacker in the original sense. We didn't have any vandals. We at TMRC are deeply offended that in the popular culture the behavior of people who steal service, break root to read other people's mail, run denial-of-service attacks, deal in stolen passwords and CC numbers, and generally commit hi-tech vandalism, is called hacking. That stuff is all illegal and for a good reason. Hacking is an ethical activity, or at least it was until the media came in and redefined the word to include vandalism.
Lots of script kiddies come to grex to run their scripts, because we are so open. What amazes me is that they see a point in trying to crack a system that has the door open and the welcome mat down.
Last point first. Disappointed to see the script kiddies using GREX as a playground. If I had that kind of time / ability I'd use it to better effect than playing with a useful, friendly free service like GREX.
Steve, The Tech Model Railroad Club? I can't say I've heard of it - please enlighten me, by email if you wish. Hey, old is kewl, that means you have more knowledge. As far as hacking goes, in any sense of the word, I would have thought the older the better, as long as you're up to date with new tech. The speed of youth isn't particularly useful when you've got to solve a problem through knowledge and intuition rather than outright mental speed. All of what you details above, reading mail, DoS, even CC numbers is ethical I think, depending on the situation, the motive and the cause. My history isn't up to scratch, did the media redefine the word, or did the hackers redefine the activity? one last note - I noticed with some sadness that in the recent web coverage of hacking the main feature of many artivles was a survey on the definitions of hacking and cracking - is that as close as we get to debate these days?
/Hackers/, by Steven Levy (New York: Anchor Press/Doubleday, 1984) explains the role of TMRC pretty well. TMRC's web site is at http://www.mit.edu/activities/tmrc/ I was one of the contributors to that site. In particular, I wrote the page at http://www.mit.edu/activities/tmrc/hackers-ref.html which pretty well describes the feelings of us TMRC hackers about the term. "Crackers" was a term invented later in an attempt to deflect all the new meaning that the term "hackers" took on, but did not originally have. I think it failed. Most people do not make this distinction (between hackers and crackers). Follow the link to the new Hacker's Dictionary for the definition they give of the term hacker. I quote definition 8 here for you: 8. [deprecated] A malicious meddler who tries to discover sensitive information by poking around. Hence `password hacker', `network hacker'. The correct term for this sense is cracker. (source http://earthspace.net/jargon/jargon_23.html) And indeed I am a long-time deprecator of that definition, though I don't find "cracker" satisfying. It hasn't worked. I use the term "vandal" now. It doesn't sound like "hacker" and it has all the right connotations (from my point of view).
Hackers by Levy is one book I haven't got. I must get that at some point, presumably out of print by now. I think the reason that "cracker" didn't work is because it was an invented term. The only people who can get away with inventing new language "on purpose" are the mass-media. Otherwise any invented term is seen as an invented term - part of the point of jargon is to exclude those without the appropriate knowledge so if old-definiton hackers want to call "computer vandals" crackers the crackers aren't going to go along with it. Plus in part the definition of hacker from http://www.mit.edu/activities/tmrc/hackers-ref.html applies, ie.:- someone who applies ingenuity to achieve a clever result I thinkt he means are not in dispute, it's just that the ends of hackers, crackers, vandals whatever are seen in different ways by different groups. For example se7en, the hacker who trashes paedophile's PC's, a good end or a bad one? I take that back - sometimes the means aren't ingenuious. Downloading winnuke and throwing it at IRCers is hardly ingenuios. It's a pleasure talking to you srw, and I'm glad I've found GREX. If only to show that I am far too reliant on spell-checkers and word-processors :)
how to hack? www.phonelosers.org
PLA issue #1:
How to Hack a <i forget> BBS
hook and ladder method.
read, laugh, enjoy
ok maybe this is just my opinion but have any 1 actually read the mentors last words this is the only real deffinition of hacking any1 else that soley relies on sombody elses work is nufin but a lamer wether he is being productive or not tell me what u think.
