• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 16:39
CEST 22:39
KST 05:39
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
TL.net Map Contest #21: Voting4[ASL20] Ro4 Preview: Descent11Team TLMC #5: Winners Announced!3[ASL20] Ro8 Preview Pt2: Holding On9Maestros of the Game: Live Finals Preview (RO4)5
Community News
Weekly Cups (Oct 6-12): Four star herO65.0.15 Patch Balance Hotfix (2025-10-8)74Weekly Cups (Sept 29-Oct 5): MaxPax triples up3PartinG joins SteamerZone, returns to SC2 competition325.0.15 Balance Patch Notes (Live version)119
StarCraft 2
General
5.0.15 Patch Balance Hotfix (2025-10-8) The New Patch Killed Mech! TL.net Map Contest #21: Voting Ladder Impersonation (only maybe) Weekly Cups (Oct 6-12): Four star herO
Tourneys
LiuLi Cup - September 2025 Tournaments Sparkling Tuna Cup - Weekly Open Tournament Master Swan Open (Global Bronze-Master 2) Tenacious Turtle Tussle WardiTV Mondays
Strategy
Custom Maps
External Content
Mutation # 495 Rest In Peace Mutation # 494 Unstable Environment Mutation # 493 Quick Killers Mutation # 492 Get Out More
Brood War
General
Whose hotkey signature is this? BW caster Sayle BW General Discussion Pros React To: BarrackS + FlaSh Coaching vs SnOw ASL20 General Discussion
Tourneys
[Megathread] Daily Proleagues [ASL20] Semifinal B [ASL20] Semifinal A [ASL20] Ro8 Day 4
Strategy
Current Meta BW - ajfirecracker Strategy & Training Siegecraft - a new perspective TvZ Theorycraft - Improving on State of the Art
Other Games
General Games
Stormgate/Frost Giant Megathread Nintendo Switch Thread ZeroSpace Megathread Dawn of War IV Path of Exile
Dota 2
Official 'what is Dota anymore' discussion LiquidDota to reintegrate into TL.net
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
SPIRED by.ASL Mafia {211640} TL Mafia Community Thread
Community
General
US Politics Mega-thread Things Aren’t Peaceful in Palestine Russo-Ukrainian War Thread Men's Fashion Thread Sex and weight loss
Fan Clubs
The herO Fan Club! The Happy Fan Club!
Media & Entertainment
[Manga] One Piece Anime Discussion Thread Movie Discussion!
Sports
2024 - 2026 Football Thread Formula 1 Discussion MLB/Baseball 2023 NBA General Discussion TeamLiquid Health and Fitness Initiative For 2023
World Cup 2022
Tech Support
SC2 Client Relocalization [Change SC2 Language] Linksys AE2500 USB WIFI keeps disconnecting Computer Build, Upgrade & Buying Resource Thread
TL Community
The Automated Ban List Recent Gifted Posts
Blogs
Inbreeding: Why Do We Do It…
Peanutsc
From Tilt to Ragequit:The Ps…
TrAiDoS
Customize Sidebar...

Website Feedback

Closed Threads



Active: 1213 users

History of Hacking (parts 1, 2 and 3)

Forum Index > General Forum
Post a Reply
Normal
Unforgiven_ve
Profile Blog Joined August 2004
Venezuela1232 Posts
May 21 2006 05:28 GMT
#1
a very interesting article...

Part1

Part 2

part 3

sometimes the genius of some people is simply amazing.

pd: lol @ the last coment in part 3.
:)
InToTheWannaB
Profile Joined September 2002
United States4770 Posts
May 21 2006 05:34 GMT
#2
for some reason i'm paranoid about clicking them links first lol
When the spirit is not altogether slain, great loss teaches men and women to desire greatly, both for themselves and for others.
Xeofreestyler
Profile Blog Joined June 2005
Belgium6772 Posts
May 21 2006 05:46 GMT
#3
Cool, thanks
Graphics
MaGnIfIcA
Profile Joined October 2002
Norway2312 Posts
May 21 2006 06:01 GMT
#4
Interesting stuff =)
Wannabe sMB member yo, so spankable-.-v;;
proTOSS[GER]
Profile Joined September 2004
858 Posts
May 21 2006 06:34 GMT
#5
Finally the true story.
That is many tank yes?
Wysp
Profile Blog Joined August 2005
Canada2299 Posts
May 21 2006 06:34 GMT
#6
watched this on TV a while ago, atleast they didn't make it into a drama like too many documentaries do.
an overdeveloped sense of self preservation
baal
Profile Joined March 2003
10541 Posts
May 21 2006 06:42 GMT
#7
really interesting
Im back, in pog form!
AngryLlama
Profile Joined September 2005
United States1227 Posts
May 21 2006 06:54 GMT
#8
nice, i just got done watching them all :D
nArAnjO
Profile Joined October 2002
Peru2571 Posts
May 21 2006 07:49 GMT
#9
got bored after the frist 1 minute and those dudes are ugly as fuck
aseq
Profile Joined January 2003
Netherlands3983 Posts
May 21 2006 08:27 GMT
#10
cool how those dudes all fit in with the hacker stereotype...what does it matter if they're ugly. Ur not gonna jack off no matter what they look like?
Unforgiven_ve
Profile Blog Joined August 2004
Venezuela1232 Posts
May 21 2006 09:03 GMT
#11
im amazed how americans reacted at those guys...read the coments at part 3.

they are fucking genius! you dont put the genius in jail...can u image the things that the guy would have done in those 5 years in jail??
:)
Paragon
Profile Joined February 2006
United States295 Posts
May 21 2006 09:28 GMT
#12
On May 21 2006 18:03 Unforgiven_ve wrote:
im amazed how americans reacted at those guys...read the coments at part 3.

they are fucking genius! you dont put the genius in jail...can u image the things that the guy would have done in those 5 years in jail??


At least we had computers!
Not that Subway Wouldn`t still be pro, just not as pro as other things.. It`d be the Mumyung of sandwich places, I guess. - SweeTLemonS[TPR]
Ack1027
Profile Blog Joined January 2004
United States7873 Posts
May 21 2006 10:39 GMT
#13
Wow I can't believe I finished watching that.

That was really interesting.
oHInsane
Profile Joined February 2005
France727 Posts
May 21 2006 11:24 GMT
#14
The whole movie is also available on some p2p as far as i remember.
Even if it is a little bit old, this document deals with many interesting things. The war-dialing stuff with the telephone hijack is really amazing and i mean it is where jacking began.

On a side not, i would like to talk about what's hacking now. I don't know if you have already been to the defcon which is a hacker meeting in california (i went there three years ago and it was settled in vegas). It is really interesting if you like all those hacking stuff even if it is now full of commercials and full of companies who are there to sell there last "imba-all-protecting-software". But if you know some guys there, they will lead you to some alternative meeting with various old school and new school guy who are really really amazing. I saw them playing a Capture The Flag and that was simply unbelievable. (- Capture The Flag is not the FPS thing in this case, it is just a bunch of hackers separated in two teams. Each team has a server with one special file on it, and you have to steal the file on the other server and at the same time protecting your file - ).
Nowadays, the security world is very fond of the Wireless network hack ( wardriving ) which reminds me of a combination of computer hacker and telephone hacker. If you don't know wardriving, it is just a way to penetrate wireless network. You just drive a car with a computer and wireless card and you're looking for wireless access point with it. You can enter the network of many areas that use wireless (like companies, free space, airport and so on).

I am not an expert but i am really interested by their spirit even if i sometimes disagree with all the "hack the world" and "everything free for all" propaganda around it, it is still interesting if you like computer science.

Now i don't want to bore you more than i did and i will give you some other links to videos. It is a mix of bumping-computer hacking stuff.

[vid] http://www.toool.nl/bumpkey-alert.wmv : How to enter any rooms .
[vid] http://www.phuzion.com/14/?p=tutorials&tid=7 : how to play flash games ?
[vid] http://www.google.com/search?hl=en&lr=&q=inurl:"view/index.shtml"&btnG=Search : just a foramted google request to access some security camera all over the world
[web] http://www.milw0rm.com : Some exploits.

I have many more links but hehe, it is a sc forum but those one are interesting i think.

Thanks to unforgiven for starting this thread!
mel_ee
Profile Blog Joined August 2003
2448 Posts
May 21 2006 11:39 GMT
#15
On May 21 2006 20:24 oHInsane wrote:
The whole movie is also available on some p2p as far as i remember.
Even if it is a little bit old, this document deals with many interesting things. The war-dialing stuff with the telephone hijack is really amazing and i mean it is where jacking began.

On a side not, i would like to talk about what's hacking now. I don't know if you have already been to the defcon which is a hacker meeting in california (i went there three years ago and it was settled in vegas). It is really interesting if you like all those hacking stuff even if it is now full of commercials and full of companies who are there to sell there last "imba-all-protecting-software". But if you know some guys there, they will lead you to some alternative meeting with various old school and new school guy who are really really amazing. I saw them playing a Capture The Flag and that was simply unbelievable. (- Capture The Flag is not the FPS thing in this case, it is just a bunch of hackers separated in two teams. Each team has a server with one special file on it, and you have to steal the file on the other server and at the same time protecting your file - ).
Nowadays, the security world is very fond of the Wireless network hack ( wardriving ) which reminds me of a combination of computer hacker and telephone hacker. If you don't know wardriving, it is just a way to penetrate wireless network. You just drive a car with a computer and wireless card and you're looking for wireless access point with it. You can enter the network of many areas that use wireless (like companies, free space, airport and so on).

I am not an expert but i am really interested by their spirit even if i sometimes disagree with all the "hack the world" and "everything free for all" propaganda around it, it is still interesting if you like computer science.

Now i don't want to bore you more than i did and i will give you some other links to videos. It is a mix of bumping-computer hacking stuff.

[vid] http://www.toool.nl/bumpkey-alert.wmv : How to enter any rooms .
[vid] http://www.phuzion.com/14/?p=tutorials&tid=7 : how to play flash games ?
[vid] http://www.google.com/search?hl=en&lr=&q=inurl:"view/index.shtml"&btnG=Search : just a foramted google request to access some security camera all over the world
[web] http://www.milw0rm.com : Some exploits.

I have many more links but hehe, it is a sc forum but those one are interesting i think.

Thanks to unforgiven for starting this thread!


those links, what do i do there? tips?
Behold the bold soldier, control the globe slowly proceeds to blow swingin swords like Shinobi
Orome
Profile Blog Joined June 2004
Switzerland11984 Posts
May 21 2006 12:10 GMT
#16
Very interesting, thanks for sharing.

Could someone, who knows something about the hacker "scene" explain a bit about how that scene works now? When I think of hacking, I think of people spreading viruses and the like, and I have a really hard time believing that they do that for a valid reason.
On a purely personal note, I'd like to show Yellow the beauty of infinitely repeating Starcraft 2 bunkers. -Boxer
Orome
Profile Blog Joined June 2004
Switzerland11984 Posts
May 21 2006 12:24 GMT
#17
On May 21 2006 20:24 oHInsane wrote:
[vid] http://www.phuzion.com/14/?p=tutorials&tid=7 : how to play flash games ?


What would be your motivation to hack a video game to get first in the ranking? Seriously, wtf?
On a purely personal note, I'd like to show Yellow the beauty of infinitely repeating Starcraft 2 bunkers. -Boxer
oHInsane
Profile Joined February 2005
France727 Posts
Last Edited: 2006-05-21 12:54:34
May 21 2006 12:52 GMT
#18
On May 21 2006 20:39 mel_ee wrote:
Show nested quote +
On May 21 2006 20:24 oHInsane wrote:
The whole movie is also available on some p2p as far as i remember.
Even if it is a little bit old, this document deals with many interesting things. The war-dialing stuff with the telephone hijack is really amazing and i mean it is where jacking began.

On a side not, i would like to talk about what's hacking now. I don't know if you have already been to the defcon which is a hacker meeting in california (i went there three years ago and it was settled in vegas). It is really interesting if you like all those hacking stuff even if it is now full of commercials and full of companies who are there to sell there last "imba-all-protecting-software". But if you know some guys there, they will lead you to some alternative meeting with various old school and new school guy who are really really amazing. I saw them playing a Capture The Flag and that was simply unbelievable. (- Capture The Flag is not the FPS thing in this case, it is just a bunch of hackers separated in two teams. Each team has a server with one special file on it, and you have to steal the file on the other server and at the same time protecting your file - ).
Nowadays, the security world is very fond of the Wireless network hack ( wardriving ) which reminds me of a combination of computer hacker and telephone hacker. If you don't know wardriving, it is just a way to penetrate wireless network. You just drive a car with a computer and wireless card and you're looking for wireless access point with it. You can enter the network of many areas that use wireless (like companies, free space, airport and so on).

I am not an expert but i am really interested by their spirit even if i sometimes disagree with all the "hack the world" and "everything free for all" propaganda around it, it is still interesting if you like computer science.

Now i don't want to bore you more than i did and i will give you some other links to videos. It is a mix of bumping-computer hacking stuff.

[vid] http://www.toool.nl/bumpkey-alert.wmv : How to enter any rooms .
[vid] http://www.phuzion.com/14/?p=tutorials&tid=7 : how to play flash games ?
[vid] http://www.google.com/search?hl=en&lr=&q=inurl:"view/index.shtml"&btnG=Search : just a foramted google request to access some security camera all over the world
[web] http://www.milw0rm.com : Some exploits.

I have many more links but hehe, it is a sc forum but those one are interesting i think.

Thanks to unforgiven for starting this thread!


those links, what do i do there? tips?


The first two ones are two videos, just watch them if you're intereseted.
The google one is used to find some badly protected security camera, you just have to click on the links returned by google and watch some cams (there are some american college cams, some useless ones, some scientifc ones to observe birds migration and so on...)
THe last one is just a database for computer science exploits. It is used to be aware of the last security flaws on many programs. You won't find anything interesting if you don't have an idea about the programs mentionned in this site.
On May 21 2006 20:39 Orome:
Very interesting, thanks for sharing.

Could someone, who knows something about the hacker "scene" explain a bit about how that scene works now? When I think of hacking, I think of people spreading viruses and the like, and I have a really hard time believing that they do that for a valid reason.


I am just aware about what is happening in France. The "scene" is according to me (there are many varaitions about its definition), a group of people that are bringing something new to the security world and that share it with a limited group of people who have found or who are working on various hacking projects.
I just know what is going on since the internet era (i mean i don't know anything about phone hacks and so on). So basically, there are many fields gathered around the hacking concept. At the beginning, like nearly 10 years ago, there were some computer science specialists who were trying to find some flaws , and to exploit them (or not) for different purposes: fun, money, helping people improving their sofwares. Since the beginning we can see two different groups.
On the one hand, we have the ones called the "white hat hackers", who are the one who are trying to find some flaws/exploits on a media (a software for example) and who helps the developpers to correct those flaws withour exploiting them. Typical example: i find a flaw on the teamliquid website that allows me to be an admin. I tell the owner of teamliquid that i found a flaw and how to correct it then he corrects it and everythoing is ok.
On the other hand, we have the ones who are finding flaws to exploit them for their own profit.They are called "black hat" ie: i find a flaw on the tl.net website, and i use it to erase all the forums posts.

And i should also mention some lame people (called "lamers") who are using other exploits for their own profit. IE: someone finds a flaw on tl.net and decides to release it on the web. Someone elese picks this exploit and uses it against tl.net for his own benefit -> lame. They call it lame cause it requires no skill.

Many hackers you will be heard of on tv or radion are lamers. They use an exploit or a virus made by someone else and spread them all over the world.

The real hackers, i mean the ones who really find something new, are a few. Mitnick was the most famous of them. I mean, he is a legend on the hacking world. According to me, his story inspired many hackers. Nowadays, most of those people are gathering around website, irc channels on the internet and are specialised on many different fields related to hacking. Coding, OS specialist, Carding, reverse engineering, Fingerprinting, Networking and so on to name a few.

sometimes they meet each other on some unofficial meeting. One of this famous meeting is called "2600" (google it to have more information). According to me , the art of hacking should be a challenge to find flaw in something that should not. Unfortunately, too much people used those well know flaws for their own profit. It is always a pain to see someone being mentionned on tv for spreading a virus that costs so much money and troubles for the users and for the companies. Most of the time, this guy just goes on milw0rm or nay other sites, picks an exploit which can damage Windows XP SP2 and puts it into a mail and sends it via mass emailing on the internet.


Now you can wonder why hackers who found an exploit release it on the Internet?
It is difficult to answer that. According to me, there are two things:
Firstly, he releases it just to be mentionned on an internet security website and to get some "glory".
Secondly, To be recognized as someone who is sharing his knowledge ( disclosuer rule).

I can talk about that more but i have no time at the moment. Maybe if someone is interested, i will continue.


camooT
Profile Joined October 2004
United States1354 Posts
May 21 2006 13:00 GMT
#19
this is one of the coolest tl threads ever. thanks ohinsane
Unforgiven_ve
Profile Blog Joined August 2004
Venezuela1232 Posts
May 21 2006 13:27 GMT
#20
some of the bests hackers want to stay "undercover".

maybe someone un tl is a supermegady3812812 hacker?!!?

SHOW YOURSELF!! YOU ENLIGHTENED MIND!!!!!

you are welcome oHInsane, and plz tell us more =)
:)
AK-Nemesis
Profile Joined December 2002
2005 Posts
May 21 2006 13:27 GMT
#21
thanks ohinsane. i'm interested. more would be great
Nemesis has left the building~
Orome
Profile Blog Joined June 2004
Switzerland11984 Posts
May 21 2006 13:33 GMT
#22
Thx oHinsane I'd be very interested in more information.
On a purely personal note, I'd like to show Yellow the beauty of infinitely repeating Starcraft 2 bunkers. -Boxer
oHInsane
Profile Joined February 2005
France727 Posts
May 21 2006 16:57 GMT
#23
Ok, so i will continue , and thanks for the support, it is always apprecitated

So as i said, to sum up a little bit, the "hacking scene" can be divided into two main streams:

- The "real" hackers: they usually have good/extreme computer knowledge. They can use this knowledge to attack and to make damages on a specific target (black hat hackers) or they can be hekpfull by warning software/network or any companies about some flaws in their product, security softwares etc (white hat hackers)

- The "lamers" who are the source of the majority of the attacks over the Internet. Those guys just use softwares coded by other people to look "cool", "1337" or whatever.
This category is a pure pain as i said. The main reason is that they bring nothing to the "hacking" community. And the second reason is that they give a "bad" image about what hacking is really.

So let's concentrate on the "real hackers". As someone said, some of them are working alone or with a little group and prefer staying "covered" by remainin anonymous. And a part of them releases and shares their discovery.
Those guys are working on different fields (i can just talk here about what i know):

Coding: being able to program is a "must have" tool. Basically, you can't be a hacker if you don't know what programing is. Why ?
Because in order to find a flaw in a software, you should be able to know what is happening in this software and how it works. Under the term "sofware", you can find usual soft like MS WORD, MS OUTLOOK, you can also find websites (which is an intenet program), you can also find Operating System like Windows, Unix (Linux), Solaris , etc... and you can also find network program like Apache. Basically, any services or program can be hacked. So imagine someone wants to hack a website and he knows this website has been built with "phpnuke" (which is program that allow you to make your own website in a short amount of time). The hacker will download "phpnuke" then he will check the source code (how the program is made) to find if there is something that can be a flaw for the website.
There are many possible flaws on a website portal. There are XSS flaws (which allows the hacker to introduce his own code on the website) , SQL Injection (which allows the hacker to interact with all the datas stored on a website like user password, user email and so on) , include flaws (which allows the hacker to execute his own program on the website, for example a program that will erase all the website), etc.... But don't misread me, i don't say every website has flaws, i just say that it is possible to find some of this flaw. You know a website has generally 100.000 + lines of code so it is reasonnable to think that the programmer could have made a little mistake while writing all those lines that would allow someone to find a XSS, a SQL Injection or anything else.

So coding is a key for a programer. As i said, it allows the hackers to understand how his target work, but it also allows a hacker to make his own program. For example, a hacker found a flaw on Windows XP that allows him to reboot the machine if he enters some specific data onto windows. He will then write a program that will automatically send this data and make his target rebooting. Here is a typical example of that with the "lsass" flaw that was found in Windows like 4-5 years ago ( you know it was known as the "sasser" worm). The idea still remains the same: Finding a flaw on a software then build the software that will exploit this flaw. (more details about sasser here http://www.osix.net/modules/article/?id=527 ).

Carding: this is something i don't really know well. Still, i just know the concept. The idea is to clone credit card (or any type of card but it is less profitable to clone a bus card than a credit card). This is very very VERY illegal so it is hard to find those guys and many of the websites are regularly closed. The last i hard of was carderplant and it has been closed for a while. The russians are really active (talk about russian mafia ??) into this area and most of the time, if they release websites about carding, it is all on russian so i can't get deep into it. As i don't know many things about pure carding, i won't go into the details. The ony way i know to steal credit card number is to keylog someone's else computer and get his credit card number back. A keylogger is just a program (as i said coding is the way to go) that will store everyting you can type and then send the content to the hacker. Usually those keyloggers are detected by antivirus cause their signature are easy to detect.

Reverse Engineering: This area is closely related to coding. It is just a way to find a flaw in a compilated sofware without having the source code. To sum it up fast, you can't read the source code on a compilated software (like word, brood war and everything you can install on your computer). So in order to know how the program is working you should disemble it (with a program). So basically, you will have something which is not the source but something (if you know how to read it) that will the hacker to know how the program is working. FOr example, this is what is usually done to make a cd key generator. The hacker disembles the program, then he will look for the procedure that will check the validity of the cd key. Then the hackers will extract the algorithm of the cd key validation and will build his own cd key generator.

Networking: Well, the idea here is to penetrate a network (ie the network of a private companie). That's where Kevin Mitnick (here is his story: http://en.wikipedia.org/wiki/Kevin_Mitnick ) was a master. The idea here is to allow you to remotely acces a network you should not have the right to access. There are many tricks depending on the network topology. One of them is the Man In The Middle (MITM). I like this example because it explains on itself quite well the ideology of attacking networks:
you have a network where a computer in a company ( A ) is sending/receiving information from the server of the companies that stores for example financile information about customers (B). And you are on other computer in this company.

So here is the idea of the MITM:
A <--------------------------->B
A <---------> C <----------> B
So you have make B believing you're A and at the same time, make believing A you're B and put yourself in the middle of their transaction. Then you just have to capture the traffic (with a sniffer) and pick the information you need in it.
One of the new field on the network attacks is the wireless network. The idea of this is to enter a wireless network outside ot the physic limitation but still in the range of the network. Let met explain. I know my neighboor is using a wireless internet connection and i want to use it too but he does not want me to do that. So physically, you're supposed to be out of the network since you don't live in your neigboor's place. But, the wireless acces point has a range of 35 meters so basically, you can be on its network range and so, you can be able to access the network. In theory, you just have to install a software that will find for you the password of the network and then you can go into his internet. Now, wireless protocols are being updated and it won't be that easy in the future but it is just the idea of the concept.

Fingerprinting: To penetrate a network or a computer, you will have to know which operating system your target is running. So there is a field called fingerprinting that deals with the art to guess which system your opponent is running. There are softwares like nmap for example that will guess your OS target by analyzing the network traffic (the TCP windows to go a little more into the details). For instance, you want to attack someone but you have to know which operating system he has because you're a pro to hack windows system but if it's linux, you're fucked. So to be sure he is uing windows, you launch a fingerprint on him then if it 's a WIndows system, you will be able to try all your fresh new hacking knowledgre to get into his system. This field is very difficult to understand since you will have to know mostly everything about computer networks (tcp/ip and so on) and many things about Operating System.

