Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Hacking is easy

Name: Anonymous 2010-05-01 13:52

Name: Anonymous 2010-05-01 13:55

>>1
I'm not clicking that!

Name: Anonymous 2010-05-01 15:51

>>2
It's perfectly safe if you use a proxy such as "on.nimp.org"

Name: Anonymous 2010-05-01 21:26

You have misunderstood the true meaning of hacker.

The hacking community developed at MIT and some other universities in the 1960s and 1970s. Hacking included a wide range of activities, from writing software, to practical jokes, to exploring the roofs and tunnels of the MIT campus. Other activities, performed far from MIT and far from computers, also fit hackers' idea of what hacking means: for instance, I think the controversial 1950s "musical piece" by John Cage, 4'33", which has no notes, is more of a hack than a musical composition. The palindromic three-part piece written by Guillaume de Machaut in the 1300s, "Ma Fin Est Mon Commencement", was also a good hack, even better because it also sounds good. Puck appreciated hack value.

It is hard to write a simple definition of something as varied as hacking, but I think what these activities have in common is playfulness, cleverness, and exploration. Thus, hacking means exploring the limits of what is possible, in a spirit of playful cleverness. Activities that display playful cleverness have "hack value".

Hackers typically had little respect for the silly rules that administrators like to impose, so they looked for ways around. For instance, when computers at MIT started to have "security" (that is, restrictions on what users could do), some hackers found clever ways to bypass the security, partly so they could use the computers freely, and partly just for the sake of cleverness (hacking does not need to be useful). However, only some hackers did this—many were occupied with other kinds of cleverness, such as placing some amusing object on top of MIT's great dome (**), finding a way to do a certain computation with only 5 instructions when the shortest known program required 6, writing a program to print numbers in roman numerals, or writing a program to understand questions in English.

Meanwhile, another group of hackers at MIT found a different solution to the problem of computer security: they designed the Incompatible Timesharing System without security "features". In the hacker's paradise, the glory days of the Artificial Intelligence Lab, there was no security breaking, because there was no security to break. It was there, in that environment, that I learned to be a hacker, though I had shown the inclination previously. We had plenty of other domains in which to be playfully clever, without building artificial security obstacles which then had to be overcome.

Yet when I say I am a hacker, people often think I am making a naughty admission, presenting myself specifically as a security breaker. How did this confusion develop?

Around 1980, when the news media took notice of hackers, they fixated on one narrow aspect of real hacking: the security breaking which some hackers occasionally did. They ignored all the rest of hacking, and took the term to mean breaking security, no more and no less. The media have since spread that definition, disregarding our attempts to correct them. As a result, most people have a mistaken idea of what we hackers actually do and what we think.

You can help correct the misunderstanding simply by making a distinction between security breaking and hacking—by using the term "cracking" for security breaking. The people who do it are "crackers". Some of them may also be hackers, just as some of them may be chess players or golfers; most of them are not.

Name: Anonymous 2010-05-01 21:38

Silly social engineering tricks, but humans are stupid, so...

Name: Anonymous 2010-05-01 23:24

>>4
Look at it this way.

On most browsers, you can bring up your browsing history by pressing Control-H. (No, this is not going to become a discussion of werecows.) On Firefox, this brings up a sidebar that shows up on the left side of the window. If you put your mouse over the edge of the sidebar, the cursor will turn into a different kind of arrow. By clicking and dragging it, you can move the edge of the sidebar back and forth. You are, to put it another way, manipulating the border between the normal window and the history window. By moving the mouse, you can increase the portion of the window devoted to either part. In a more extreme view of this situation, you're increasing or decreasing the amount of existence the sidebar has.

Now, let's apply this idea to something more abstract. Look out your window. If you don't live in a highly urbanized area, you should be able to see the horizon. Think of this as the border between the land and the sky. The land and sky are obviously distinguishable thanks to this boundary. Now, if you were to "drag" the sash between the sky and the land, or to manipulate the border between land and sky, you would end up causing the sky to become larger and the land to become smaller, or vice versa. An effect of this might be to cause something that was just on the ground to suddenly be hundreds of feet in the air. Truly a frightening situation to be in. So, look at it this way - manipulating the border between two physical things shifts whatever balance there is in the interaction between those things. Alternatively, by manipulating the border between two things, you can change the manner in which they exist.

Still, this isn't *that* abstract, since it's still dealing with real things in the real world. Many believe that in this world, there are those things that are true, and those that obviously aren't. This divides reality into two extremes: truth and falsehood. But, since we have two extremes, logically one can imagine a boundary between those two extremes - the border between truth and lies. If one were to manipulate this border, suddenly things that were pure fantasy (flying pigs, for the sake of argument) have become reality - or things from reality have ceased to exist. This is how Yukari is said to have invaded the moon - by manipulating the border between truth and lies, as applied to the reflection of the moon on a pond, she was able to make the reflection of the moon into a manifestation of the actual moon, and so send her youkai army onto it. This is what's truly amazing about Yukari's power - the ability to manipulate the border between completely abstract concepts allows her to fundamentally change reality as we know it (at least in terms of two abstract concepts).

Name: Anonymous 2010-05-02 0:07

>>5
Most successful hacks require a combination of technical skill investment and social investment. I say 'investment' because often the framework (social or technical) pre-exists, and you simply need to apply the corresponding element.

A lot of security flaws are part of the design: no one would do X -- but supposing they did, there is a problem. Even here on /prog/, we have that kind of situation... and we're mostly reluctant to take advantage of the bbcode bug even with our anonymity and dearth of mods to notice and punish us: because socially we'd be messing our own beds.

Name: Anonymous 2010-05-02 1:19

>>6
:U

Name: Anonymous 2010-05-02 6:33

"Helen the Hacker"
But... she is a woman!!

Name: Anonymous 2010-05-02 8:04

Helen is Harry's new name after the surgery.
It is common knowledge that skiddies and /prog/rammers are 300% more likely to become transsexuals than the average Joe.

Name: Anonymous 2010-05-02 14:15

>>10
This does seem to be true to some extent. Being a transsexual programmer myself (and knowing a few others both in real life and over the internet), I've been wondering what the reason(s) might be.

Name: Anonymous 2010-05-02 14:29

>>11
Same reason so many of them are libertarians. When you don't have any friends, you don't have anyone to tell you your ideas are fucking stupid and you should quit being a dipshit.

Name: Anonymous 2010-05-02 14:55

>>11
Because the only way to solve The Paradox of Choosing One Of, if you know what I mean, is to become a female programmer?

Name: Anonymous 2010-05-02 15:12

>>12
Libertarianism is beautiful. The reason because of which it is infeasible is that it works on the assumption that people are remotely intelligent and capable of giving internal structure and meaning to their own systems of social justice without a moral authority to direct their meagre efforts.
 
Most people hardly develop into a full Formal Operational Stage [of Cognitive Development]; they are stuck somewhere after a purely Concrete Operational Stage. They will refrain from murdering and stealing because of the tangible consequences they foresee–i.e. jail and social or religious disapproval—rather than because of the understanding that such behaviour is ultimately destructive for a functional society.

Name: Anonymous 2010-05-02 15:13

I got norton

Name: Anonymous 2010-05-02 15:15

>>14
They will refrain from murdering and stealing because of the tangible consequences they foresee–i.e. jail and social or religious disapproval—rather than because of the understanding that such behaviour is ultimately destructive for a functional society.
You have to be kidding me.

Name: Anonymous 2010-05-02 16:04

>>14
They will refrain from murdering and stealing because of the tangible consequences they foresee–i.e. jail and social or religious disapproval—rather than because of the understanding that such behaviour is ultimately destructive for a functional society.
What else should I refrain from for the good of the society, you silly parasite?

Name: Anonymous 2010-05-02 16:20

>>17
Reproduction.

Name: Anonymous 2010-05-02 16:23

>>14
This is what Randheads really believe.

Name: Anonymous 2010-08-07 7:16

        Another one got caught today, it's all over the papers.  "Teenager
Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...
        Damn kids.  They're all alike.

        But did you, in your three-piece psychology and 1950's technobrain,
ever take a look behind the eyes of the hacker?  Did you ever wonder what
made him tick, what forces shaped him, what may have molded him?
        I am a hacker, enter my world...
        Mine is a world that begins with school... I'm smarter than most of
the other kids, this crap they teach us bores me...
        Damn underachiever.  They're all alike.

        I'm in junior high or high school.  I've listened to teachers explain
for the fifteenth time how to reduce a fraction.  I understand it.  "No, Ms.
Smith, I didn't show my work.  I did it in my head..."
        Damn kid.  Probably copied it.  They're all alike.

        I made a discovery today.  I found a computer.  Wait a second, this is
cool.  It does what I want it to.  If it makes a mistake, it's because I
screwed it up.  Not because it doesn't like me...
                Or feels threatened by me...
                Or thinks I'm a smart ass...
                Or doesn't like teaching and shouldn't be here...
        Damn kid.  All he does is play games.  They're all alike.

        And then it happened... a door opened to a world... rushing through
the phone line like heroin through an addict's veins, an electronic pulse is
sent out, a refuge from the day-to-day incompetencies is sought... a board is
found.
        "This is it... this is where I belong..."
        I know everyone here... even if I've never met them, never talked to
them, may never hear from them again... I know you all...
        Damn kid.  Tying up the phone line again.  They're all alike...

        You bet your ass we're all alike... we've been spoon-fed baby food at
school when we hungered for steak... the bits of meat that you did let slip
through were pre-chewed and tasteless.  We've been dominated by sadists, or
ignored by the apathetic.  The few that had something to teach found us will-
ing pupils, but those few are like drops of water in the desert.

        This is our world now... the world of the electron and the switch, the
beauty of the baud.  We make use of a service already existing without paying
for what could be dirt-cheap if it wasn't run by profiteering gluttons, and
you call us criminals.  We explore... and you call us criminals.  We seek
after knowledge... and you call us criminals.  We exist without skin color,
without nationality, without religious bias... and you call us criminals.
You build atomic bombs, you wage wars, you murder, cheat, and lie to us
and try to make us believe it's for our own good, yet we're the criminals.

        Yes, I am a criminal.  My crime is that of curiosity.  My crime is
that of judging people by what they say and think, not what they look like.
My crime is that of outsmarting you, something that you will never forgive me
for.

        I am a hacker, and this is my manifesto.  You may stop this individual,
but you can't stop us all... after all, we're all alike.

                               +++The Mentor+++

Name: Anonymous 2010-08-07 7:17

>>20
Thanks bro for bumping a shitty thread with something older than you are

Name: Anonymous 2010-08-07 10:15

Your welcome bro.

Name: Anonymous 2010-08-07 10:52

>>22
You are a gravely acute fellow, Sir.  My brother is indeed welcome.

Name: Anonymous 2010-08-07 18:46

>>23
But what about him?

Name: Anonymous 2010-08-07 23:21

>>24
Hes welcome.

Name: Anonymous 2010-08-08 7:07

>>25
*His welcome.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List