The Happy, Benign Strivers of 2600 156
westfirst writes "The Washington Post has a front page story on those nice young boys in the food court from 2600. Here's one choice sentence: "Patrick thought 2600 would teach him how to hack. Instead, it taught him about job hunting, stock options and business plans." The press and the government were wrong along. 2600 isn't about learning how to launch the nuclear missiles at that fascist gym teacher-- it's about working hard and getting ahead. So, is 2600 better off with a reputation as Wally Cleaver or Eddie Haskell?" All I know is that it's good to see positive coverage of hackers/hacker culture.
Re:What's positive about hacking? (Score:1)
"Duh. Duh duh duh.
Blah blah blah.
Duh duh duh.
Whine Whine Whine.
Oh, and I don't have a fucking clue.
Blah blah blah"
Thank you. Thank you very much.
this is some bull $*!@ (Score:1)
2600? (Score:1)
The truth is, 2600 is a lame magazine with shitty articles. There is no argueing that. It is a bad magazine. You'd learn twice as much from reading any back issue of phrack than reading all of the 2600 volumes.
But, this does seem to highlight something which I have seen comeing for a long time now. Computer hackers have sold out a long time ago. Before it was about learning something cool, now it is all about earning 6 figures by useing lame techniques.
I wonder when the tide shifted in the hacker community. Was it when you looked around and saw all of the figure heads in the community driving $40,000 cars and working at the big security consulting companies? Can you name one security guru who isn't making a shitload of money from it?
Sadly, it isn't just the US/Canadien hacking cultures which have been hit by greed, but virtureally everywhere else aswell. To many worms and carding scams come from Romainian/Russia for me to respect the majority of them.
The hacker ethic used to be about learning, without profiting or destroying. Now, it is all about profiting.
In the near future, the community will die completely. All that will be left is kids who need more prozac dos'ing sites and running canned scripts. But, look into your logs a little deeper, and you will see that unwanted visitor who has gotten around your shiny new and expensive firewall.
Re:I'm a 2600 "hacker" (Score:1)
Where and when are your 2600 meetings? I have lots of questions about implementing generational GC in a multi-threaded environment. Do you think there will be someone there who can help me?
Rev. Dr. Xenophon Fenderson, the Carbon(d)ated, KSC, DEATH, SubGenius, mhm21x16
Re:What's positive about hacking? (Score:3)
Even though I don't agree with you, I have but one thing to say. Please, please PLEASE stop it with the house analagies [sic]. Please use something else.
This is such a good point that it needs some attention drawn to it beyond yapping about the typo. Houses are physical and in the real world, and so many things don't match up. First of all, every host on the internet is potentially a server, and potentially contains useful, intended-for-the-public information. How can you tell if a given host is meant to be accessed remotely? Well, you connect to it and look. This isn't the equivalent of checking the doorknob of a house -- it's more like looking in a shop window to see if they're open. (And that analogy is full of flaws too.)
Sure, we could depend completely on centralized human-created directories, but that puts control back in the hands of the few. The internet isn't supposed to be Just More Television. If it becomes illegal to connect to port 80 of someone's machine to see if they're running a web server, that's a huge loss for us all. You might think http is different somehow, but do you really want the goverment maintaining a list of what ports are legal to use for services?
Re:What's positive about hacking? (Score:2)
As far as Hacker, it's a negative word. In the computer world it refers to someone who is not particularly adept. To hack code means to work by trial and error until it works.
Then look up the definitions of 'hack writer', 'political hack', 'hacker' as in poor golf.
Otherwise I think the term you want is just plain Geek.
I'm a Geek. I'm also a Software Engineer.
I'm definately not a Hacker or a Cracker.
Re:Guy Montag? (Score:2)
You'll also notice people referring to Emmanual Goldstein - the false prophet in 1984 - as the publisher of 2600, while other people call him Eric Corley.
--
Don't mod trolls up (Score:1)
crack sniffing? (Score:2)
Hmmm, 2600 doesn't seem to be teaching the young crackers too well. You do not sniff crack. You smoke it, in a crack pipe. At least they're not sniffing the pot too.
Re:What's positive about hacking? (Score:1)
Hey, dude, you're talking about CRACKERS, not HACKERS.
Hacker != cracker.
--
Re:Nice parenting skills (Score:2)
That's because his father is:
(There. This should score points with the "government is evil" types)...
--
Re:What's positive about hacking? (Score:2)
The NY Times is never going to run a headline with the word "Crackers" in it, so the True Hackers might as well be trying to call the people who break into computers "Wetbacks" or "WOPs" or something.
Also, as the Steven Levy book pointed out, the so-called positive use of the term Hacker is based in a MIT/New Jersey tradition and is primarily limited today to the Unix subculture. Most professional programmers probably would view being called a "Hack" or "Hacker" as an insult, although they might "Hack" (a specific activity) at some code now and then.
So, until Hackers can think of respectable term for themselves and for The Other, it is a doomed battle.
--
Re:I'm a 2600 "hacker" (Score:1)
and yes, reading academic journals is an acquired skill.
Re:Nice parenting skills (Score:1)
Actually, he said:
See the difference? Good, because the Post apparently can't, those morons. (And no, that's not flamebait, the technical term for using the '?' thing is moron, because the tool that fixes it is called the "demoronizer".)
Re:And I though[t] that I had a story! (Score:1)
Don't waste your time on Catcher in the Rye, though - it isn't worthy of either burning or reading.
Hmmm, perhaps a new /. poll: best banned book you've read?
Guy Montag? (Score:2)
situation are Guy Montag, 39, an information systems analyst who works for a government
contracting company;
I thought Guy Montag was a "fireman" who used to burn books for the government but then began to be discontented with his distopian society and one day picked a book up and began to read and read and eventually (quite, um, dramatically) left society when caught...
Is Farenheit 451 old enough that a 39 year old's parents may have named a kid after a character in the book?
--
Re:2600 about getting ahead? Ha! (Score:1)
~dlb
Re:First Hand Account (Score:1)
I never did hear anything about illegal activities - just Linux, gadgets and porn, usually. (Of course maybe it was because I often came straight from work at the DOJ in my suit...)
It was mostly a social thing, like any party of friends and peers.
I remember that young kid who came with his dad - I had a nice talk with his father. That kid really kind of found his own there. The first night he was talking about all of this pop-hack-aol nonsense, but quickly settled in and proved himself to be a cool, intelligent young guy.
I think a lot of people go there not for the supposed cracking, but to just be around people who are able to talk intelligently about computers and networks over fried cheese and beers. (Not to say that there isn't a lot of bragging and made-up exploits bandied about as well...)
Some of them even were there to meet girls, believe it or not - there were always a couple of girls there who knew how to hack their way around linux. There was one girl who told me that she would never date a guy who used bash... (Of course, I suspect they really came to see Dave show off his nipple ring... again.)
About half the time, some curious feds would lurk at the fringes of the group and more often than not, they'd be invited to join in. There was really never anything to hide. They'd often cautiously answer questions about their work, once they realized that they were dealing with a pretty good bunch of kids. I'd suspect that they took home a few resumes as well.
Cheers
Jim in Tokyo
www.wirefarm.com
Re:What's positive about hacking? (Score:1)
I posted the DNFT because trolls are a real pain. I posted the content in the same way you post an OBHack on alt.hackers... I wanted to comment on the s/n ratio, but without lowering the s/n ratio to do so.
I actually mentioned this in my post "replies to troll that complain, without providing any content" are the problem.
As in, if someone asks "vi vs Emacs - provide factual data" it's not a troll, though it might provoke a mighty huge discussion, because people are going to be saying useful things. ("I like vi because
So my message was to encourage 1) moderators to not mod up trolls and 2) people to include content if they feed the trolls.
And something you have to feed trolls, sometimes they are serious people, and sometimes you just don't want their stupid question to go unanswered because it'll look to outsiders like they have a point nobody can refute. This is why people get good at feeding the trolls really dull food. ("This is refuted in FAQ #12 - RTFM")
Re:What's positive about hacking? (Score:2)
Exploits are very valuable. I was explaining to my co-worker about teardrop a year or two ago. He thought it was moderately interesting, but that nobody would have made that error, making the bug theoretical. It wasn't until I downloaded a ready-made exploit and took out his server, twice, with him watching, that he decided it was worth getting a patch for.
Now, if some hacker hadn't written that exploit, which enabled a bunch of no-skill kiddies to crash computers at random, some skilled attacker could have combined it with other exploits to reliably remove any computer on demand as the part of a larger coordinated attack.
When WinNuke still worked I got hit twice, a small price to pay to now be able to run a semi-reliable ftp server from the windows machine at work.
(And the same thing effects Linux servers, but there you don't have to impress every user, just Linus, AC, or the maintainer of whatever code base is weak and it'll go into the main codestream. Exploits still help though, so they can see an attack isn't just a theoretical posibility, but a skilled user could use it NOW.)
Re:What's positive about hacking? (Score:1)
Re:What's positive about hacking? (Score:2)
Re:historical correction (Score:2)
Re:What's positive about hacking? (Score:3)
Hackers are the people who put the internet together, they are not the ones who are going to take it apart.
Re:I'm a 2600 "hacker" (Score:1)
Re:What's positive about hacking? (Score:1)
Re:crack sniffing? (Score:2)
Then again, people sniff, smoke and shoot-up crystal meth so maybe it's possible to sniff crack? Or maybe he was talking about some sort of sexual practice?
Re:Ha! Cool social hack hidden in the article... (Score:2)
http://www.dc2600.com
Visit DC2600 [dc2600.com]
Idunno... (Score:2)
Visit DC2600 [dc2600.com]
disappointed subscriber (Score:2)
At first this was an excellent starter point for new and interesting stuff now it it tripe not even worthy of the name "The Hacker Quarterly".
Is it me or did this start about the time "FREE KEVIN" stuff was ending. Not putting down the cause or anything but it is true
Re:The Weird Have Gone Pro (Score:2)
Yep.
Like the title of your comment,btw, looks familiar...
Re:Anarchist Cookbook (Score:2)
Anarchist Cookbook (Score:5)
Re:What's positive about hacking? (Score:1)
To say that they're "both forms of private property" gloms over a world of difference. Accessing a computer over a network is as different from physically entering a building as either are from copying a poem into my notebook, using a computer program, singing a song, or staging a play. These things are not, nor should they be, governed by that same set of rules, yet the word "property" is used to describe them all.
Tom Swiss | the infamous tms | http://www.infamous.net/
Re:What's positive about hacking? (Score:2)
Sorry, but when you connect your computer to a network and run a server of any kind, you are inviting people in. It's your responsibility to either not connect, not run a server, or run with at least some minimal security that makes it clear what the limit of the invitation is.
If you invite people into your house and don't lock the closet where you keep your porn collection, you don't have much right to complain when someone who's poking around looking for a place to hang their coat - or who's curious about the construction of your house - finds it. OTOH, if you lock that door and someone picks the lock and starts digging around, then you have cause to smack them upside the head.
Tom Swiss | the infamous tms | http://www.infamous.net/
Re:What's positive about hacking? (Score:2)
True, but irrelevant. When you connect a computer to a network, we can only assume it is because you wish that computer to communicate with other computers.
When you run a server on a computer connected to a network, we can only assume that it is because you wish to make some services or data available to users of other computers.
What services or data did you wish to make available? As we are not telepathic, the only way for us to figure that out is to poke around a little. For example:
Tom Swiss | the infamous tms | http://www.infamous.net/
Re:What's positive about hacking? (Score:2)
I belive I was talking about computer networks, not buildings?
Fine! Then you won't be running any servers, you're quite safe from the big bad hackers, and we're in perfect agreement, so there's no need to be frightened. Take a deep breath and have a beer.Tom Swiss | the infamous tms | http://www.infamous.net/
Re:The Weird Have Gone Pro (Score:2)
Re:What's positive about hacking? (Score:2)
Re:bullshit!! (Score:1)
Just because you don't understand the minds of people who behave in this friendly way doesn't mean they don't exist.
Do you let your friends look into your car? At exactly what point do you know someone well enough to consider it okay for them to open your car door? Where do you draw the line and why?
he must have been looking to steal the radio or the car because nobody actually looks into a car for any other reason.
What!? My example disproves this by experiment. The original poster is wrong. If this bloke was going to steal the radio he would hardly have knocked on my door and identified himself first! (Unless you don't believe that what I said actually happened, in which case there is little point in discussing it)
Re:What's positive about hacking? (Score:5)
Just the other day someone knocked on my front door to tell me I had left me car outside unlocked. I said thank you and then locked my car. He must have either looked into the car to see the physical position of the lock, or else he tried the door. Either way, he was uninvited. What would you have done?
Slightly less recently, I was given directions to a friends house on a piece of paper. I drove to the street only to discover that the number of the house I had written down was smudged. I took a guess, but it could have been wrong. I went up the pathway to the front door and knocked, (remember if I was wrong, then i was on somebodys land uninvited here) There was no answer. I tried the doorhandle and it was unlocked. I shouted hello through the door. Nobody answered. Just as I was going to leave, my friend appeared from the back garden. Did I do anything wrong? I potentially entered a property without permission. Some people I know would have walked right in to check of things were okay when they got no answer. Would that have been wrong? What if my friend was lying injured somewhere in the house? Is it still not allowed because i might accidentally be in the wrong house.
My point is this... I agree there are parallels between cars, houses etc and computers. But in all these cases there are legitimate reasons for entry other than simply invitation. If you have a car/house/computer in a public place (yes, the internet is a PUBLIC network) then expect that to be the case. Even if you get rid of all malicious hackers, you still find people entering your systems for various reasons (accidentally is probably the most common) so you MUST be prepared for it with proper security. And we all (I hope) know by now from experience that understanding how to make a system secure follows from knowing how to exploit an unsecured system. Thats the way it is - like it or not. You WILL NOT be a good security admin until you know how to crack systems yourself. Anyone who tells you otherwise is an academic.
Re:And I though[t] that I had a story! (Score:2)
OK, Don. As soon as I get my book written and I can figure out how to get it banned (Note to self: Figure out what gets books banned. Thoughts: sex? profanity? saying bad stuff about religion? Follow on note: Read some banned books. Look for common themes.) then I'll send you an email. I figure that if I can tell my publisher there's at least one sale, they're bound to take a chance on me.
Thanks, Don. You've given me new hope!
--
Re:What's positive about hacking? (Score:1)
There will be people out there attepmting to hack, the same as there will be people attempting to break into houses. If you had the choice of hearing from those best-placed to break into you house exactly how they might choose to do it, giving you chance to prepare, wouldn't you take it? Or would you prefer to assume that because nobody's telling you that your house can be burgled, that nobody's about to break into your house?
Re:Nice parenting skills (Score:1)
Well, we know he probably meant crack-smoking. But maybe crack-sniffing was a popular recreational activity among baby-boomers? Hey, ask your parents!
Can't fool me! (Score:3)
You can['t fool me! those 2600 boys hacked into the New York Times! That's what happened!
Re:What's positive about hacking? (Score:2)
Wrong definition.
"Security holes are only an issue because of the damn hackers. Hacker: 'Hey, we're helping you exposing security holes so you can fix them'. Dude: 'And why should we fix the holes?.' Hacker: 'Um uh. To protect you from us.' That's great isn't it. WITHOUT THE HACKERS THIS WOULDN'T BE AN ISSUE."
Hackers expose security holes. Why? Hackers work on code. Hackers write code. *You* are referring to crackers. Without widespread *open* and *public* dessimination of security holes by people who write, use and develop software, said information would only circulate amongst the dark, underground of illegal electronic intrusion and what not. The bad guys (eg the script kiddies, the people who steal credit card nos. etc) already know about security codes. *They* certainly don't bother informing securityfocus.org about the new hole they just found, exploited and punched through in your spanking new e-commerce website that runs whatever combination of software.
Who does?
People who care. People who write code. Use code.
People who at this very moment are contributing patches, time and effort to the development of the Linux kernel. The FreeBSD kernel. The KDE project. The Apache webserver. Mozilla.(i think/hope?
I am a hacker.
Re:Banner ad blocking (Score:1)
they're trying to get RID of the banner ads, not simply shield themselves from them.
-steve
evangelism? (Score:2)
Then he met the 2600 Club.
Gee, if I hadn't known any better, I would have thought that they were preaching for an online evangelist. Maybe hackers are just 1900 times better than Pat Robertson.
Re: Hacking is Learning (Score:2)
Good troll, dude.
Hacking is about learning. It's about getting to know how things work and make them work better. My parents always let me disassemble stuff around the house to learn how it worked. And they gave me computers to play with and to do things with. They knew the other kids and the teacher *supposedly* watching over us at the computer club were the *curious* kind, not the evil kind. It was great to have that patient mathematician to sit with us and teach us tricks, all sorts of things that made our life easier in *normal* school, and gave us the mindset to pursue scientific careers.
It is and always will be about learning to do things. Hacking, craking, white hat, black hat, security holes, etc., there's more to the world than computer networks, and programming is a nice mental exercise that prepares you for school and for work.
adapt
Re:What's positive about hacking? (Score:1)
Re:I'm a 2600 "hacker" (Score:2)
Thwarting Banner Ads (Score:1)
That is why there are two different types... (Score:2)
There are two different types of 'hackers' out there: White-Hat and Black-Hat. The Black Hat hacker is the one that costs billions and trillions and gazillions of dollars per year of lost business. The White Hat hacker is the one that publishes security flaws (usually found on thier own test systems) thus allowing GOOD network admins to guard their systems against the Black Hat hackers...
You see, there will always be burglers out there and there will always be malicious hackers out there... this is a fact of nature. Without the properly skilled people out there to find bugs (buffer overflows etc) and security flaws; the network admins would not have the up-to-date knowledge of exploits to secure thier networks effectively!
Applying this to the ill-burgler scenerio that you made: This would be like many skilled burglers out there and you are trying to protect your home with open Windows! (heh... open Windows, get it?!)
My point is that we need the people with the Black-Hat experience to come over to the White-Hat side of things to help keep systems secure and the network administrators ahead of the game. Can you think of a better way of getting this accomplished?
Now, I agree with you that these 'White-Hat' hackers should not be exploiting flaws on other systems. This is illegal and should be dealt with accordingly unless this 'hacker' was invited by the owner of the compromised system for a security audit.
And I though that I had a story! (Score:5)
I thought that it was going to teach me how to make home-made napalm and exploding lightbulbs out of bubblegum but instead it helped me find God!
Of course I am writing this because after finding God the ER techs got my heart started again....
Re:I'm a 2600 "hacker" (Score:1)
More like, ASM is Theoretical Computer Science. 2600 is Practical/Applied.
Face it, ACM/IEEE is a bit too dry of a club for some people.
Ha! Cool social hack hidden in the article... (Score:1)
Okay, there is technically a rat's chance in the cat pen at the pound that this is the guy's real name, but I suspect someone snuck a message in under the reporter's nose.
The information systems analyst is named Guy Montag. Go Ray Bradbury!
I don't believe he snuck that past both the reporter and editors.
-FrumsRe:What's positive about hacking? (Score:2)
What is a corporation but a group of people?
If it sticks in your craw so much, form a corporation and spend the money to protect your precious word.
No, really.
--
Re:What's positive about hacking? (Score:3)
I think it's about time we, as a community, give this one up. It's tilting at windmills.
I still use "hack" and "hacker" in my normal speech, and sometimes have to explain, but I think it's time to turn off our --pedantic flags.
--
Supposedly impregnable... (Score:1)
What's so impregnable [dictionary.com] about a code that can be broken by a 14 year old, and later be reduced to be able to fit on a business card in less than 7 lines of perl code?
Supposedly impregnable to me would be code that would have to be output on a quilt or involve measurements that must take into account the RF interference of neighboring electrical components. It's not a 40-bit key found unencrypted in a piece of windows software.
It's like sending all the guards home and leaving the keys and security codes to Fort Knox under the doormat. Impregnability comes from the ability to resist attack and I don't think CSS did that in any way shape or form.
Re:Supposedly impregnable... (Score:1)
Of course I could be wrong. Maybe they did mean capable of being impregnated. But then it changes the whole meaning of the article.
Re:I like the end of the article... (Score:2)
Incidentally, I noticed that Slashdot just escalated the banner war a notch. One of Slashdot's banners is 298 x 60, instead of the usual 300 x 60. That got it through size-based filters. Grr.
Re:What's positive about hacking? (Score:1)
*sigh* You're confusing Hackers with Crackers, again.
Go look up the difference.
Re:Nice parenting skills (Score:1)
Re:It's good to see some good press finally! (Score:1)
I find it highly improbable that someone who thinks that telnet == unix ("Everything I know about Telnet...") loves "to hack code".
"Hackers (not crackers) are who make new ideas work, who push the envelope of computers as we know it." If that isn't purely regurgitated media fodder than I don't know what is. Have you ever had an original thought in your life?
"I wanted to know how the software and packets worked" Spoken like a true hacker. Why didn't you just say 'I wanted to know how the stuff and junk worked, ya know?' You'd probably have the same degree of credibility.
"If it wasn't for the hacking, I never would have peaked my curiosity enough to go as far as I have" And that's coherent english?
"I probably wouldn't even be running Linux!" Are you sure you didn't just change your windows colour scheme?
Don't get me wrong, I'm not some elitist hacker type or something. I code professionally, I hack around with my own servers, etc, but I'm no hacker. The fact is that the people who are 'h4rdc0re' will always be surpassed by the true hackers of our time - for example, the open source gods like Alan Cox, etc.
Sometimes I wish that the whole hacker thing wasn't as prominent as it is, because frankly (along with a lot of american 'culture') it promotes malicious activity that is detrimental to society in general.
Why can't it be cool to just code, or build, or whatever?
Re:The Weird Have Gone Pro (Score:1)
BAH!
Don't let THEM assimulate US.
WE should assimilate THEM. Stick to your values, geeks!
We don't need to be rich. That's what THEY tell us, because they want us to buy their STUFF.
Being a geek isn't about having the latest T-shirt with a witty saying; it's about being witty. Being a geek isn't about having the latest greatest hardware; it's about doing neat things with the hardware you have. Being a geek isn't about letting the world romp all over you; it's rising up to the challenge and telling corporate america where to get off.
DO NOT SUBMIT
Don't want to work for "The Man"? Don't! Take his money just long enough to find something else to do. If you're bright and talented, there are plenty of other things to do. Go to graduate school. Get some grants and go into research. Work for a non-profit. Start a non-profit.
If you need more ideas, send me email.
(I'm reminded vaguely of Theodore Sturgeon [upenn.edu]'s To Marry Medusa [amazon.com], which you should all read since it's a fantastic book. ;-))
Re:Can't fool me! (Score:2)
The Post?? (Score:2)
I guess a blind squirrel DOES get an acorn every once in a while.
Now if the Post would just put the political commentary where it belongs, in the Op-Eds and leave it out of their reporting...
DanH
Cav Pilot's Reference Page [cavalrypilot.com]
Re:Nice parenting skills (Score:3)
The kid's father says "Without 2600 (he would) probably be one of those pot-smoking, crack-sniffing guys...
Read the article again. The kid (Patrick) said that, not his father (Michael):
Re:And I though[t] that I had a story! (Score:2)
But seriously folks, there are some pretty good books that are systematically being banned from our schools.
--
Re:And I though[t] that I had a story! (Score:4)
Now I have to rush out and grab my copy of Huckleberry Fin, I Know Why the Caged Bird Sings and Harry Potter.
--
Re:What's positive about hacking? (Score:2)
Security holes are only an issue because of the damn hackers. Hacker: 'Hey, we're helping you exposing security holes so you can fix them'. Dude: 'And why should we fix the holes?.' Hacker: 'Um uh. To protect you from us.' That's great isn't it. WITHOUT THE HACKERS THIS WOULDN'T BE AN ISSUE.
"
If everyone was nice, noone would have to avoid nasty people.
Security holes are only an issue if they can be discovered by someone with malicious intent. If someone without malicious intent discovers security holes and publicises them to get them fixed this is not a bad thing.
meeting differences (Score:2)
I only went to three meetings because the vibe was so weird. There were four or five groups of people who met sort of hesitantly together and were exceedingly paranoid about talking about much of anything. The only real lengthy discussion we had was at one meeting when it appeared that there was a guy in a suit watching us from a couple floors above and we were speculating as to whether or not he was FBI or Secret Service or something. I have no idea what the Seattle meetings are like now, but I'm going to have to bet that meeting quality varies quite a bit from place to place. I'm in LA now and haven't felt any great urges to show up at the place, even though a focus of my current work is network security.
I like the end of the article... (Score:2)
Asked whether they figured out how a way to thwart online banner ads, Watson said yes, they've concluded it's feasible.
But would they do it?
"Of course not," he said after a pause. "That would be illegal."
I think they forgot the "wink, wink, nudge, nudge" part that came after it though
Re:What's positive about hacking? (Score:2)
I agree with the largest part of your reply, except for this:
"Security holes are only an issue because of the damn hackers. Hacker: 'Hey, we're helping you exposing security holes so you can fix them'. Dude: 'And why should we fix the holes?.' Hacker: 'Um uh. To protect you from us.'"
There are enough proven cases in which information, creditcard numbers for example, was stolen. I wouldn't be very happy if people broke into my machines, but I could live with it if I knew if it was only for the 'sport of it'.Unfortunately it happens too often that information is stolen, and therefore it is necessary to fix holes. I think it is a bit too easy to compare hackers with criminals.
The Weird Have Gone Pro (Score:5)
Thanks to MP3, Silicon Valley cash, www.everyfuckingthingyouwantinporno.com and media hype over anything and everything to do with the Internet, it seems like things created by geeks have really done a number on society. The evolution of 2600 into semi-responsible corporate wannabes rather than Phiber Optik wannabes was expected, by me at least. When all is said and done, the more morally-ambiguous types will tend toward the path of least resistance, which these days, appears to be the corporate grind for the remnants of the dot-cash.
Just look at Think Geek. Hey, there's a lot of cool stuff there. But who other than a corporate flunky can actually afford any of it? Geeks have to be rich now, to stay geeks. We're being driven to it.
I guess I'll just have to stay at my community college support job until my contract ends, then contemplate surrendering my unfunded geekness. It's too expensive.
Either that, or I'll just have to start coding in C and work on kernel patches. Gotta do it old school.
Re:And I though[t] that I had a story! (Score:2)
--
Re:Can't fool me! (Score:2)
Are you implying that The Onion isn't reputable? On the contrary, it is quite reputable. You read it expecting bullshit, and that's exactly what you find. With most other newspapers, you never know.
--
A lot don't realize... (Score:3)
Reading about underground technology is probably the most stimulating form of reading that I know of. Slashdot often deals with such a broad story range (.com funnies to extreme details about a complex emerging technology) and can often only cater to specific audiences (like today's jabber and UDDI stories), where as 2600's technical stuff is so watered down one can usually easily understand the basic concepts.
So, even tho it might be a simple magazine for simple minds and occasionally those that are prone to be idiots are idiots and try things in 2600, atleast the forum is there. They've always looked for writers, and I think Eric Corely is probably the last true old-media free-speach technology journalist.
----
Re:What's positive about hacking? (Score:2)
1. Po' White Trash
2. One who cracks copy protection on software.
Hacker (noun)
1. One who cranks out program code in a ham-fisted manner to get things done, rather than follow rigid methodologies.
2. One who rigs things up to perform functions for which they were not designed.
3. One who circumvents security of external servers owned by others for the purposes of recreation and/or intellectual curiosity.
4. One who takes advantage of network and communications technology they don't own to make money by illegal means.
You may not agree with these definitions, but I don't really agree with yours... and more people agree with mine. Usage defines language, not vice versa. Sorry if that gets under your skin, but it's the way language evolves.
Re:What's positive about hacking? (Score:2)
People who hack code have been trying since the 80's to remove the label "hacker" from computer criminals. Unfortunately, people who break into systems have always called themselves "hackers", too, and are not interested in being re-labeled as "crackers". (Hence, 2600, which has always published info about breaking into systems and has never been about programming, calls itself "The Hacker Quarterly".
I can understand why programmers don't want to be lumped in with "Cap'n Crunch" and Kevin Mitnick, but the truth is that the whole hacker/cracker semantics debate is one that nobody else really listens to.
Bottom line, more than one group of people identify themselves as "hackers".
Look at it this way... suppose all those who are into communications and security said "no, we are hackers not you. the right word for programmers is 'packers'. please refrain from EVER calling a programmer a hacker."
Sounds silly and childish, doesn't it? It sounds the same way when programmers do it.
Re:Geez - Hacker vs. Cracker Again? (Score:2)
Yes, but it should not come as any surprise.
Any time you host meetings for hackers and open it to the public you are going to get a huge mix of posers, wanna-bes, curious observers, and maybe a handful of people who know their shit. The S/N ratio of the 2600 magazine is really horrible, so I would expect their meetings to be very similar.
So if you are looking for reliable information, it is not really the first place to go... But as a social outlet for the sort of kids that Jon Katz frets over professionally, it is probably a net good, posers and all.
Re:What's positive about hacking? (Score:2)
The conventional wisdom is that a good hacker can sometimes come in to a project not knowing his ass from a hole in the ground, and have a working product slapped together before a more regemented software engineer has even mastered the language syntax.
Of couse, he would also leave you with line after line of useless, undocumented cruft, but the business world occationally has one-off projects where that is good enough if it works.
This, of course leads to the type of hacker who breaks into systems. They often know nothing about the OS, the security issues, or even what sort of data is on the system they are looking at. Often times, it was found by random "war-dialing" (or the IP search equivelants these days). By "hacking around" (brute-forcing passwords, trying commands to see what they do, etc.), they are eventually able to get their barings. Hence, they are, in fact, "hackers".
In the context of computer lingo, the name "cracker" comes from the old term "safe-cracker". They open things for other people... such as those who make and distribute "cracked" copies of programs that normally have copy protection.
Remember folks, The Jargon File is not a definative final authority... it is just a sample of the agreed-upon jargon of a very, very small group of usenet chatters, (most of whom were big-iron mainframe grunts who apparently liked to spend their spare time talking about PDP systems). Their little world does not represent everybody, nor even all computer techies.
If you were to assemble similar dictionaries from Redmond, MIT, or Silicon Valley, you would probably find a lot of differences between them. (And I bet all three would accept both uses of the word "hacker", to the dismay of many people here).
Banner ad blocking (Score:3)
In a corner removed from the rest of the group, Watson and another man were huddled together discussing what annoys them the most about the modern Internet--the banner ads. They were trying to come up with a way to "solve" that problem. They talk about whether it would be possible to intercept the ads and replace them with the words "Free the Net!" Or maybe the easiest way to make them disappear would be would be just to bring down the server computers for DoubleClick, the company that manages much of the Internet's advertising.
"If we could find a way to get rid of those ads for a week we'd be the heroes of the Internet," Watson said.
Just go to your client's (or better still, proxy server's) hosts file (C:\Windows\hosts on Windows,
Add entries for every server you don't want to connect to, i.e. ad1.doubleclick.com, etc. and point them to 127.0.0.1 (localhost). That'll time out extra-fast. Example here [csuchico.edu].
Alterately, you could block *doubleclick.com at a proxy server. Or you could put a proxy on your local machine (Like a content-checking porn filter), that checked all files with *.gif extension for banner proportions, then replaced them.
Blocking banner ads is easy. The question is: Would the benefit (whatever that may be) outway the problem of sites not being funded by advertising, and maybe changing to subscription, or closing. This is the real issue.
Michael
...another comment from Michael Tandy.
The Good 2600 (Score:5)
Okay, even ignoring momentarily the media reputation of everyone lumped into the category of "hackers," from script kiddies to Alan Cox, it's nice to 2600 of all people getting some good press.
Even though 2600 (the magazine) isn't what it used to be, 2600 (the magazine, the meetings, etc.) deserve some respect they never seem to get. I was sick of seeing 2600 bashed in Wired, even in /. comments for supporting Kevin Mitnick. Okay, yeah, he broke the law and deserved to get caught, but the treatment in his case was extreme, and you didn't see anyone else constantly reminding people that four years in jail without a trial or bail hearing is wrong.
Even igoring the Mitnick saga, 2600 provides a really great entry point for kids who've seen War Games and... okay, maybe today it would be (god forbid) HAckers, but you get the point. In the pages of that mag, people find out that you don't just guess a password and launch bombs, if you want to do things (even illegal things) you have to learn... a lot. I started learning everything I know now, from system security, to TCP/IP, UNIX, C, everything, because when I was 11 I wanted to be a kr4d 31337 h4x0r d00d. Hell, I used to type on BBSs like that... but by the time I learned how to write an IRC bot, I didn't have time to transpose letters in to numbers, so I had to remap the keyboard in my terminal emulator so I c0u1d 7yp3 a11 l337 w17h0u7 5p3nd1ng 51x h0ur5 534rch1ng 4 34ch k3y. So I learned things, even for the sake of being stupid.
And I feel like I owe a lot of this to 2600. when I found an old acoustic coupler, I took it to the local 2600 meeting to figure out how to rewire it to work with my built-in modem... I learned half of what I know about hardware there... Hell, I learned what a front-side bus was from those people.
So it's nice to see 2600 getting some good press, and to see the meetings described as something other than a bunch of lurking, black-clad teenage misfits in doc martens and 2600 t-shirts.
just my deux centimes.
telekon
Re:Can't fool me! (Score:2)
Steven
Positive tone, still misinformation (Score:4)
DeCSS doesn't allow people to copy DVDs. That's always been possible, provided you can get a blank DVD and a DVD burner which aren't crippled with access controls. DeCSS allows people to use DVDs in non-approved, or non-licsened equipment.
There is a big difference, especially with the draconian restrictions placed on "approved" equipment manufacturers. I don't see why CSS is considered anything other than what it is, a way of making artificial trade barriers.
Oh, now I remember, it's because the mega-corps say it's an copy control mechanism. They're famous for their honesty to the consumer.
Steven
Drawn to learning (Score:2)
Psychology majors get into psych to find out what's wrong with themselves. I know it's an old wives tale but I think there's a grain of truth in it. I know some freshman physics majors who want to build rail guns.
I know that I, myself and several other chemistry majors got into chemistry so we could make drugs. I know how to make drugs now but I don't because I have a healthy respect for the process. It was so tempting to make amphetamine after learning gen chem but I knew I didn't have the skills quite yet. Now I have a great deal of time invested in my skill set and wouldn't illegally throw it away for a quick high. Most all the chem majors I know would agree with me. Gen chem gave us a healthy respect for what we were dealing with.
Now look at the script kiddies. As far as I'm concerned the damage they do is just as bad as cooking up amphetamine but leaving in the sodium hydroxide. However hackers who are attracted to the dark side at first are going to make better sys admins down the road because they understand the script kiddie mindset. If dreams of launching cavitating torpedos at your swim coach get kids into computing I say good for them. Hopefully by the time they figure out how to crack the ultra low frequency communication devices the Polaris subs use they'll also have learned some maturity and have respect for the skills that they've learned to get there.
Re:The Weird Have Gone Pro (Score:2)
There has always been a money element to geekiness. Computers cost money, and, in computers, geek value often equals cost. MIT has a lot of geeks, but well funded geeks - have you seen the cost of undergraduate tuition? The space program, one of the geekiest endeavors ever, was only possible because the Russians were trying to do it, and was funded with billions of tax dollars.
We often act like we are entering some geek utopia, that our technology is freeing us from the constraints of the body and letting us live in the empire of the mind. Instead, it is simply a good economy, and the money from a middle-class lifestyle that fuels our current lifestyles. It's often about the gadgets, not the knowledge, and when it is about the knowledge, you often have to spend $200 at O'Reilly just to get the basic knowledge to understand the free guides.
For an interesting take on the subject, check out The Guy I Almost Was [e-sheep.com], a web comic at e-sheep [e-sheep.com]. It takes some time and a little bandwidth, but is well-worth the read.
2600 is for pu5513e5! (Score:2)
If you want to learns to be a l337 h4xx0r, you need to get with the new DOS 4tt4ckz, root k1tz, etz. What's so wrong with planning to h4xx0rz a nuc-u-lar submarine to revenge-ify your gym teacher? I say it's good to have a goal.
To learns more about l337 h4xx04 things, clickz here. [ridiculopathy.com]
If you want to get ahold of the best worm-writing software ever, click here [microsoft.com].
I'm a 2600 "hacker" (Score:5)
I learn things that improve my skills in both my professional and personal life, and hang out with cool people. Yes, it's a bit like a "biker gang user group" and there are people I know are doing questionable things. There always are, at least there everyone is (mostly) out in the open about it and there is just as much talk about how to close security holes as how to exploit them. You can't have knowledge of one without the other.
After many years of picking up the occasional print copy at the bookstore, I finally live someplace I can go to meetings. You could say that I've been "in telecom" since high school when a buddy showed me this cool new toy he built, called a "Blue Box." Breaking into things just to be able to say so was never my thing, but it got me interested in how the telephone network works. Combine that with computers, and I found a lifelong interest and successful career.
And I do get a few cool points for being able to say that I make phone bills for a living. I've gotten more useful information out of 2600 than my years of ACM membership, another more respected professional organization in my industry. And it sure is a lot less boring
Geez - Hacker vs. Cracker Again? (Score:3)
He says 2600 taught him the "hacker ethic," a value system that attempts to define what's acceptable and what's going over the top in the digital world. That is, probing systems to learn about their vulnerabilities is okay as long as no damage is done, but flooding sites such as Yahoo, Amazon and eBay with fake packets of data to block legitimate users out is just plain stupid, Patrick said.
While I'm commenting:
Mike Godwin, former staff attorney of the Electronic Frontier Foundation, agrees: "There's no doubt in my mind that the clubs have done more good than harm, in that they've encouraged kids to develop their knowledge and computer skills."
underscores why I've never had much respect for the Wired/EFF/cyberrights axis. I just don't get how these people can drone on and on about privacy when they're clearly untroubled by, if not outright sympathetic to, *ackers breaking into systems where they're not allowed to be.
Unsettling MOTD at my ISP.
Culture (Score:4)
Yours,
Bob
You're referring to Cracking not Hacking... (Score:2)
Hacker's distinguish themselves with Crackers.... You're thinking, and referring to, crackers. They're the ones who use a program designed and made for securing your own web server and use it to find holes and exploits...
That's where the difference comes in. It's the hackers that made Linux, and almost all of the software programs that you use. They hacked code and learned how computers and software worked. They then found a way around a problem and solved it. You should be thanking them....
Linuxrunner
Libertarian Party & 2600 (Score:2)
2600 Virginia Avenue, NW, Suite 100
Washington DC 20037
--
Re:Geez - Hacker vs. Cracker Again? (Score:2)
Would you pronounce that "starkers"? As in when you refer to a jack-of-all-trades hacker, cracker, black hat, white hat? I'm a fuckin 31337 574rk3r, m4n!
--
Nice parenting skills (Score:5)
It's good to know that guy has high regard for his own parenting skills. Dammit! If my son didn't meet those hackers who would have raised him right?!
First Hand Account (Score:2)
2600 about getting ahead? Ha! (Score:2)
Once upon a time when I ventured to one of these meetings out of curiosity, I was asked by a punk-ass kid if I knew who he was. When I responded by asking if I had an obligation to, he responded by saying "You don't want to know me," no lead-up conversation beforehand. Laughter.
I'd been to one meeting and there was actually an entertaining speaker who went by the handle FruitLoops. He had some seriously interesting phone phreaking theories, among other things. He claimed to have hung out with Kyrie, the Canadian telco employee lady that got busted here for long distance fraud before making off to the States. There wouldn't have been any reason to doubt him.
The 2600 way is no longer the ideal source of subversive information. They're now a howto manual for dreamer, Mad Magazine-reading adolescents. The name "Acme" springs to mind.
ICEPHREAK
Toronto, Canada
Positive (Score:3)
las vegas 2600 meeting (Score:2)