White/Black-hat?

Discussion about hacker.org's server
The_Dark_Avenger
Posts: 115
Joined: Wed Jun 11, 2008 9:47 pm

Post by The_Dark_Avenger »

Do you know, what's the difference between you and usual people? In a certain point, nothing... You also obey the rules... It's not the first time you are talking about Jargon file. And so, Jargon file is a list of rules for you. I don't care at all what you will reply... You don't have a chance of becoming a hacker... At least now.
canine
Posts: 190
Joined: Sun Sep 14, 2008 5:38 am

Post by canine »

The_Dark_Avenger wrote:Do you know, what's the difference between you and usual people? In a certain point, nothing... You also obey the rules... It's not the first time you are talking about Jargon file. And so, Jargon file is a list of rules for you. I don't care at all what you will reply... You don't have a chance of becoming a hacker... At least now.
The jargon file is not a list of rules. It's a dictionary.

I don't worry about `becoming a hacker'. I am not a hacker, but neither are you. Becoming a hacker is not my principal goal. It's not a title to be acquired. It's something that's bestowed.

If you think breaking into a computer, or cracking passwords or the like makes you a hacker, you're wrong.

Also, it's almost impossible to become a hacker if you run windows principally.
WhiteKnight
Posts: 276
Joined: Fri Aug 15, 2008 8:21 am

Post by WhiteKnight »

canine wrote:
The_Dark_Avenger wrote:Do you know, what's the difference between you and usual people? In a certain point, nothing... You also obey the rules... It's not the first time you are talking about Jargon file. And so, Jargon file is a list of rules for you. I don't care at all what you will reply... You don't have a chance of becoming a hacker... At least now.
The jargon file is not a list of rules. It's a dictionary.

I don't worry about `becoming a hacker'. I am not a hacker, but neither are you. Becoming a hacker is not my principal goal. It's not a title to be acquired. It's something that's bestowed.

If you think breaking into a computer, or cracking passwords or the like makes you a hacker, you're wrong.

Also, it's almost impossible to become a hacker if you run windows principally.
Correction:

Windows can be used as a tool for hacking also.

More specifically for the definition of hack is on dictionary site of http://www.thefreedictionary.com/. I found the definition of hack: To gain access to (a computer file or network) illegally or without authorization.
canine
Posts: 190
Joined: Sun Sep 14, 2008 5:38 am

Post by canine »

WhiteKnight wrote:
canine wrote:
The_Dark_Avenger wrote:Do you know, what's the difference between you and usual people? In a certain point, nothing... You also obey the rules... It's not the first time you are talking about Jargon file. And so, Jargon file is a list of rules for you. I don't care at all what you will reply... You don't have a chance of becoming a hacker... At least now.
The jargon file is not a list of rules. It's a dictionary.

I don't worry about `becoming a hacker'. I am not a hacker, but neither are you. Becoming a hacker is not my principal goal. It's not a title to be acquired. It's something that's bestowed.

If you think breaking into a computer, or cracking passwords or the like makes you a hacker, you're wrong.

Also, it's almost impossible to become a hacker if you run windows principally.
Correction:

Windows can be used as a tool for hacking also.

More specifically for the definition of hack is on dictionary site of http://www.thefreedictionary.com/. I found the definition of hack: To gain access to (a computer file or network) illegally or without authorization.
That definition is incorrect.

Just because a definition is popular, doesn't make it correct nor valid. Believing that definition is like taking the Protocols at face value.

Just stupid.

Also, if you run windows principally, there's a ninety percent chance you're not a hacker. Until you run something like GNU or BSD, you'll be crippled in that regard. Cygwin is good too.
WhiteKnight
Posts: 276
Joined: Fri Aug 15, 2008 8:21 am

Post by WhiteKnight »

I guess I probably one of the 10% then. Just remember this, any tools can be used for hacking.

So is Wikipedia definition for hack is correct? The Jargon File, a compendium of hacker slang, defines hacker as "A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary." [1] The Request for Comments (RFC) 1392, the Internet Users' Glossary, amplifies this meaning as "A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular." [2] These hackers are disappointed by the mass media and mainstream public's usage of the word hacker to refer to security breakers, calling them "crackers" instead.
canine
Posts: 190
Joined: Sun Sep 14, 2008 5:38 am

Post by canine »

WhiteKnight wrote:I guess I probably one of the 10% then. Just remember this, any tools can be used for hacking.