Well, I don't have a lot to add to this, other than to correct Jan's earlier statement that anyone with lots of technical knowledge is immeditaly employable, and that all hackers are derilects who have no good reason to hack. Believe it or not, there are those of us who are poor enough to not have access to cool equipment. I would like to ask you some questions, Jan. (Good lord, I think i am channeling Steve McGarret from Hawaii 5-0 ;-). First, how many 16 year olds do you think know how to administer a UNIX system, or do other things that would make them valuable to an employer? I am sure that a lot of those people who are actually *original* hackers, as opposed to those who copy 8lgm exploits, can. Jan, you made the point that many of the worlds best hackers have come from Russia and former russian republics. Why do you think that so many hackers (and I am talking abou _hackers_, not aol warez or codez kids) are young? If you really want to get rid of hackers, hire them. Second, how many of them do you think would actually get hired by a company, even if they go in and present themselves nicely? There is blatant discriminiation against young members of the technical elite. Don't forget that. Next, why do you assume that everyone has access to systems or software that they need on their own to further their studies? Let's assume that I wanted to learn to program, say, AS-400 systems. I live in Ypsilanti, Michigan, and the local high school has *no* computers for students. (No, i am not really exagerating). What if I want to learn how to use these systems? Well, seeing as how I am not particularly rich, and my parent unit doesn't work in a technical field, I think I am screwed unless I steal some time on a dialup for an As-400 at a plant in Detroit. What does it hurt if it at 1am, the plants not operating, and I don't delete, modify, or even view any of *their* data? Hell will freeze over before I am allowed to (legitately) tweak phone- switches, or even just PBX's or PhoneMail systems. Obviosly, such system experience would make me readily employable, and would ensure that I would be more succesful than my parents. So, what does it hurt if I hack a few AT&T switches? I haven't installed any translation taps yet... (Besides, you seldom hear of young techno-wizzes getting legitimate employment, but I hear stories all the time of hacker/security-types who are my age getting employment in a cool setting... ). Do not lump me in with everyone else. I am a hacker, but I am not "bad." I need to do this to learn, until I can get my internship. My life is a bootstrapping process, and this is what I gotta do to get to the next level. - Andrew Christensen (Hackers, the book by Steven Levy, btw, is not about hackers as you are thinking of them -- it is about those people at MIT who invented chess playing algorithms, the roots of AI, etc...).
Ahem. I forgot to mutter something in my previous post, so here goes: I have seen ads for "online data backup" recently. This seemed like a bad idea as soon as I heard the concept, but that mention of Microsoft searching mail messages at hotmail.com made it pop back to the forefront of my mind. Why in the *world* would *anybody* feel that their data is "secure" if they schlep it over a net connection to some anonymous computer somewhere, anyways? I just don't get that. It would seem that your data is already insecure enough if you *aren't* showing it off to strangers. People were wigging out a couple years ago over the concept of cookies being placed into a directory by certain websites, as they felt it posed a security risk. WHY HAS NO ONE SCREAMED LOUDLY ABOUT THIS?! I dunno.
I'm trying to hack one RedHat linux 4.2. Anyone know how to get it?
Your question is much too vague. There are many different flaws in Linux, many of which can be exploited to allow root access.
Well, Andrew, I am not a hacker in the sense that you are, but rather in the sense that Stephen Levy depicts. These two senses of the word confuse people. I am not happy that people now use the term we used to use for our activities to describe what you do when you break into systems for your own purposes. I respect that you do not do harm, but I don't think that makes it OK.
Well, maybe im a couple of pposts too late, but yeah... windoze actually uses one of the fonts for the sprite in the flying windows saver... there are some commonly avail. debug codes to change the pix. to any of the others; a one byte alteration (since ya only gotta change the offset) ... im new here.. some one mail me! ;)
You all seem to be quite misguided on the purpose of hacking. Why, How and who? I am a sysadmin and have had a great interest for unix, network security. By most standards (The general public) hackers are malicious and negative. We are not. I have bypassed security on my network several times to cheack for holes that could couse my network some trouble. REAL hackers are concered with preserving the time and money that sysadmins put into thier systems. NOT with "deleting stuff" and "hacking webpages". A real hacker is interested is network security as much as he is concered with ethics. I cannot stand it when a "hacker" tied to break root on a server that provides a free service I frown upon him/her. The issue of hackers on grex is not a big one. A bunch of script kiddies will come on and eventually get bored due to "loss of interest." The majority of these "script kiddies" are about 12-14 years old. So all those that write to this board and talk about how "elite" they are and if you want to learn how to hack mail them. Rubish. Dont even talk about this on a public board. Goodbye and Email me if you would like to talk about REAL computer security, though i probly wont have time to read it all, and might only look at some. -vhd-
Hmmmm.... I think it's safe to say that anyone interested in boosting their security knowledge is better off picking up books and reading, not emailing people to ask the age old "how do you hack" question. As for the flying toassters, I seem to remember that when the Bill 'n Opus screen savers came out, there was a sceen saver that had Opus shooting down toasters with a shotgun... They got nabbed for copyright violation though, and they had to pull them off the shelves...
Srw, There is nothing wrong with hacking. Really. To those of you who think hacking (in the intrusion of computers sense) is the root of all evil (no pun intended, and that executing a few commands for the sole sake of getting su privs on a system that belongs to a large corporation is akin to invading your house and raping someone, I suggest that you get a life. Really. I, personally, would * be able to sleep * be able to go on a date * be able to eat, and most importantly * be able to ignore it if some miscreant invaded my companies computers, so long as their intentions were quite obviously harmless (ie, they didn't delete payrolls files, disconnect phonelines, etc.). So, I would like to humbly suggest that all of you holier-than-thou hackers get laid. F'real. On a side note, I totally agree with hc. Occasionally, it is helpful to have someone to ask questions of (source code CAN be really fucking confusing at times), but all in all the best way to learn about security is thru hands on experience (everyone reading this has a computer or access to a computer, so get and install Linux, Free/Open/NetBSD, xFree86, and so on -- they are all, well, FREE). andrew P.S. Heh, cool, didn't know that srw was a tmrc guy! That rocks! Hmm, as I recall, the tmrc'ers were into blueboxing... defend *that*, please.
Hmm... how do you *know* somebody isn't going to cause any harm? Maybe they poke around for hours doing nothing bad, then wipe / just before leaving as a calling card.
Well, here's an example of BORING but HARMLESS. From behaviour like the following it is easy to see that nothing really shitty is going to be done, probably. Of course, if you are REALLY worried, it isn't real hard to get a call traced. I encourage all starch-suits out their to do this and ask the hacker in question what their up to if you feel the need. It is a bit better than calling the fbi into it. user hacks in, changes motd, spends 14 hours in #Boring_Losers_Jerk_Off_here_f'server on mirc, then types who and logs off. This is just an example, fo course. Alternaly, they might do something like run a mathematical c program. I used to do that when I was really young and didn't have legit access to fast computers. But, that rapidly grew boring, so I would usually go see a movie instead of sticking around and doing any har,... Which leads me to my point: besides the TMRC class of hackers, their are two LARGE subsets of "miscreant" hackers. Class 1: Bored kids like myself Class 2: Professionals. See, the way I figure it, class 1 actually helps you boring starch collared types out, by giving your security a boot in the pants. If your info is valuable enough to be worried (to the point of construing it the same way as home invasion) when some bored teen takes a peek at it, then it is damn well valuable enough for competitors with genuinly naughty intents to break into. So, realize this and realize that class 1 hackers help out computer securitys evolution to an extent. Well, I gotta get back to being a starch-collar type now, good bye all.
d00d, if you are really a hacker, don't go around showing off. 'Hey, duuuhhh, I'm a h@(k3r! Wanna know how to do it?' Only tell when asked.
re #90 Why are you so interested in classifying people. There are people who aren't starched shirts & who are in fact in fact radical like myself that think cracking is a bad idea unless it is done for political ends. Just breaking into a system for the hell of it is vandalism IMO. Breaking into a military system to say out how the government wastes our money on killing machines is an act of good conscience IMO. Ofcourse again this is a matter of perspective <shrug>.
