CNN on "hackers" 93
phil reed writes "CNN is running a special section on "hacking" called Insurgency on the Internet. I read part of it and winced, but other parts aren't bad. They have a dualing interview, featering Emmanuel Goldstein (Editor of 2600 Magazine) on the 'pro' side, and he gives a pretty good accounting of himself. On the other hand, there is some pretty lame stuff. "
What if Atlas Shrugged? (Score:1)
Say you're running a system that hundreds of high paid people rely on...if it goes down, every second can cost you thousands of dollars. In the case of critical systems it can mean people dying.
The analogy may not be perfect but it's an effort to get people to be wary of idiots that think that damaging other people's property or violating other people's rights is ok as long as it's done through a computer.
What if Atlas Shrugged? (Score:1)
> besides go in and look around. But if a stranger came into your house,
I've always hated that analogy. Here's why:
If you break into my system, I'll bitch and gripe while reloading the OS, restoring data from backups, and patching the hole(s) I obviously
missed. Sure there's an inconvenience factor & maybe some financial loss, but that's about it.
If I find you in my house uninvited, I'll do my best to blow your fucking brains out the back of your skull.
The net != the real world.
turbochrist the forgetful (can't remember my password, sorry)
joyriders? (Score:1)
Some of the "joyriders" -- hackers who access systems just for the challenge -- think it's harmless since they usually don't "do" anything besides go in and look around. But if a stranger came into your house, looked through everything, touched several items, and left (after building a small, out of the way door to be sure he could easily enter again), would you consider that harmless?
He's right in some respects. But would anyone mind if someone broke into your house, didn't touch anything, and left a note telling you when he broke in, how he broke in, and how to prevent any future break-ins?
What if Atlas Shrugged? (Score:1)
----
Kids these days (Score:1)
Who, as a teen anyway, has never been tempted to bust into a system just to see if they can? It's part of being a tech-savvy teen, just like driving recklessly or having awkward sex in some corn field.
Knowing you can and actually doing are less a line in morality and more in maturity. Remember, most teens get absolutely no time of day from people, even when the teen is just trying to help (how many stories have you heard of the school library that gets a bunch of new computers, and who decline offers of assistance from students in leiu of bringing in a bunch of knuckleheads who do a half-ass job for $100/hour?).
It's easier for you or me -- we rate (I hope) jobs where people listen to us. We don't need to prove anything to anybody; when I look at a system and know I could root it if I wanted, that's good enough. That's no reason to start thinking that we're better than the up-and-comings.
----
it... hurts... (Score:1)
INCORRECT definition of cracker and hacker (Score:1)
There are proper labels! (Score:1)
INCORRECT definition of cracker and hacker (Score:1)
Here's two skeptical links (Score:1)
Elitism isn't neccesarily a bad thing. (Score:1)
Seriously, though... doctors have exclusive professional organizations they use to communicate; Why not (skilled) hackers?
Point out the definitions (Score:1)
As someone who has written about hackers and lived to tell the tale (i.e: the site has remained unhacked), I have to tell ya that this definition debate is secondary at best. If I start tossing around hacker vs. cracker debates, I lose readers who might otherwise stay and get educated.
Look at it this way -- if I can get it across to my readers that not all hackers are evil -- that there are people who call themselves hackers and do productive, good, brilliant things -- then I've won. They'll know that not all hackers are bad. And they won't have to care about the damn labels unless they really want to learn more.
In other words, before you can introduce the label of "cracker," you have to remove the stigma from the word "hacker." One step at a time.
The stupidity of the masses (Score:1)
The vast majority of people think that this is the last year in the millennium, that doesn't make it so.
The vast majority of people that the the "motor car" was a passing fad.
...That the titanic was unsinkable.
...That the US would be "in and out" of Vietnam quickly.
IT'S NOT THEIR FUCKING PLACE TO LABEL US! We are what we are, we do what we do, "Hacker" is our word, it's for us, by us and about us. They can go to hell if they don't get it. You can go along for the ride as well.
LK
it... hurts... (Score:1)
Point out the definitions (Score:1)
H3Y D00DZ!!!! (Score:1)
turn a killfile inside out... (Score:1)
not exactly (Score:1)
I see two kinds of mentalities. there's the immature mentality. those people get a kick out of breaking into other systems or spreading virii and love playing God and destroying things. often these people are spoiled teenagers who play with action figures and guns. if they're teenagers I understand them, every teenager goes through such a period, I did it too. but then they grow up and the kick of power wanes away, and they become people who break into systems to expose security leaks and fix them, people who build virii to keep virus protection programs up to date and pre-empt malicious virus makers. as I said, MOST people grow up. unfortunately some don't...
I won't deny that I've toyed around with things like BO and Netbus, but only to see what it could do. once in a while I scan the network to see if anybody is running BO or Netbus and warn them before somebody takes advantage of it. it's a real shame BO and Netbus got abused like they were because they could have been magnificent remote administration tools, but that's a whole nother can of worms.
anyway, there'll always be evil hackers; either teenagers or people who forgot to grow up.
)O(
the Gods have a sense of humor,
There are proper labels! (Score:1)
There are proper labels! (Score:1)
Can't they be labeled correctly? (Score:1)
hacking == cracking (Score:1)
Can't they be labeled correctly? (Score:1)
Bah! (Score:1)
If you'd like a good, solid definition of "lame" maing unfounded defamatory accusations about a group of people you don't know anything first-hand about definitely qualifies for one.
Bah! (Score:1)
What if Atlas Shrugged? (answer) (Score:1)
Umm.. they have. They're running linux now. >:)
Down with the evil empire!
--
This is not a good debate (Score:1)
Personally, I would love to have seen a face-to-face discussion between them. I think then we would have seen a more balanced article, assuming they debated the meaning of hacker off the record, that one would probably go on for days
INCORRECT definition of cracker and hacker (Score:1)
cnn.com is gonna get defaced now.... (Score:1)
let me take a crack at the tagline now..."free kevin?"
it... hurts... (Score:1)
-lx
The ever-dreaded "dualing interview" (Score:1)
What if Atlas Shrugged? (Score:1)
Script kiddies do not rool the world.
Kids these days (Score:1)
Just because I *can* do something doesn't mean I *do*. Many modern `safety' advocates completely miss this, thinking they need to regular the life out of everything to prevent accidents. I could run a vacuum cleaner across the nature strip[1 by my house, but I don't do that. Does that mean we need to keep teens away from nature strip and should control vacuum cleaners so that minors won't get them? This is what this is in effect saying: teens and computers are dangerous if the teen does anything more than use AOL email and WordPad.
[1] They seem to call these `tree lawns' in America, which is dumb, because there are usually not trees on them.
Distinction between hacking and cracking (Score:1)
Maybe sometime the media will get it through their thick skulls that a cracker is somebody who uses hacker skills to break into other people's systems, etc. Hackers are merely those with a desire to push the limits of their own knowledge and the technology around them.
---
H3Y D00DZ!!!! (Score:1)
(begin Masterpiece Theatre music)
(all translations should be rendered in a resoundingly deep, officious-sounding voice, preferably with a sharp British accent)
"H@Y D00DZ!!!!!!111!!11!!"
translation - "Greetings and salutations, my fellow computing denziens."
"1 G0TZ L0TZ@ K3WL W@R3Z @ND P@$$W0RDZ!!!!!!!!!11!!!111!1"
translation - "Submitted for your approval; I have painstakingly managed to locate and offer for your consumption, a number of unlawful electronic copies of copyrighted software, as well and the encryption keys for other similarly protected products."
"K3WL D00D!!111!!!!!#*%^#&^@&^*@!!!1!!!!!!111!!!!!!1"
translation - "I am thoroughly and indubitably impressed by this development, my good man."
I could go on and on.
--John Riney III
jwriney@awod.com
H3Y D00DZ!!!! (Score:1)
--John Riney III
jwriney@awod.com
this is too funny. (Score:1)
their stupid points have increased +90.
