Page 1 of 5 123 ... LastLast
Results 1 to 10 of 44

Thread: Hackers: Who are they and how can they be stopped

  1. #1
    Member
    Join Date
    Oct 2003
    Posts
    78

    Thumbs up Hackers: Who are they and how can they be stopped

    I found this last night and it is very interesting. It has more than likely been discussed before but this is more recent. There is always new stuff coming out about hackers so I think this link is very useful.


    Hackers: Who are they and how can they be stopped

  2. #2
    HeadShot Master N1nja Cybr1d's Avatar
    Join Date
    Jul 2003
    Location
    Boston, MA
    Posts
    1,840
    'It's 10 to one male to female. They tend to be the kind of nerdy, non-social people, although there's a lot who aren't. We've met lots who are intelligent, social, the sort of people you'd know at work and not suspect. They typically have an angry mentality, or the structure of their thinking doesn't comply with ours. How can they think what they do is right or justified?'
    You gotta be shitting me...does he even know what a hacker is?

    The ignorant bastards need to clarify that the one's causing malicious act are actually crackers, not hackers. If it wasn't for hackers, this Bryan Glick dumbass would not be submitting his article online, instead he'd have to print it and put it in a magazine.

    So, hackers simply liberate information. Rather like bank robbers just liberate cash.
    Another ignorant person out there without any clue of what hacking truly is and what he's helping it become in the eyes of the public. Someone needs to teach him the difference between hackers, script kiddies and crackers.

  3. #3
    @ÞΜĮЙǐЅŦГǻţΩЯ D0pp139an93r's Avatar
    Join Date
    May 2003
    Location
    St. Petersburg, FL
    Posts
    1,705
    Slow down now, there were a few things in that article that were accurate.

    1. Google will return 4 million sites when you just search for "hackers"

    2. There sure are a buttload of skiddies out there.

    Other than that it's mostly bullsh*t.
    Real security doesn't come with an installer.

  4. #4
    Senior Member
    Join Date
    Jun 2003
    Posts
    772
    Ok, that article is lame as hell indeed.
    You gotta be shitting me...does he even know what a hacker is?
    A word only means what most people think it means...
    The above sentences are produced by the propaganda and indoctrination of people manipulating my mind since 1987, hence, I cannot be held responsible for this post\'s content - me

    www.elhalf.com

  5. #5
    Senior Member
    Join Date
    Oct 2002
    Posts
    314
    "They tend to be the kind of nerdy, non-social people, although there's a lot who aren't"

    How can they tend to be one thing, but then a lot of them aren`t? wouldn`t that mean that they tend to be social and non nerdy??


    Just more FUD creating crap.

    TruSecure seem to be getting a lot of press recently (they keep appearing on the BBC web site) mostly as the result of FUD creation, are they trying to grab some market share?

    Also great that these folks always quote Sun Tzu (I think every other "hacking" article of the past 10 years has quoted him somewhere), how about Clausewitz? when are we going to read how hacking is the extension of politics by technical means.....hey, I could be on to something there.
    Quis custodiet ipsos custodes

  6. #6
    Senior Member
    Join Date
    Nov 2001
    Posts
    4,785
    its not im anti-social
    im only anti-work
    GLOR ee OS key
    thats why im a jerk
    (strictly for the old-timers around here)


    this version of hackers came from a time when computers really weren't as cool as they are today. only those with a geeky penchant or no life at all bothered...like me.

    today the "underground" downloads pre-cracked software, and uses pre-made proggies to set up "stros" in an attempt to prove their cool (hey can somebody compile this for me). the same kids that spray paint the neighbors dog and break bottles on sharp bends in the road.
    Bukhari:V3B48N826 “The Prophet said, ‘Isn’t the witness of a woman equal to half of that of a man?’ The women said, ‘Yes.’ He said, ‘This is because of the deficiency of a woman’s mind.’”

  7. #7
    Senior Member
    Join Date
    Oct 2002
    Posts
    314
    Tedob1 are you saying my ZX81 with a massive 1k of Ram wasn`t cool???? And how about the Commodore Pet!

    I`m devastated....
    Quis custodiet ipsos custodes

  8. #8
    'The threat of cyber terrorism is not very real. If you add five bright guys from some extremist group with the same tools, how does that make it worse? Everybody is getting hit 40 or 50 times a day by all these other people.
    Just wait until someone steals and leaks the XP source code. Then people will realize that cyber terrorism is a possibility.

  9. #9
    Senior Member
    Join Date
    Oct 2002
    Posts
    314
    Soda_popinsky

    I`m curious as to what form you think this cyber terrorism is going to take?

    If the XP source code was compromised you still need to keep in mind that:

    a) Lots of companies (especially all the big ones) have all kinds of security mechanisms in place, besides locked down operating systems, to keep the cyber terrorists at bay
    b) Lots of companies don`t just use Windows, what about UNIX? MVS? etc ...
    c) The Linux source code has been out there for a while, and we haven`t yet seen a super linux virus destroying all in its path.

    So, I`m curious as to what you think might actually happen? I guess that you could have millions of machines turned into Zombies and then flooding the network with traffic, that might cause a few problems.

    Now, if someone was to have a way to screw up BGP and take out the major internet routers or something of this nature, this might have some effect, maybe...



    Quis custodiet ipsos custodes

  10. #10
    From my (limited )knowledge of the exploits that have been found without the source code, I would expect havoc from a entire leaked source. And bigger companies don't need to be effected, its the home users with their credit cards, the small buisnesses with no firewalls. And maybe the one stupid Microsoft secretary that downloads a trojan, and from there inside the network causes trouble.

    But I'm no expert at all, I myself don't hack, it's only my prediction. By all means I'm not saying I'm correct!

    About the unix source code being available- I know that there are exploits for it, but from what I know they aren't as widespread as the MS ones.

    Corrections welcome!
    Soda

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •