Home | Looking for something? Sign In | New here? Sign Up | Log out

Thursday, April 19

Handbook For Hacking

he word 'hacker' is used in two different but associated ways: for some, a hacker is merely a computer enthusiast of any kind, who loves working with the beasties for their own sake, as opposed to operating them in order to enrich a company or research project --or to play games.

This book uses the word in a more restricted sense: hacking is a recreational and educational sport. It consists of attempting to make unauthorised entry into computers and to explore what is there. The sport's aims and purposes have been widely misunderstood; most hackers are not interested in perpetrating massive frauds, modifying their personal banking, taxation and employee records, or inducing one world super-power into inadvertently commencing Armageddon in the mistaken belief that another super-power is about to attack it. Every hacker I have ever come across has been quite clear about where the fun lies: it is in developing an understanding of a system and finally producing the skills and tools to defeat it. .........

In the vast majority of cases, the process of 'getting in' is much more satisfying than what is discovered in the protected computer files. In this respect, the hacker is the direct descendant of the phone phreaks of fifteen years ago. Phone phreaking became interesting as intra-nation and international subscriber trunk dialling was introduced, but when the London-based phreak finally chained his way through to Hawaii, he usually had no one there to speak to except the local weather service or American Express office, to confirm that the desired target had indeed been hit. One of the earliest of the present generation of hackers, Susan Headley, only 17 when she began her exploits in California in 1977, chose as her target the local phone company and, with the information extracted from her hacks, ran all over the telephone network. She 'retired' four years later, when friends started developing schemes to shut down part of the phone system.

There is also a strong affinity with program copy-protection crunchers. Most commercial software for micros is sold in a form to prevent obvious casual copying, say by loading a cassette, cartridge or disk into memory and then executing a 'save' on to a blank cassette or disk. Copy-protection devices vary greatly in their methodology and sophistication and there are those who, without any commercial motive, enjoy nothing so much as defeating them. Every computer buff has met at least one cruncher with a vast store of commercial programs, all of which have somehow had the protection removed--and perhaps the main title subtly altered to show the cruncher's technical skills--but which are then never actually used at all.


Free Hacker ebook
Download Hackers_Handbook Here


0 Comments
Tweets
Responds

0 comments:

Post a Comment

.
Download by Label:
Recent Posts

Popular Posts

By Gould and Van Der Meer (Eds) | Springer | 2004-09 | 766 pages For 50 years, antibiotics have been dispensed like sweets. This must not be...

* Publisher: Springer * Number Of Pages: 462 * Publication Date: 2007-08-24 * Sales Rank: * ISBN / ASIN: 0387708405 ...

FREE DOWNLOAD PART  1-7 ENGLISH AND HINDI Here You can Download All series 1-7 of Harry Potter at one Place. Our Try to provide all book a...

The Wisdom of Alexander The Great: Enduring Leadership Lessons From The Man Who Created An Empire Ninety percent of the known world bowed to...

David Hoyle, " ISO 9000 Quality Systems Handbook - updated for the ISO 9001:2008 standard, Sixth Edition: Using the standards as a fram...

Best Seller Ebook