Ok there are many other fields but i just mention those to just give you an idea. Now, you should be able to understand that viruses are really not the mainstream for hackers.

I am done writing for the moment. So i am gonna give you some other links to illustrate different things i dealt with.
[vid] http://video.google.com/videoplay?docid=-1021256519470427962 : video that shows how to hack a wireless network
[vid] http://video.google.com/videoplay?docid=-7477301395023415733 : video that just shows some reverse engineering
[vid] http://video.google.com/videoplay?docid=3658264224674753229 : SQL injection
Unforgiven_ve
Profile Blog Joined August 2004
Venezuela1232 Posts
May 21 2006 23:38 GMT
#24
Mitnick guest starred in a first season episode of Alias. The casting was an in-joke, since Mitnick played a CIA hacker. Due to the conditions of his parole, however, the computer he used in the scene was a prop.

LOL, omg...poor guy
:)
Unforgiven_ve
Profile Blog Joined August 2004
Venezuela1232 Posts
May 22 2006 00:44 GMT
#25
there's a magazine from hackers to hackers :o.....also, hackers have many radio shows and internet TV shows all over the world :0
/me fears


2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well as general news concerning the computer "underground" and libertarian issues. The magazine is published and edited by Emmanuel Goldstein (a pen name of Eric Corley and allusion to George Orwell's Nineteen Eighty-Four), who is also the magazine's founder, and his company, 2600 Enterprises, Inc.

In the usage of 2600 Magazine and affiliates, the often loaded term "hacking" refers to Grey Hat hacking, which is generally understood to be any sort of technological utilisation or manipulation of technology which goes above and beyond the capabilities inherent to the design of a given application. This usage attempts to maintain neutrality, as opposed to the politically charged and often contentious terms White Hat hacking, which is designated as "hacking" motivated exclusively by good intentions (e.g. enhancing the performance of a device or exposing the vulnerabilities of a security system for the benefit of the system administrator), or Black Hat hacking, which is designated as "hacking" motivated exclusively by bad or selfish intentions (e.g. stealing useful information or exacting technological revenge through sabotage).

The magazine's name comes from the phreaker discovery in the 1960s that the transmission of a 2600 hertz tone (which could be produced perfectly with a plastic toy whistle given away free with Cap'n Crunch cereal—discovered by friends of John Draper) over a long-distance trunk connection gained access to "operator mode" and allowed the user to explore aspects of the telephone system that were not otherwise accessible. Mr. Corley chose the name because he regarded it as a "mystical thing," commemorating something that he evidently admired.

2600 has established the H.O.P.E. (Hackers On Planet Earth) conferences as well as monthly meetings in Argentina, Australia, Austria, Brazil, Canada, Denmark, England, Finland, France, Greece, Ireland, Italy, Japan, Mexico, New Zealand, Norway, Poland, Russia, Scotland, South Africa, Sweden, Switzerland, and the United States. The meetings take place on the first Friday of the month at 5 p.m. local time. 2600 meetings exist as a forum for all interested in technology to meet and talk about events in technology-land, learn, and teach. Meetings are open to anyone regardless of age or level of expertise.

2600 Films has made a feature-length documentary about famed hacker Kevin Mitnick, the Free Kevin movement and the hacker world, entitled Freedom Downtime, and is currently working on one titled Speakers' World.

Additionally, 2600 has been involved in many court cases related to technology and freedom of speech alongside the Electronic Frontier Foundation, perhaps most significantly Universal v. Reimerdes involving the distribution of DVD copy protection tool DeCSS, where courts upheld the constitutionality of the Digital Millennium Copyright Act anti-circumvention provisions.

Corley is also host of Off The Wall and Off the Hook, two New York talk radio shows. Both shows can be downloaded or streamed via the 2600 site.


thx wikipedia =)
:)
oHInsane
Profile Joined February 2005
France727 Posts
May 22 2006 03:12 GMT
#26
yes , 2600 is a really famous meeting which is now much more relevant than the "defcon" one.
Some of the 2600 people wrote and are still writing some webzines to release/explain some flaws/exploits/hacking state of the art paper.
You can find some of them here:
http://madchat.org/esprit/emags/

Most of those articles are very technicals but some of them are friendly readable if you can get into them a little bit.

Alborz
Profile Blog Joined March 2006
Canada1551 Posts
Last Edited: 2006-05-22 15:52:49
May 22 2006 12:42 GMT
#27
Kevin Mitnick is a true hacker
Great thread, thanks Unforgiven_ve
Resonate
Profile Joined October 2002
United Kingdom8402 Posts
May 22 2006 18:00 GMT
#28
sheeckret shoshiety!
Memory lane in nice
shinigami
Profile Blog Joined June 2004
Canada423 Posts
May 23 2006 13:24 GMT
#29
Wow, you cleared up a lot of myths I had about hacking, especially with your examples and explanations.

My respect for hackers shot up a several notches, except crackers.
They seem to have the easier job, which explains why many of us never had to pay for our software in years.
I was thinking about joining a debate club, but I was talked out of it.
Orome
Profile Blog Joined June 2004
Switzerland11984 Posts
May 23 2006 13:33 GMT
#30
On May 23 2006 03:00 Resonate wrote:
sheeckret shoshiety!


ahahahaha now that was a nerd
On a purely personal note, I'd like to show Yellow the beauty of infinitely repeating Starcraft 2 bunkers. -Boxer
Normal
Please log in or register to reply.
Live Events Refresh
Next event in 2h 22m
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
mouzHeroMarine 581
IndyStarCraft 126
JuggernautJason72
ProTech66
Railgan 55
Codebar 32
StarCraft: Brood War
Rain 1714
Larva 302
hero 246
Leta 242
Mini 123
Dewaltoss 118
ZZZero.O 45
sas.Sziky 41
NaDa 25
Movie 19
[ Show more ]
Shine 4
Dota 2
PGG 92
LuMiX1
Counter-Strike
shoxiejesuss658
Stewie2K460
Foxcn210
Heroes of the Storm
Liquid`Hasu542
Other Games
FrodaN2046
fl0m648
byalli285
Skadoodle249
Sick145
Pyrionflax142
ViBE63
markeloff59
Trikslyr41
Organizations
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 17 non-featured ]
StarCraft 2
• Reevou 6
• IndyKCrew
• LaughNgamezSOOP
• sooper7s
• AfreecaTV YouTube
• intothetv
• Kozan
• Migwel
StarCraft: Brood War
• STPLYoutube
• ZZZeroYoutube
• BSLYoutube
Dota 2
• Ler100
• Noizen46
League of Legends
• Doublelift2555
• imaqtpie2496
Other Games
• Shiphtur308
• WagamamaTV269
Upcoming Events
OSC
2h 22m
Replay Cast
2h 22m
The PondCast
13h 22m
OSC
15h 22m
Wardi Open
1d 14h
CranKy Ducklings
2 days
Safe House 2
2 days
Sparkling Tuna Cup
3 days
Safe House 2
3 days
Liquipedia Results

Completed

Acropolis #4 - TS2
WardiTV TLMC #15
HCC Europe

Ongoing

BSL 21 Points
ASL Season 20
CSL 2025 AUTUMN (S18)
C-Race Season 1
IPSL Winter 2025-26
EC S1
Thunderpick World Champ.
CS Asia Championships 2025
ESL Pro League S22
StarSeries Fall 2025
FISSURE Playground #2
BLAST Open Fall 2025
BLAST Open Fall Qual
Esports World Cup 2025
BLAST Bounty Fall 2025
BLAST Bounty Fall Qual
IEM Cologne 2025

Upcoming

SC4ALL: Brood War
BSL Season 21
BSL 21 Team A
RSL Offline Finals
RSL Revival: Season 3
Stellar Fest
SC4ALL: StarCraft II
eXTREMESLAND 2025
ESL Impact League Season 8
SL Budapest Major 2025
BLAST Rivals Fall 2025
IEM Chengdu 2025
PGL Masters Bucharest 2025
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2025 TLnet. All Rights Reserved.