Home | Looking for something? Sign In | New here? Sign Up | Log out

Thursday, April 19

Handbook For Hacking

he word 'hacker' is used in two different but associated ways: for some, a hacker is merely a computer enthusiast of any kind, who loves working with the beasties for their own sake, as opposed to operating them in order to enrich a company or research project --or to play games.

This book uses the word in a more restricted sense: hacking is a recreational and educational sport. It consists of attempting to make unauthorised entry into computers and to explore what is there. The sport's aims and purposes have been widely misunderstood; most hackers are not interested in perpetrating massive frauds, modifying their personal banking, taxation and employee records, or inducing one world super-power into inadvertently commencing Armageddon in the mistaken belief that another super-power is about to attack it. Every hacker I have ever come across has been quite clear about where the fun lies: it is in developing an understanding of a system and finally producing the skills and tools to defeat it. .........

In the vast majority of cases, the process of 'getting in' is much more satisfying than what is discovered in the protected computer files. In this respect, the hacker is the direct descendant of the phone phreaks of fifteen years ago. Phone phreaking became interesting as intra-nation and international subscriber trunk dialling was introduced, but when the London-based phreak finally chained his way through to Hawaii, he usually had no one there to speak to except the local weather service or American Express office, to confirm that the desired target had indeed been hit. One of the earliest of the present generation of hackers, Susan Headley, only 17 when she began her exploits in California in 1977, chose as her target the local phone company and, with the information extracted from her hacks, ran all over the telephone network. She 'retired' four years later, when friends started developing schemes to shut down part of the phone system.

There is also a strong affinity with program copy-protection crunchers. Most commercial software for micros is sold in a form to prevent obvious casual copying, say by loading a cassette, cartridge or disk into memory and then executing a 'save' on to a blank cassette or disk. Copy-protection devices vary greatly in their methodology and sophistication and there are those who, without any commercial motive, enjoy nothing so much as defeating them. Every computer buff has met at least one cruncher with a vast store of commercial programs, all of which have somehow had the protection removed--and perhaps the main title subtly altered to show the cruncher's technical skills--but which are then never actually used at all.


Free Hacker ebook
Download Hackers_Handbook Here


0 Comments
Tweets
Responds

0 comments:

Post a Comment

.
Download by Label:
Recent Posts

Popular Posts

Tutorials | PDF | Various Authors | 326 Pages | 29.60 MB 1. Mmmmmotion 2. How I puppetized Charlize! 3. Out of Bounds Shadows 4. How to Crea...

Computer Security and Cryptography by Alan G. Konheim ( Hardcover - Jan 29, 2007 ) Updates readers of this book with all the tools, techniq...

he word 'hacker' is used in two different but associated ways: for some, a hacker is merely a computer enthusiast of any kind, who l...

# A GENERAL PROBLEM-SOLVING STRATEGY is outlined early in the text. This strategy provides a series of steps similar to those taken by profe...

MacMillan Reference Books (November 2003) | ISBN: 0028657187 | 1000 pages | PDF | 25,4 Mb Buddhism, according to the editor in chief of this...

Best Seller Ebook