"unless it is done for political ends?" HOW THE FUCK does *that* make it OK? If it is vandalism to break into a system and NOT do anything, then it would probably be vandalism too if someone actually changed something. No offense, but that is the worst justification I have heard in a LONG time. And that assesment comes from me, a certified "miscreat." Politics is the absolute worst reason to do damage to a system, for the simple reason that none of us have identical political ideals. While your political views (and mine) tend to lean towards showing off what idiots the people in the pentagon are, someone elses may lean towards showing how they need to institute corporal punishment and prayer in school. How would you and I feel if the Christian Coalition hacked onto the whitehouse webpage and placed their political agenda there? Not so hot, I presume. So, the point is, politics doesn't really justify vandalism, certainly not in this country at least. (Or, is it time for the revolution? ;-) Of course, you are probably thinking of hacking politically in an information gathering sense. That isn't really an option. For instance, in the past I have had call records from the phone switches at military bases. I saw that most of the numbers called were to phone sex lines (yes, I went through and called the numbers I saw listed), BUT if I was to distribute that information (because I am pissed that my tax dollars go towards helping service men jerk off, and I wanted to see it changed), I would be under risk of prosecution for having GOTTEN the information (top secret proprty of the US Gov and all that shit) in the first place, which would suck. So, not a lot can happen this way. (Before you start talking about taking it to the journalists, take a look at the hackers in the media right now and how they are portrayed, and try to imagine a hacker deliberately doing ANYTHINg that would risk him/her being portrated like that). By the way, I can almost promise you that anything interesting in the governments computers is off limits. It was a fluke of luck that got me the phone records, and they didn't really have anything THAT interesting on them -- besides 1-900-Wet-fuck. The governments security (despite what the pentagon claims when they are asking for another billion to improve computer security) is VERY high, at least on the machines that actually have protected information. Well, I am running on a bit, but in part one reason I classified other groups (the starch-shirts) is because one of the starch-suits representative srw "classified" me, which irritates me to no end, cuz I can promise you that I am neither what you saw in the movie Hackers nor WarGames nor Revenge of the Nerds. case in point, I wear neither pocket protectors nor leather pants on a regular basis, and my grades don't normally suck. All told, i think I tend more towards Matthew Broderick as Ferris Buhler than Matther Broderick as David Lightman ;-) So, don't get the wrong image of me: outside of work I don't spend THAT much time in front of the computer. The time i spend AT work is done so that I can get money to do things like travel (gotta visit my girlfriend, who i met over the sidewalk, not over the internet). My computer is about 4 years old. Point being, I am not a nerd in the truly classical sense (hah, betcha didn't know that their *was* such a thing as a classic nerd). Another justification for my classification is the fact that the classifications I made were broad enough to be accurate. The only thing I have done wrong is assume that srw is a starch-shirt. fuckit, this has gone on a bit. i will post now.
i need to learn about hacking through telnet, can you please send me something to explain at earl_steyn@hotmail.com
Is there no end to these cracker-wannabe morons?
well, you had to wait a whole month for my response to that obviously rhetorical question, so I will make it stellar: Nope. (grin)
It was sort-of a rhetorical question. It was really aimed at the idiot who entered this item. :)
tehre is a real diffrence in the culture. hackers dont hamr systems, they go in and they explore, and they are normaly non milicious. the crakcers are the ones that you need to worrk about....... unfortunatly ethere is a treyotype, and that needs to be destroyed
And this all leads back to the source.... cyberkiller "Anyone wanna know how to hack? E-mail me at my elite hotmail account" well, maybe his message was not that idiotic but I feel rather bashing after reading all 97 responses...but I am sitting in a booth running lights for a very boring play....2 hours of talk :( My view on hacking is that hacking in the real terminology as it was once intended is now dead, or really close to death. TMRC is what I think of, and although I am only 16 I totally agree with the TMRC views on hacking. I am not a hacker, but I am into network security, and when I feel the urge to break into a system, I e-mail the admin and ask for permission to hack his system. Most systems I hack are picked out by what software they run and what experience I need. For example, my latest attacks were on a FreeBSD system with Apache and some proxy stuff. I know the admin and have my own shell to the system, and we are good friends now....Friends because I asked if I could try to break into his system. I see nothing wrong with an urge to get into a system, and I know thatpeople don't hire 16 year olds as admins,,,However I am my school network admin. I think that if you do want to hack, ask the admin first, get an ok then try your luck... One you will be better, because you can choose systems that you need practice with, and two you can gain some very good relationships with people. See ya-Mook
the entire thread made an interesting reading. those who feel the same should thank the elite hacker with a hotmail a/c. we need more people like that. :| Mook's idea of asking somebody's permission to hack their system is funny. but really it's a good idea. but not all sysadmins will allow that. not everyone of them is that friendly.
.
dude you are the lamest person in the world, a hotmail account what the hell are you thinking. I bet you have the latest version of sub7 right. ha ha your nothing but a fool.
HAHAHA Does any body here think that it is funny that hacking itself is illegal even if you do not look or mess with anything? The law Invasion of computer privacy lol. Its dumb.
then give me some credit card number!!
Welllll.... I hate to start giving out numbers I hacked so hard for, but here's one I can't use because it's only got another $35,000 left on it: 1234-5678-9012-3456 Expires May 2002.
ha.. ha..ha
you are a classic cyberkiller - hotmail also = crap
>< -- <--- stern look.
You have several choices: