Security Information |
|
What is Hacking? Are You a Hacker?
WHAT IS HACKING? Hacking, sometimes known as "computer crime" has only recently been taken very seriously. The activities undertaken by the real hackers have been criminalized and they are now being legally persecuted on a scale disproportional to the actual threat they pose. For those who don't know better, a hacker, by wrong-definition, can be anything from a computer-user to someone who destroys everything they can get their evil terminals into. Real hackers want their motivations and ethics to be viewed as legitimate, or at least understood, instead of being simply written off as malicious, vandalising, thieving, terrorist out to take over the computers of the world for personal gain, or devious teenagers who have nothing better to do than crash every available computer. It is thanks to the mass media and people who have absolutely no understanding of computers, who use terms like "information superhighways", "IT", and "computer crime" to try and make themselves sound important that it is assumed all "hackers" (the good and the bad) fit the above descriptions. There are people who do stuff like the above but they ARE NOT real hackers, They buy the magazine "2600" and they ask questions. They do not want knowledge. They do not want to learn how things work, they do not want to explore. All They want to know is the answer to their damn questions, they are not real hackers. They are the real criminals and are the threat to every appliance connected to the Internet, they destroy, steal and mess up the flow of information then let the real hackers take the blame! Hacking IS NOT about the mindless idiotic destruction of files and/or crashing systems intentionally. Real hackers have an ethical code of practice, which includes things such as: ☞ Leave a system in the state it was found. Real hackers are enraged when so called "hackers" cause damage to or compromise resources. Hacking is about looking for answers and knowledge, it is about learning. That's why hackers hack, to search around inside a place they have never been, to explore all the little nooks and crannies of a world so unlike the boring cess-pool they live in. Their aim is to rise above the rest, and then to pull everyone else up to the same new level. Real hackers justify accessing computer systems by claiming that it is not unfair to break into otherwise idle computer resources and to download files with the intent to learn. The already terrible reputation carried by the real hackers is cased by the ignorant and stupid people who like the label of "hacker" that screw things up, mainly though the destruction of stored information and or all passable activities of computer related fraud. For those who don't know better it is thanks to the mass Media who have blown it way out of proportion. A hacker, by wrong-definition, can be anything from a computer-user to someone who destroys everything they can get their evil terminals into. And the people who have absolutely no understanding of computers, who use terms like "information superhighways", IT, and computer crime to try and make themselves sound important that it is assumed all hackers are malicious, vandalising, thieving, terrorist out to take over the computers of the world for personal gain. There are people who do stuff like the above but they ARE NOT real hackers, They buy the magazine "2600" and they ask questions. They do not want knowledge. They do not want to learn how things work, they do not want to explore. All They want to know is the answer to their damn questions, they are not real hackers. They are the real criminals and are the threat to every appliance connected to the Internet, they destroy, steal and mess up the flow of information and let the real hackers take the blame! Hacking IS NOT about the mindless idiotic destruction of files and / or crashing systems intentionally. Hacking is about looking, searching for answers and knowledge, it is about learning, satisfying their curiosity. That's why they get into the system, to search around inside a place they've never been, to explore all the little nooks and crannies of a world so unlike the boring cess-pool they live in. They seek to rise above the rest, and then to pull everyone else up to the same new level. Why destroy that which they love? To take away someone else's chance to succeed in getting in as he did? To fuel an already terrible reputation and increase their chances of getting caught and thus have their lives and careers effectively ruined? IT IS ILLOGICAL! The real problems are caused by the ignorant and stupid people who like the label of "hacker" that screw thing up by destroying everything they can get their evil terminals into. It is thanks to the mass Media and people who have absolutely no understanding of computers, who use terms like "information superhighways", IT, and computer crime to try and make themselves sound important that it is assumed all hackers are malicious, vandalising, thieving, terrorist out to take over the computers of the world for personal gain. ARE YOU A HACKER? Too identify users who like the label of "hacker". Even as I type this they are dammaging the already terrible reputation carried by the real hackers. This file is meant to help these people who are not helping the movement by pointing out the errors of their ways! What is that you say, "but I am a "badass" hacker". Just ask your self whether any of the following descriptions sound like you, if so then you are part of the problem!. You have been surfing the net, and you laugh at those media reports of the information superhighways. You have a red box. You do not have to pay for phone calls. You have crackerjack, and you have run it on the password file at a Unix on which you have an account. Your computer knowledge has impressed everyone at your school, you are the one the teachers ask for help. Am I getting warmer? Or may be you are one of the free loaders. There are thousands of you out there. You buy 2600 and you ask questions. You read phrack and you ask questions. You join #hack and you ask questions. What is that you say, "what is wrong with that? After all, to be a hacker is to question things, is it not?" Nevertheless, you do not want knowledge. You want answers. You do not want to learn how things work. You only want answers. You do not want to explore. All you want to know is the answer to your damn questions. Dose this sound like you? Or if not the above you are what I refer to as a non event. You read 5% of 5 or 10 of the hacking FAQs and or tutorial files. You no not fully understand the essentials of hacking. Or the reasons for cacking. You have never heard of social engineering or if you have you think it is not important. You think the world of computers and security opens up to you through a keyboard and your redbox. In short you know nothing. You are brain dead, but you see your self as a master mind criminal. You brag about you hacking factices. You make it up as you go along. You lie over any and all the BBS you can. Dose any of this sound like you? If so you are not a hacker. You are a little child. It is thanks to you morons that get bested whilst destroying everything you can get your evil terminals into that the established order (governments, companions, the mass Media etcetera) assume all hackers are like you, malicious, vandalising, thieving, terrorist out to take over the computers of the world for personal gain or are devious teenagers who have nothing better to do than crash every available computer. Nothing could be feather from the truth! You enrage the real hackers when you cause damage or compromise resources. You do not understand the damage you inflect When you bring down a system you take away from everyone the chance to succeed in getting in, you take away that which all real hackers have come to love more that live itself!. Hacking is about looking for knowledge. It is about learning. That's why hackers hack, to search around inside a place they have never been. To explore all the little nooks and crannies of a world so unlike the boring cess-pool they live in. To increase the flow of information and knowledge, so that Everyone can learn and benefit. WHAT IS A HACKER? More times that I can remember, someone has asked me the question "Just what exactly is a hacker?" For those who don't know better. A hacker can be anything from someone who makes furniture with an axe; (by wrong-definition) A computer-user; An expert at a particular programme; An expert or enthusiast of any kind; but the most wide spread application of the term is to describe someone who destroys everything into which he/she can get their evil terminals. This is true to such an extent that if I were to say to just about anyone (that has not being leaving on the moon since 1982) "I am a hacker", it would immediately be assumed that I am a criminal, a malicious, vandalising, a thieving terrorist, a little shit out to take over the computers of the world for personal gain, or some thing along those lines. For this we have the wanabes and the mass Maida to blame! What I consider a hacker to be is a person who is self motivated and besotted with exploring the details of programmable systems, a person who loves the intellectual challenge of creatively overcoming or circumventing limitations, and uses that knowledge to continue the fight for freedom of knowledge and information, a person who wants to know everything and most importantly a *real* hacker lives by the "hacker ethic" (the belief that information-sharing is a powerful positive and good thing), and whom follows an ethical code of practice (that typically includes things such as, Leave a system in the state it was found; Do not intentionally destroy or modify anyone else's data; Do not cause any legitimate user problems with computer resources; Do not access emergency services computers; etcetera) Their motivations for hacking (the activities of a hacker) are generally to learn more about any think that can help them understand more about the way the would works, fore example how computer systems work by making them do things they were never intended to do and/or to challenge security measures. This is my own definition of what the "normative" boundary markers of *real* hackers are. All real hackers tend to meat the majority of these criteria. However, this is by no means universal, like plants, there are many breads of hacker, most of which are out to achieve that same ends, the ones that do not meat any, or the ones the do all the above, but are intent on destruction are *NOT* hackers, most likely they are the wanabes. See my FAQ "ARE YOU A HACKER?" for more about them. Now, who are the *real* hackers, whatever their motives they tend to share an, unbridled intimacy and total affinity for their life stilly, they are the ones who are so deeply consumed by learning computer science, cacking, programming, social engineering, boxing, scanning, etcetera, that it means more to them than the feeling that they experienced at the flash point of their first love, for some it is the ultimate buzz like heroin, for many to hack, to get access to a system and escape into the binary world, is to engage in sexual intercourse. Again this is by no means universal, there are those that merely enjoy it, and the ones that find it a pain. The people that do not in *ANY* *WAY* reflect the above may be real hackers, but finding an elite hacker whom dose not is rare. If you are a real hacker, like it or not, you are a revolutionary and know it or not every thing you do is in some way connected to your search for the truth, because although to be a hacker is to question things hacking its not about asking questions. It is simply about finding the truth because they must be able to choose for themselves, what ever the consequences, it is their right to have some say it their fate. No one can be told what the truth is, as it is different for everyone, it is an idea, it is simply sufficient information and experience to allow a person to tell for min/her self. It is not an answer that hackers seek but rather the truth is learnt from the path that each hacker takes to gain experience, which is simply the search for knowledge. I genuinely do not know what the purpose of this file is, maybe someone somewhere will read it, and know more about the truth concerning hackers. Not the lies of the ignorant! I am the website administrator of the The Wandle Industrial Museum (http://www.wandle.org). Established in 1983 by local people determined to ensure that the history of the valley was no longer neglected but enhanced awareness its heritage for the use and benefits of the community.
MORE RESOURCES: Homeland Security Department to Release New A.I. Guidance The New York Times Officials detail increased D.C. security for certification, inauguration The Washington Post U.S. ambassador bashes Mexico’s security efforts. Mexico’s president pushes back Los Angeles Times Opinion | Trump’s national security wrecking crew The Washington Post Brief altercation between fans mars France-Israel soccer match despite heavy security The Associated Press St. Francis Seraph hires security guards for Christmas, Nativity display visitors as crowds still plague area WCPO 9 Cincinnati Video: How The Fortinet Security Fabric Is Combatting Cybersecurity Threats And Talent Shortage Channel Insider The Fastest Airport Security Line You Don’t Know About The Wall Street Journal The campus will be closed to anyone who is not a student, faculty or staff member. WVTM13 Birmingham Do Titans QB, Coach Have Job Security? Sports Illustrated Tuskegee president releases security updates following shooting WIAT - CBS42.com Homeland Security Department releases framework for using AI in critical infrastructure The Associated Press The UN cybercrime convention threatens security research. The US should do something about it CyberScoop France draws with Israel in high-security operation to reach Nations League quarterfinals with Italy The Associated Press Endpoint Security from BlackBerry BlackBerry Tuskegee University Shifts Security, Facilities Leadership Tuskegee University 3rd Annual U.S.-Mexico Defense and Security Roundtable smallwarsjournal Ambridge Area School District makes security changes CBS Pittsburgh France-Israel Soccer Match is Overshadowed by Amsterdam Attack The New York Times Akamai: 84% of security professionals experienced an API security incident in the past year SecurityInfoWatch ‘We’re just a target’: Pickleball players call for more security - Camas Washougal Post Record ‘We’re just a target’: Pickleball players call for more security Camas Washougal Post Record ESA opens registration for 2024 Town Hall Broadcast SecurityInfoWatch Tom Homan, Trump’s ‘Border Czar,’ on Border Security The New York Times Trump’s National Security Team Keeps Getting More Extreme The New Republic Linn County’s Food for Health pilot program aims to improve food security, support local economy KEZI TV South Florida campus security officer arrested after attempting to meet minor for sex WPBF West Palm Beach New infosec products of the week: November 15, 2024 Help Net Security Trump names Florida’s Rep. Mike Waltz as national security adviser Nebraska Examiner Mexican Officials Arrest Top Security Official in Mayor’s Beheading The New York Times Silverfort Buys Rezonate to Fortify Identity Security Muscle BankInfoSecurity.com Rand Paul Will Continue His COVID-19 Investigations From Atop the Senate Homeland Security Committee Reason NIST report on hardware security risks reveals 98 failure scenarios Help Net Security Lamar CISD invests in safety, security amid rapid growth Community Impact Trump Picks Kristi Noem for Homeland Security Secretary The New York Times 11/14/24 National Security and Korean News and Commentary smallwarsjournal Microsoft Patch Tuesday, November 2024 Edition Krebs on Security Mexico’s ‘hugs, not bullets’ security strategy has failed, says US Ambassador Ken Salazar Mexico News Daily Security guard turned gunman: Christopher Farrell's fatal rampage in downtown San Diego - CBS News 8 Who Is Michael Waltz, Trump’s Pick to Be National Security Adviser? The New York Times Federal officials warn Boston churches to increase security after wave of arson attacks CatholicVote org Arizona governor pledges work with Trump to secure the border Arizona's Family ASIS, International Protective Security Board Sign Memorandum of Understanding Security Sales & Integration |
RELATED ARTICLES
IPv6 - Next Step In IP Security IPv6, IntroductionThe high rate at wich the internet continualy evolves forced the Internet Engineering Task Force(IETF) to find IP solutions to handle the grouth. Designed to handle the fast paced growth of the Internet, the IPv6 (Internet Protocol version 6) is the new version that will replace the widely used IPv4(Internet Protocol version 4) which is already obsolete. Free Ways to Tackle Threats to Your Computer Protect Your PCHaving problems with your pc?Do your kids, family or friends fill it with all the stuff they find on the internet?Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You wouldn't fill your car up with petrol from an old rusty can with a layer of dirty water on the bottom, so you shouldn't allow your pc to be treated that way either. Top 10 tips for Safe Internet Shopping Over £5 billion pounds was spent on online shopping in 2004. The Internet was the fastest growing retail sector last year, attracting one in four shoppers. Identity Theft - Beware of Phishing Attacks! "Dear Bank of the West customer", the message begins. I've just received an e-mail message, purportedly from the security department at the Bank of the West. 3 Things You Must Know About Spyware 1)Spyware is on your system. Like it or not, statistically speaking, you probably have spyware on your machine right now. Free Spyware Removal - Its Not As Easy As It Sounds Nobody wants to pay to remove spyware. At the very least, I don't. A Personal Experience with Identity Theft Some months ago, before there was much publicity regarding phishing and identity theft, I became a victim.My first inkling that I'd been scammed came from a telephone call from my bank asking if I had been to Italy or Roumania. Make Money Online - Defend Against The Latest Scam First, let's do a little recap'. As I stated in the first part of the article, "Make Money Online - The Latest Scam Disclosed", "refund policy scammers" affect the websites that make money online by selling digital products by buying the product and asking for refunds, while keeping the product. Phishing: A Scary Way of Life The Federal Bureau of Investigation has identified "phishing" as the "hottest and most troubling new scam on the Internet."What is Phishing?Phishing is a scam initiated via e-mail. Internet Small Business and Fraud Be careful of sites that promise to send you "instant pins". These companies usually have lax credit card security and can afford customer charge backs from fraudulent transactions. Identity Theft - Dont Blame The Internet Identity theft - also known as ID theft, identity fraud and ID fraud - describes a type of fraud where a criminal adopts someone else's identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries. Avoid Internet Theft, Fraud and Phishing Since its birth, the Internet has grown and expanded to unprecedented, unmanageable proportions. Information, software, news, and much more flow freely through its twisted pathways. How To Clean the Spies In Your Computer? Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer Browser Helper Object used to show advertising.Free PC Health Check - find bad files fast! How many corrupt and redundant files are lurking inside your PC ready to cause harmful errors? Find these harmful "time-bomb" files instantly and keep your computer ERROR FREE 24 hours a day!VariantsBookedSpace/Remanent : early variant (around July 2003) with filename rem00001. File Sharing - What You Need to Know! File sharing on p2p is soaring despite the music and movie industryefforts to curb the practice. Regardless of which side of the arguement you are on it is likely that sharing of copyright materialwill continue in one form or another for the foreseeable future. Temporary Internet Files - the Good, the Bad, and the Ugly A little bit of time invested into learning about internet security can go a long way in preventing mishaps on your computer. Temporary internet files are not something we should be afraid of, but we should certainly be careful in how much we trust them and how we deal with them. Watching the Watchers: Detection and Removal of Spyware If spyware were a person and he set himself up in yourhouse, you are likely going to do one of two things. You'llkick him out yourself or you'll call someone (such as thepolice) to do it for you. A Basic Introduction To Spyware Spyware is the most troublesome software to appear on theInternet in recent times. When spyware infects a computersystem, it may be relatively harmless or it may bedevastating. Spyware Removal Spyware SolutionProbably Today's Biggest Computer Problem.You Suffer Without Knowing Your PC is Infected!"The effects can be devastating. Virus Prevention 101 Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter, Nimda? Do these names sound Familiar?Have you been as bothered by viruses this past year as I have? Does it seem like there are more viruses, worms and Trojans out now then ever before? It is only getting worse.For the general public, "virus" has become a catchall term for any unwanted program that spreads from computer-to-computer; yet, in reality, there are differences between viruses, worms and Trojan horses. Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER From: "Paypal Security"Subject: New Security RequirementsDate: Tue, 26 Jul 2005 19:20:51 -0800Dear valued PayPal® member,Due to recent fraudulent transactions, we have issued the following security requirements.It has come to our (attion)**Spelling Mistake**, that 98% of all fraudulent transactions are caused by members using stolen credit cards to purchase or sell non existant items. |
home | site map |
© 2006 |