So is Wikipedia definition for hack is correct? The Jargon File, a compendium of hacker slang, defines hacker as "A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary." [1] The Request for Comments (RFC) 1392, the Internet Users' Glossary, amplifies this meaning as "A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular." [2] These hackers are disappointed by the mass media and mainstream public's usage of the word hacker to refer to security breakers, calling them "crackers" instead.
This delights me so.

That is a flawless description.

And many tools can be used for hacking. But the state of windows as a closed source system limits creativity in programming to the point where a person who uses windows primarily is exceedingly unlikely to learn good hacking skills.
WhiteKnight
Posts: 276
Joined: Fri Aug 15, 2008 8:21 am

Post by WhiteKnight »

Then you'll have to tell me where does it limit. And I'll take a look at it.
canine
Posts: 190
Joined: Sun Sep 14, 2008 5:38 am

Post by canine »

WhiteKnight wrote:Then you'll have to tell me where does it limit. And I'll take a look at it.
On many operating systems, you can modify literally anything in the operating system.

Suppose someone is leeching off your wireless internet? How do you deal with it?

That is an exceedingly fine piece of hacking. True hacking. You have your system. It does one thing. You make it do another.

Brilliant.

With these operating systems, you're limited only by your imagination.
WhiteKnight
Posts: 276
Joined: Fri Aug 15, 2008 8:21 am

Post by WhiteKnight »

If someone leech off my family network then I just simply change the WEP code and if that doesn't work then I will turn them off by their MAC address if allowed. Also if they still survive that then I'll hack on them. This is how I deal with them on my family wireless internet.

With programming you already can do anything you like and you also change the way operating system work.
canine
Posts: 190
Joined: Sun Sep 14, 2008 5:38 am

Post by canine »

WhiteKnight wrote:If someone leech off my family network then I just simply change the WEP code and if that doesn't work then I will turn them off by their MAC address if allowed. Also if they still survive that then I'll hack on them. This is how I deal with them on my family wireless internet.
WhiteKnight wrote:With programming you already can do anything you like and you also change the way operating system work.
Nay, you can't change the way the operating system effectively, for you have no access to the internals.
WhiteKnight
Posts: 276
Joined: Fri Aug 15, 2008 8:21 am

Post by WhiteKnight »

Are you really sure about that?

Doesn't seems right....

Try looking into C:\Windows\System32\. It shows every components in the operating system and you can change in any manner you see fit on your operating system. Just like I did, restricted network communications for preventing security exploit.
canine
Posts: 190
Joined: Sun Sep 14, 2008 5:38 am

Post by canine »

WhiteKnight wrote:Are you really sure about that?

Doesn't seems right....

Try looking into C:\Windows\System32\. It shows every components in the operating system and you can change in any manner you see fit on your operating system. Just like I did, restricted network communications for preventing security exploit.
Sure you can fiddle with that stuff. You can overwrite all your important dll's with smiley face ascii art, or delete it all, but to modify it to do something useful, and not just brick your computer, you need to have access to the source code.
The_Dark_Avenger
Posts: 115
Joined: Wed Jun 11, 2008 9:47 pm

Post by The_Dark_Avenger »

canine wrote:
WhiteKnight wrote: but to modify it to do something useful, and not just brick your computer, you need to have access to the source code.
you can disassemble it
although, you gotta know assembly language pretty good to do something more advanced
canine
Posts: 190
Joined: Sun Sep 14, 2008 5:38 am

Post by canine »

The_Dark_Avenger wrote:
canine wrote:
WhiteKnight wrote: but to modify it to do something useful, and not just brick your computer, you need to have access to the source code.
you can disassemble it
although, you gotta know assembly language pretty good to do something more advanced
Theoretically it's possible, but in practice, disassembly is useless. You get poor code with useless symbol names. You can decipher what it does, modify it and recompile it, but that's nearly impossible. It's a waste of time.

Because of this lack of access to system internals, windows has terrible security problems.
WhiteKnight
Posts: 276
Joined: Fri Aug 15, 2008 8:21 am

Post by WhiteKnight »

But I replace the DLL therefore ending a lot of security blockades.
Post Reply