![]() You can actually use google to find the 'open doors' for you, by using some special terms in the search window. One of the fun, legitimate ways of hacking internet servers is explore for doors left open - it's not illegal if there are no locks or protection. Then it was onto Open Source hacking to help solve problems and bugs.Īnd I still help where I can with OSS hacking and bug finding. I gave it up by 97, and went on to hacking into closed software, reverse engineering protocols etc.Īt first the hacking was to get around licensing of shareware, and getting 'cracks' etc. This was in 1996 though, before firewalls, viruses and spyware were too common. Once found a major retail store chain that had left it's server literally wide open. you guys could notice that the article is fake heheheīeen on the 'net since 96, and early on, just started connecting to servers in telnet on win 3.11 just to see what response I got.įirst though, ran traceroute to get the server DNS and IP, then just connected to the IP over telnet. Do not buy this chip! This is one request that you must refuse your son, if you are to have any hope of raising him well. AMD chips are never sold in stores, and you will most likely be told that you have to order them from internet sites. They use child labor extensively in their third world sweatshops, and they deliberately disable the security features that American processor makers, such as Intel, use to prevent hacking. AMD is a third-world based company who make inferior, "knock-off" copies of American processor chips. If your son has requested a new "processor" from a company called "AMD", this is genuine cause for alarm. You can best ensure that you are buying legal, trustworthy hardware by only buying replacement parts from your computer's manufacturer. If your son starts requesting these devices, it is possible that he has a legitimate need. They may request "faster" video cards, and larger hard drives, or even more memory. I wonder to myself how many flame mails he's gotten already.Ĭomputer hackers are often limited by conventional computer hardware. I don't even bother with people like this who have no technological intillect what so ever. BTW, "Snow Crash" started me on my life of crime. A very funny joke (I'm still laughing), but still a joke so enjoy it. "Soviet computer hacker named Linyos Torovoltos"? Oh, that sold me on this being a joke. If he is careful, you may not notice its presence, however, lunix is a capricious beast, and if handled incorrectly, your son may damage your computer, and even break it completely by deleting Windows, at which point you will have to have your computer repaired by a professional. Your son may try to install "lunix" on your hard drive. "Hacking" books that should be banned from "your local bookstore". You may meet with some resistance at first, but even booksellers have to bow to community pressure. You should also petition local booksellers to remove these titles from their shelves. If you find any of these hacking manuals in your child's possession, confiscate them immediately. A few titles to be on the lookout for are: "Snow Crash" and "Cryptonomicon" by Neal Stephenson "Neuromancer" by William Gibson "Programming with Perl" by Timothy O'Reilly "Geeks" by Jon Katz "The Hacker Crackdown" by Bruce Sterling "Microserfs" by Douglas Coupland "Hackers" by Steven Levy and "The Cathedral and the Bazaar" by Eric S. There are, unfortunately, many hacking manuals available in bookshops today. While real news is discussed trust nothing they say. or even get where linus is from right.Ī is a strange place. ![]() Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone. ![]() They may also be used to break into people's stereos to steal their music, using the "mp3" program. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. It is based on a program called "xenix", which was written by Microsoft for the US government. You need flash to see movies, animations, etc.īSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. Comet Cursor Bonzi Buddy are all Spyware/ Adware things. WTF? obviously this guy has NO clue what he's talking about. Popular hacker software includes "Comet Cursor", "Bonzi Buddy" and "Flash" ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |