Sunday, June 2, 2019

Hacking :: Hackers Computers Technology Safety Essays

whoopingContents This file will be divided into four partsPart 1 What is Hacking, A Hackers Code of Ethics, Basic Hacking SafetyPart 2 Packet Switching Networks Telenet- How it Works, How to Use it,Outdials, Network Servers, Private PADsPart 3 Identifying a Computer, How to Hack In, Operating SystemDefaultsPart 4 Conclusion- Final Thoughts, Books to Read, Boards to Call,AcknowledgementsPart One The Basics As long as there bemuse been computers, there have been hackers. In the 50sat the Massachusets Institute of Technology (MIT), students devoted much timeand energy to ingenious exploration of the computers. Rules and the law weredisregarded in their pursuit for the hack. except as they were enthralled withtheir pursuit of information, so argon we. The thrill of the hack is not inbreaking the law, its in the pursuit and capture of knowledge.To this end, let me tally my suggestions for guidelines to follow toensure that not only you stay out of trouble, but you pursue your craft w ithoutdamaging the computers you hack into or the companies who own them.I. Do not intentionally damage *any* system. II. Do not alter any systemfiles other than ones needed to ensure yourescape from detection and your future entrance money (Trojan Horses, AlteringLogs, and the like are all necessary to your survival for as long aspossible.) III. Do not leave your (or anyone elses) real name, realhandle, or realphone number on any system that you access illegally. They *can* andwill track you down from your handle IV. Be careful who you packageinformation with. Feds are getting trickier.Generally, if you dont know their voice phone number, name, andoccupation or havent spoken with them voice on non-info tradingconversations, be wary. V. Do not leave your real phone number toanyone you dont know. Thisincludes logging on boards, no matter how k-rad they seem. If youdont know the sysop, leave a note telling some authorized peoplethat will validate you. VI. Do not hack government com puters. Yes,there are government systemsthat are safe to hack, but they are few and far between. And thegovernment has inifitely more time and resources to track you down thana company who has to make a profit and justify expenses. VII. Dont usecodes unless there is *NO* way around it (you dont have alocal telenet or tymnet outdial and cant connect to anything 800...)You use codes long enough, you will get caught. Period. VIII. Dont beafraid to be paranoid. Remember, you *are* breaking the law.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.