Typical Misinterpretation Of "Hacker" 334
PopStar writes
"Well, in accordance to the general population's
misunderstanding of the term "hacker", Kipling has
released a line of luggage which is aimed at script
kiddee's, called
The Kipling Hacker Collection.
Additionally, they have a hacker profile section, in
which they tell us what hackers look like, eat, etc."
I would suggest a boycott, but this stuff is stupid- I
wouldn't imagine a rational person buying it anyway.
But reading a bunch of cheesy stereotypes is amusing too.
Almost arrested because of this crap! (Score:1)
watch for the fallout and spin... (Score:1)
(hence my anoncoward login...)
We ceased the use of it (not worth the effort at the time), though we took note that "Spam spams Spammers Spam" would be a good description of the drama (or lack of).
They are sure to follow up with "the Troll", "the Programmer" and "the Software Engineer".
Good thing I will always be an "amateur professional programmer". It'd be hard to fit that on a backpack
Now we have a new word! (Score:1)
Kind of like "clueless", but more specific.
And the nice thing for them is: they certainly
already have products with the new word on
them!
Wizard (Score:1)
Modeled from "Hackers" the movie (Score:1)
Even better.. Microsoft?! (Score:1)
Give the cops a break (Score:1)
Give our boys in blue a break. It's hard to run a
police state with that pesky constitution getting
in the way all the time.
----
Well, at least now I can wear my backpack (Score:1)
If you wear a fanny pack -- check yourself.
Agreed.
brute force crack (tried) (Score:1)
Tester
that has got to take the cake for stupidity. (Score:1)
ummm.... the word lame comes to mind when viewing that stupid ass site. THEY NAMED FUCKING BACKPACKS AFTER "HACKER" JARGON. someone please just shoot us all now.
Stupid... BUT! (Score:1)
See, I want the hat. Well, I've gotten started on it. The relevent part that's taking me some not insignificant time is the function "decodeURL," which is basically just a bunch of math.
Basically, what it does is takes two static lists of digits (lpd_code_1[] and lpd_code_2[]) and then does things with them and the loginpassword key from expandKey, which is just a a2i (ascii to
integer) conversion from what the person wrote.
It's not PGP
One cannot just substitute a local class (if that's even doable...) for decodeLP(this), which one kinda wants to return true, because it also needs to have a lp_this.href that gives the URL for the new document.
If I get it I'll post it, but only I get the hat. I'll probably quit right around the time I realized that I could be making $100 an hour consulting for companies who make stuff like this, and it's taking me many hours to get a $50 bag
I expect that it'll hit me soon after I quit, or I start writing a script to try everything.
PS: I don't think the system is robust enough - at first glance, it appears that it will give false positives, but return a 404. 64 characters max in the URL, also. Possibly 64 characters guarenteed. What do browsers do with trailing dots, spaces, returns or slashdots?
2600 and the IS Field (Score:1)
My god, I have finally seen a site that I hope ends up on 2600's Hacked sites list.
This is pathetic.
The scary thing is, I know of many people who believe in the stereotypes of a computer hacker. I almost lost a job once because I used the sentence, "I guess I will need to hack up some code."
How many of you had to explain to a PHB type, why your self taught skills are better than a recent college grad, or you say on an interview that you have been invololed with computers all of your life and they then proceed to ask you what job you gained this experience. My favorite one is...
PHB: I see that you have listed TCPIP as a skill
I can not seem to locate it in your resume where did you actually used it?
I usually refer them to my 4 years of Admin experience and then my other 10+ years of computer use. I then explain to them that in order to be a unix admin you have to use and understand tcpip completly. I then mark them in my consulting firms that can go to hell category.
-dhh
But where's the Slashdot Fanny Pack??? (Score:1)
It would be called the slashdot effect....it would be a big ass bag full of bricks that keeps knocking things down with it's amazing power
AOL hackers (Score:1)
hehe....k33p1n the war3z phr33 for all the l33ts in d4 hauZ!, LOL....i love my freinds at school when they brag about who kicked who of off aol, mabie i should show them a lesson with my 3r33t k-r4d l1nuX bawX
Hackers? Maybe it should be SLACKERS!! (Score:1)
How about suckers....
Hacking Game? (Score:1)
Forget the game. I wanna take that site down! Who's with me?
I am a Hacker (Score:1)
To be honest, it has been so long that I have had to configure a modem....
But then again, I reconfigured my quasi-router ( POS !!@#!@#$@# ) webramp today, NAT decided to die. I know linux will do that. But this was cheap and it has worked for 2 years without a flaw. Plus the multiple modem support is nice. I guess that makes me 31337!
Well you have to think of one thing. The media does read this page once in a while. I was watching CNN the other day and saw slashdot on there. I forgot what it was over but it was not linux related. So maybe some PHB figured out that if they pissed of a bunch of "Hackers" the 18 and under group would buy their backpacks and think they are cool. So they get free advertising. It does seem like the webpage targets that age group.
Laters
Find the username/passwd (Score:1)
Peoples, you don't need to learn Javascript. if you know C you should be able to translate it. I'll admit to being a Basic/Pascal loser (haven't had time/paitence/desire to learn C or Java) and I can pick out the basics, a simple brute force routine should suffice. It even gives you the lengths (16 Login 4 Pass) and the acceptable chars!
But where's the Slashdot Fanny Pack??? (Score:1)
Me being from the Banana Republic and our currency being in small marble sized balls. So we call them ball sacks. hehehe
Configuring PPP (Score:1)
Other types of hacking gear... (Score:2)
hacking coat, jacket: a sports coat suitable for use when riding, often tailored in a tweed with vents at the side or at the back.
Hacking through the trees, I suppose, since I haven't seen RMS or ESR in one...
Site to send in comments to Kipling. (Score:1)
Here is the comment page [kipling.com] for "what you think of Kipling".
Use it wisely folks. Don't just say "you suck." Explain yourself slowly and carefully.
Re: (Score:1)
I am a Hacker (Score:1)
I suspect the experiance (read: trauma) of configuring PPP on Linux would leave just about anyone humourless...
...just venting my PPP gripe I've had a for a while. It's easily the worst thing that an average Linux user needs to do.
Jargon file on "Moof". (Score:1)
The third definition, the one that matches the Kipling useage, is said to be used within the MSN community: 3) verb, on The Microsoft Network, the term 'moof' has gained popularity as a verb meaning 'to be suddenly disconnected by the system'. One might say 'I got moofed'.
I doubt that anyone here would admit to having used it in that sense. ;-)
A Wonderful Idea! (Score:1)
marketing - bah! (Score:1)
Richard NIXON invented HACKING ! (Score:1)
Looks like IDEA crypto (Score:1)
The C source on this page looks very similar to the JS code on Kipling's site.
- Bunco
misspelled organizer (Score:1)
I looked at a couple of the bags and they had organiser pockets or something like that.
Organiser is not a word.
-Doug
Stupid... BUT! (Score:1)
While that in and of itself seems rather dumb, take a look at the sourcecode.
It's all done in javascripting, including the comparison of the username/password.
I have very little experiance in Javascripting, but i'm going to spend some time trying to reverse engineer the thing! make a REAL hacking contest of it.
Hey, I'll buy a slashdot hat for anyone who can either figure out the username/password from the javascripting, or bypass the check completely.
A little clarification (Score:1)
Just to clarify, I'm only offering the hat to the FIRST person to get it, and either post on slashdot, or e-mail me directly.
Hack! Hack! Hack! (Score:1)
It could be HackerCollection, HACKERCOLLECTION, hackercollection, or even HaCkErCoLlEcTiOn
Better definition (Score:1)
We should get a bunch of those bags, and make a bitchin beowulf cluster.
What word should we use instead of hacker? (Score:1)
Unfortunately, as others have posted, there's no convenient replacement word for "hacker", so if we let it take on bad connotations, we'll have to find another term to describe ourselves. "Expert computer programmer" is just too long. "ECP" maybe?
-Jake
What word should we use instead of hacker? (Score:1)
Just one of the many sad examples... (Score:1)
Take a look at some of those fashion shows on TV and you'll see more examples of people trying to cash in on the "hacker" phenomenon (really, hasn't the whole thing gone on for too long a while already?)
FYI: I first saw those bags at their store at one of the more expensive shopping malls in Hong Kong.
No, I didn't buy them - I'll stick to the Ralph Lauren backpacks thank you...
Aside: In reference to one of the posts - just exactly how far back do you have to go to draw the line between "old school" and 3l33t dUdes? (it just doesn't look right without 25x80 screen font...)
Maybe someone (I might, if sufficiently bored) should do a java program that displays Slashdot in "old school" ANSI... (If there's one around, tell me please?)
Speaking of hacking, just how well can a Linux PPP firewall box protect a win95 machine from the various "hacks" (e.g. ping flood?)?
I am a Hacker (Score:1)
-lqh
---
Hacker Anti-Defamation League (Score:1)
The Hacker Anti-Defamation League [xoom.com]
Brian
a good use for the slashdot effect (Score:1)
Bletch.
a good use for the slashdot effect (Score:1)
I think they're getting "hacker" confused with "cracker" most of the time. I say we kill it with the almighty Slashdot Effect! Let them all tremble at our might and magicks!
brute force crack (Score:1)
So, lets look at this from a cracker standpoint. 127 characters are allowed, 20 positions they could be in, which means there are only 2540 possibilities.
That makes it a trivial task to try every one of those keys, decode it with their script, and get the Url. Then you hit their server with the url, if it comes back 404 not found, too bad, but if it hits one of the two "winner" urls, I get a cookie. And a slashdot hat.
On my system, running at 300 mhz, it should take less than 20 minutes to go through all possible combinations. The hard part is writing code to do it, becuase I hate javascript with the passion of a thousand white-hot suns. Hm. Maybe I'll just do it in Perl.
There's probably an overt weakness in the encoding, too, but the cryptotext is the password itself, and I don't know either the plaintext or the cryptotext. Just the key. That makes it a bit more complicated.
More news to come...
Patrick N. Fitzgerald
Kipling a sheep (Score:1)
Or maybe it could be a euphemism for a server being brought down (via cracker, slashdot effect, whatever) in a brutal and terrible manner because of the stupidity and banality of its content. Like "whoops... looks like after Rob put the story up, the server got kiplinged in 15 minutes."
heh.
And if we got a story posted on slashdot with the title "New jargon phrase" it would get snapped up by the big news sites. I like that idea. Of course, that's just my own little sadistic side. Death, pain and suffering to the infidels!
brute force crack (Score:1)
I would say, however, that its pretty damned likely that the username/passwd combo is based on dictionary words, since we're supposed to "guess the password". Running crack on it might be a good idea. :)
Or, there's always the "root the server" option.
And never underestimate the "torturing sales clerks" options. Like, for example, show up every day, look around, say "I'm just looking" for about an hour or two. Every day. Try on backpacks. Inspect wallets. Tell other customers just how shoddy the goods are. Sing show tunes, loud and off-key. None of it is strictly illegal, so I bet after a week or two of this, they'll break down. Oh yes, they'll break. {evil grin}
True crackers don't just use computers to gain access.
/. their comment form - but with a purpose. (Score:1)
"Drop the Hacker line. It's just spreading the misrepresentation of the word hacker. Some of your gear isn't all that bad, but as long as it's under this label I won't buy it or anything else from your company."
Be truthful on all the info on the form so that they get the point and don't just erase all the responses dismissing them as we've so quickly dismissed "script kiddies".
Someone pointed out that
Just an idea...
Utilitarian GeekWear... (Score:1)
j------
marketing crap aside.. some of the bags are neat! (Score:1)
Hey if anything, putting a name on all these bags makes it easier to order 'em in if you were gonna be buying one.
Moof? (Score:1)
Moof? (Score:1)
Who here has used the term to 'moof' when you get accidentally disconnected from the 'net?
Me neither. I think they pulled it out of their netherregions.
http://www.kipling.com/hacker/collection/moof.h
'Moof' is, in fact, a reference to Clarus the Dogcow. Duh.
http://developer.apple.com/dev/dts/dogcow.html
Idiots...
- Darchmare
- Axis Mutatis, http://www.axismutatis.net
Utilitarian GeekWear... (Score:1)
'Hackers' aside, what kind of crap do people use for the more utilitarian side of things? Like, my PalmIII has a nice leather case that I sometimes wear. I imagine if you have a laptop, there are numerous things you can do to strap it onto your body if you're taking it from place to place (I hate standard laptop carry-bags). I think I've seen some strap-on (hold the jokes, please) laptop bags that go on much like a backpack, but without the extra bulk.
I'd rather keep my hands free, if possible. Who caters to those who need to carry around a Powerbook or Libretto but don't want the standard carry-bag type setup?
Style doesn't matter, although black leather looks nice...
- Darchmare
- Axis Mutatis, http://www.axismutatis.net
Dumb *AND* Sexist? (Score:1)
Description: Flat wallet for boy's pocket.
All that and no space for my Libretto!
Harder than that... (Score:1)
The URL... (Score:1)
my gawd. (Score:1)
"It's not a cookie, it's fruit and cake". *grin*
hehehe... (Score:1)
More analysis of game algorithm (Score:1)
-Ragnarok
More analysis of game algorithm (Score:1)
-Ragnarok
But where's the Slashdot Fanny Pack??? (Score:1)
1. Brit. coarse sl. the female genitals.
2. US. sl. Buttocks
But where's the Slashdot Fanny Pack??? (Score:1)
And when will Americans realise that the entire rest of the English speaking world have an entirely different definition of the word "Fanny"?
Oh well at least it keeps me vaguely amused.
They screwed up! (Score:1)
Which looks hard to figure out, but isn't. Just write a simple page, use:
<form name=backdoor>
<textarea wrap=virtual name=showme rows=70 cols=50></textarea>
</form>
to write a text area, open up a script below that, paste in lines 304-458 and get rid of line 440 from their script (that is put in all of the code relevant to creating those arrays) and then read it into that text-area with:
resultstring = "";
for (index = 0; index < 64; index++) {
resultstring += "" + index + "\t" + lpd_code_1[index] + "\t" + lpd_code_2[index] + "\n";
}
document.forms.backdoor.showme.value = resultstring;
and you get the contents of those codes. Now try to figure out what you need to build "http://" and you quickly find that the fscking idiots forgot to include ascii character 112 (and even 80) so there is no "p" (or "P" in case IE forgets that it is supposed to be case-sensitive) so there is no way to build that string.
In other words there *IS* no name/password combination that will work.
How lame can you get?
Ben
Erm (Score:1)
The contents of those arrays depends on the password's expanded form in a non-trivial way.
Brute force looks simplest.
Ben
Definition of "Hacker" changing, face it (Score:1)
We already have a definition! (Score:1)
Tell everyone to look at the Hacker Dictionary, volume II. Or view it online by looking for "jargon file".
'nuff said.
This is just more food for ZDNet to use.
--
WRONG! (Score:1)
For instance, if my mom and her friends started calling cheese graters "floppy drives" that doesn't make it right. But if everyone else started calling cheese graters floppy drives you would be the one who was an idiot for still calling them cheese graters, as you would not be speaking the same language.
(is "flurb" a correct usage here just because I used it?) No, because no one else understands what you mean.
cracked it! (Score:1)
cracked it! (Score:1)
I just got an email! Their sending me a bag!
hahahahahahahahahahahahahahahahahahahahahaha!
GET OVER IT (Why?) (Score:1)
The definition of the word has not changed (at least not per se). It merely has developed a -really bad- stereotype. For example, let's take the word "communist" for those of you who lived through the Reagan era here in the US. What did "communist" mean back then? Did it mean "a person belonging to a political party that strives for equality of the working class by means of community wealth and shared means of production"? Or... did it mean "those godless bastards that want to enslave our children and take away the world's freedom"?
Imagine yourself as a communist living in the US during that era. You don't have any problem with families or religion, and wonder why the word you use to describe yourself has become so profaned in the last five decades.
There are lots of other stereotypes that could be drawn based on what a person calls himself or herself, but that doesn't excuse the fact. We, those who consider ourselves "hackers" really, honestly DO NOT like to be thought of as "a malicious computerexpert (sic) who breaks the security of computer-systems (sic) not to steal or destroy sensitive information but mostly just for the kick." It was our word first, just like "communist" belonged to the communists first.
If you agree with me, join the Hacker Anti-Defamation League [xoom.com]. If you don't, I honestly feel sorry for someone so narrow-minded.
The following sentence is true.
The previous sentence is false.
Oh you poor things (Score:1)
|....|.....|.....|.....|..|..
|....|.....|.....|.....|..|..
|......................|..|..
|......................|..|..
|......................../...
|......................./....
Do I make myself clear?
The following sentence is true.
The previous sentence is false.
Old news... (Score:1)
It's already been done... many years ago. A card with a boy asking a girl, "Do you like Kipling?" Her reply: "I don't know, you naughty boy, I've never kippled!"
* SIGBUS can't remember where he saw it, but it was in print somewhere...
--
Official definition of a "Kipling" (Score:1)
What they really need... (Score:1)
Emp shielded pockets, hidden capacitors wired into
the cuffs for those friendly handshakes.
Plenty of spacious pockets for all your needful tools and toys.
Made from durable spiderweave armor to resist letter opener to the ribs from vengeful users.
And of course the camel w/ straw a'la stillsuit for that emergency supply of your favorite caffeine.
Dang me, I think you have something here!
~Grell
It was a typical net.exercise -- a screaming mob pounding on a greasy
spot on the pavement, where used to lie the carcass of a dead horse.
WRONG(ish)! (Score:1)
If so, I have to argue that common usage means a heck of a lot. Everything, in fact, because language is generally about communicating meaning in a consistent and reliable fashion. "Languages" are also, as I understand this from my linguist friend, defined in part by their capacity to change. A language that doesn't change from time to time for whatever reason is, by that definition, dead.
In the 23rd century, maybe they will be calling cheese graters floppy drives for some crazy reason, and if saying "floppy drive" to a reasonably acculturated person chosen at random on the street makes them think of shredded cheese, well, guess what? "Floppy drive" will have come to mean a thing that you use to grate cheese.
In this case, I think we have to acknowledge that the word hacker is no longer owned by hackers because it has passed into common parlance.
With all that said, here are two reasonable representations of "common usage":
From Merriam-Webster Online:
Main Entry: hacker
Pronunciation: 'ha-k&r
Function: noun
Date: 14th century
1 : one that hacks
2 : a person who is inexperienced or unskilled at a particular activity
3 : an expert at programming and solving problems with a computer
4 : a person who illegally gains access to and sometimes tampers with information in a computer system
I don't think there's an organization in the United States that could lay valid claim to canonical authority, considering the plethora of conflicting style-guides and so on. In this case, though, I think most would agree that Meriam-Webster is certainly respectable, and could lay claim to having their finger on the pulse of common usage. Unfortunately, the Oxford English Dictionary isn't available for online perusal, because they could lay claim to representing the parent dialect.
But what the M/W definition represents is a marginal victory for hackers of the benign variety, as does this one, from the Wordsmyth English Dictionary and Thesaurus [lightlink.com]:
hacker
SYL: hack-er
PRO: hae kEr
POS: noun
DEF: (informal) 1. a computer programmer who is expert at correcting programs, and who is perceived as an obsessive or reclusive person devoted solely to computers.
DEF: 2. a computer user who is able to penetrate carefully protected computer networks, such as those of a government.
In both definitions, we see both definitions living side by side, with an edge in precedence given to the more benign variety of "hacker."
I'm curious, by the way, what you call the American Civil War. Here in Virginia, some of the locals still call it something other than the Civil War, and they, since they're the descendents of the ones who rebelled and even started the armed hostilities, ought, following your logic, to be the ones who get to decide what it's called. That's a perogative most textbooks written to sell in California and Texas (which is to say "most textbooks") deny them.
I guess I'm just fine with everyone thinking "hacker" means vandal, anyhow. It doesn't change what I do one bit, which lately involves hacking on a nasty bit of proprietary software at work that made the mistake of using .dbf files even as the marketing droids try to sell us a multi-$1000 "conversion package." No coding is involved, just widespread spoofing of some indexes the designers must have thought others would be too dense to find. When I'm done, the taxpayers around here will have saved thousands of bucks, instructions on how to do what I did will be sent to other customers of the company that inflicted the horrible blob of code on us all, and I will remain a "non hacker" because there aren't any around here to confer the honor, which I understand is one of ESR's requirements for the title.
Guess I'll just have to wait for a local certification board to form.
I'll also wait to call what I'm doing "a hack," because that would upset the boss. I'll just call it "flurbing" and tell him it's a geek word for using something for other than its intended purpose.
----------
mphall@cstone.nospam.net
1 r34Z0N... (Score:1)
----------
mphall@cstone.nospam.net
Stupid Marketing Techniques (Score:1)
Are we now getting to the point where the fashion of the geek scene becomes that important?
Nope, sorry, taken... (Score:1)
Can't use God. That's reserved by us SysAdmins.
-Erik
Yes, it does... (Score:1)
Of course that is important. However, you know you're not supposed to discuss this in an open forum. Smoke-filled rooms, only.
Didn't you get your Official Eric Conspiracy Kit(tm) in the mail?
-Erik (the one, true way to spell it.)
distributed crack.. (Score:1)
--Ivan, weenie NT4 user, Jon Katz hater: bite me!
Is this just a backpack company?? (Score:1)
They're just trying to sell backpacks.
Good ploy, tho. Probably will trick lots of kiddies into buying back packs. Or rather, have their parents buy them one.
Hehehehe.
Yes, but.... (Score:1)
At least this way you might not get filtered out as an ac. *shrug*
Well...Hmm...That doesn't sound so bad. (Score:1)
That would just be further motivation NOT to log in.
Sounds good to me :p
Anyway, seriously. I don't really have a huge problem with ac posts. I choose not to filter them out, even tho most of them just add noise.
This would at least be an option for you ac's who want to post but don't want to be filtered out. You could be translated and just snickered at.
Point is, don't expect to be taken seriously unless you put your name behind something. I'm not filtering ac's now, but if things don't clean up a bit, I might. *shrug*
What is worse, being filtered out or being laughed at?
Ummm...yeah....Think again. (Score:1)
The point is no one is really "standing" behind their posts here, we gain no security, there is NO BENEFIT to forced logins--so why do we have them?
If you will recall, never did I suggest that you HAD to get a login. As a matter of fact, I even pointed out that I don't filter you idiots out. Yet.
The benefit of having a login is that fools who would normaly post mindless crap might worry a bit more about their reputation. Also, we can much more easily ignore posts by people who do have a login but who post crap (ie MEEPT. And you can't tell me the reason he/she/it didn't leave was because we could all ignore him/her/it).
So you don't want a login. Fine. I'm not going to loose any sleep over it, but I would still like to be able to translate you into 31137 script. At least it would make me laugh. And I wouldn't have to filter you out.
Right. (Score:1)
How does a login help this? Just change your login from time to time. It just makes it more troublesome, that's it.
Well, I guess you are right. There is no real way to stop your stupid posting but filter out all ac's.
You are still missing the point here. Hoping that a translation feature will encourage people to get a login is secondary. I just pointed out that it would be funny. If you are scared that people wont take you seriously, that is your problem. Not everyone has to use the translations. The only people who will use it are the ones who wouldn't take you seriously anyway.
An idea for a /. customization. (Score:2)
it would be even less reason to take them seriously.
Hack! Hack! Hack! (Score:1)
The character set I'm using consists of ASCII 32-126, inclusive. Anything else would be hell to type in on the keyboard.
Yes, it's slow. Yes, it's inefficient. But I've just gotten the partial C translation from Tester's post, and I'm going to work on putting all of this in good ol' C.
If this particular search doesn't work, I can just modify the schtuff to additionally search the "login" keyspace. But I _really_ don't wanna do that... (14 more characters to deal with! ACK!)
If I find anything, I'll post again to this thread...
Good luck, everyone!
--W
Find the username/passwd (Score:1)
Hat off to you, I'm sure all cops go by the book. (Score:1)
Don't know about you, but when the authorities are on you, you cooperate. Period. I'm not sure if you're aware of it, but people do get busted for something as "stupid" as ignoring a police officer. Guess it must depend on the mood of the officer.
On the topic of "probable cause", the officer's probable cause is what he or she believes may have been a crime committed recently or if there is the posibility of a crime being committed. If they think you robbed a store, they'll question you. If they think you're resisting them, prepare for a bad day.
And yes, it DOES suck that "hacker" has been poisoned by the media, by that stupid movie, and by people who don't understand. But it IS poisoned. And if for those who want to go out there and fight the mob effect, go right ahead. Chances are, you're better off looking for a new banner to ride under in the public eye.
Just because you think you have rights, doesn't mean you will always have access to them. Your right to freedom, to live, to life. It can all be taken away as easily as someone getting shot. Mistaken. Stabbed in the back. Or just thanks to ill-meant clerical errors.
Yeah, people have rights. But unless you believe 100% that whomever it is who's denying you your rights will respect you, be they cops, thugs, or the media, you will be up for a fight.
If you're the kind of person who fights for their beliefs and rights, my hat goes off to you. That is by far a much braver thing than I can afford to do.
- Wing
- Reap the fires of the soul.
- Harvest the passion of life.
stockholm syndrome , buddy...? (Score:1)
Is this XOR? (Score:1)
P ^ Key = C;
C ^ Key = P;
So all one has to do is figure out the length of the key. There is a method to do that called counting coincidences (breifly explained in Applied Cryptography, a wonderfull book). Then shift the ciphertext, C, by the length of the Key and you effectivly have P ^ (P shifted the length of Key). With this infomation (ASCII ^ ASCII), we should significantly reduce the possible choices and be able to pick the correct plaintext, P.
Or not. Maybe I'm just tired....or missing something. I'll look in to it tomorrow after class if no one has figured it out by then.
--
Four years in jail
No Trial, No Bail
*** FREE KEVIN *** [kevinmitnick.com]
Is this XOR? (Score:1)
--
Four years in jail
No Trial, No Bail
*** FREE KEVIN *** [kevinmitnick.com]
Is this XOR? (Score:1)
(NOTE: this example is random Key XOR'd against ASCII text, this is different then the percentages for this contest. This also assumes that the key is small.)
1) Discover the length of the key using process known as counting coincidences.
XOR the cyphertext against itself shifted various numbers of bytes and count those bytes that are equal.
If the displacement is a multiple of the Key length then > 6% of the bytes are equal.
If it is not a multiple then less then 0.4 % are equal.
This is called then index of coincidence. Take you smallest displacment (the one w/ greater then 6%), this is the number we want for step 2
2) Shift the ciphertext by that length and XOR it with itself. This removes the key and leaves you with plaintext XOR'd with the plaintext shifted the lenght of the key (the number we found).
3) The fun part.
English has 1.3 bits of real information per byte, so there is plenty of redundancy in order to find the exact plaintext.
Remember we are only dealing with ASCII here. The percentages are different, but the concepts are the same. Thanks Mr. Schneier!!!
--
Four years in jail
No Trial, No Bail
*** FREE KEVIN *** [kevinmitnick.com]
What word should we use instead of hacker? (Score:1)
We all obviously qualify for it now, and it has no mainstream definition yet.
They have a guestbook.... (Score:1)
Just a little annoying for my tastes. (Score:1)
They also have a fine collection of movies that I'm not going to bother wasting my bandwidth to download..
Oh well.
a good use for the slashdot effect (Score:1)
"I was going to hire him yesterday, but then I caught him kipling with a sheep in the yard..."
I would imagine it would be easy to get it in common usage.. just tell a few braindead media types that its official "hacker jargon".!
RE: cracked it! (Score:1)
but you still need the login and pass
look at them el33t hax0rs (Score:1)
After the movie Hackers every fucking soul on the face on the planet has this huge misinterpritation. At school the other day there were a couple chicks who thought I was cool based on the fact I claimed to be a hacker. Since when do I break into systems? Jesus Christ. Time for a little revolution!
-Kp2
Hackers? Maybe it should be SLACKERS!! (Score:1)
What's the commercial world coming to? Naming BACKPACKS after "firewalls" and other computer terms?????!!!
Anyway, all of the "hackers" (actors) look more like slackers from a SURGE!!!!! commercial. Yeah, they're c00l d00dz!!
Well, isn't that cute... (Score:1)
Personally, I get my backpacks and other such storage gear at camping stores, probably much higher quality equipment and no stupid marketing schemes. I like my day pack, balanced like an internal frame pack, can accept an internal frame, 40 Liters of space, came with a Platypus (more commonly known as a Camel back sans insulation, so I get 2.5 liters of pure hydrating enjoyment), and it is also a technical bag, so it does what I need it to. Features like this are pretty common in most backpacks you find in camping stores. Backpacks like mine are also really comfortable, easier to carry and a lot more rugged (tear resistant fabrics).
You know, this really parallels M$ vs. Linux...
Backpacks for the Outdoors vs bags based on a stupid marketing scheme.... Sorry, I couldn't help myself.
ph43drus
Uh hu (Score:2)
No Subject Given (Score:2)