"The Earth is flat" (Score:1)
What if Atlas Shrugged? (Score:1)
hacking == cracking (Score:1)
new name (Score:1)
who cares about the name hackers???
a rose by any other name would be just as sweet
how bout people start calling real computer geeks "the mighty duck"?
FUD and only FUD (Score:1)
Toodles..
hacking == cracking (Score:1)
that would be cool.. (Score:1)
Let's not restrict the client OS, like a "Linux only Internet", but on the other end the user must be clueful to get on. The client would connect to one of several servers using an encrypted mean of connection, and then could send messages, download files, etc.. and those servers would communicate with other servers with encrypted means, and would have an encrypted fs. Kind of like a distributed BBS for clue people. CI/SSH (Clue Internet over SSH) or something
REAL definition of cracker and hacker (Score:1)
cracker = "Someone who tries to break into systems, usualy to prove to others how leet he is, or to fetch information for malicious purposes. A cracker always uses criminal ways. A cracker is often a teenager, or someone who likes to use known exploits in software programs."
"Drop that sack, Fatso!" (Score:1)
Ah yes, this (or more precisely the comment made in an oddly misplaced reply [slashdot.org] about shooting said intruder) is what I like to call the Santa Claus fallacy.
Following that logic to its conclusion, these people would arrest Ol' St. Nick for breaking and entering[1] - after all, how could you know he wasn't going to stash your stereos in that sack - possibly along with several other offenses ranging from smuggling to violating flight regulations.
The underlying circular legalism (breaking the law is wrong <-> things are illegal because they are wrong) makes this IMO false, but what really turns it into a fallacy is the fact that the very same people who hold the belief that laws should be followed without exception are usually quite willing to make an exception whenever confronted with a specific case not obsured by generalizations and prejudices.
In particular, before any of you jump to reply that Santa doesn't really exist, ask yourself: If I (and perhaps a whole movement of other altruists) were to get a red suit, beard and a sackful of toys and go sneaking into your house on christmas eve, what would you do?
If you say that the very act of entering your house without consent is illegal, and that regardless of my intentions I still would have the opportunity to replace the toys in the sack with your property[2], fine. I'm not necessarily disagreeing. But why are you then not telling your kids that Santa Claus is a notorious criminal? Why are you teaching them that it is right for a stranger to break into your house in the middle of the night, as long as he only intends to give presents?
INCORRECT definition of cracker and hacker (Score:1)
:cracker:
:hacker:
There now, you see? The poor chap above was right. No need to berate him. Let's try to keep everything civil from now on.
hacking == cracking (Score:1)
so now anyone who is a skinhead is assumed to be a bigot and a mindlessly violent a$$hole.
of course, you have to be wary of the "almost have a clue" reporters too....to view reports where the reporter acknowledges non-racist skins, you would get the impression that it's a new phenomenon.
skins are all nazis,
hackers are all criminals,
encryption needs a backdoor for your protection,
hiv infected needles are hidden in the seats of all major movie theatres....
i read it in a newspaper so it must be true.
hmm.. (Score:1)
Definition of Hacker (Score:1)
troop movements not considered top-secret??? (Score:1)
Password: modesty (Score:1)
I've seen several posts on the meaning of hacker. I do claim to know something of what a hacker is. This is not enough to make me one. Keypunching raw a EBCDIC IPL loader probably qualifies me as a "Real Programmer". It does not qualify me as a hacker. If I did it without access to a green card or the "Principals of Operation" manual, I would consider myself a hacker.
A new name for us - Real Programmers (Score:1)
Thank you. (Score:1)
I think we should regain control of them both.
>:cracker:
>:hacker:
Think of cracker as in cracking a code, a cypher. This takes skill or patience or both.
Making furniture with an axe takes skill. Lots of skill. The key is that the results are out of proportion to the tools. A hacker is opposite to the poor workman who blames his tools.
A handmade chair, made with axe is a hack. Chippendale is not.
C is a hack. Algol68 is not. Dunno about B.
UNIX is a hack, at least the original. Multics is not.
Mountain man is a hack. Flatlander is not.
Climbing Everest without supplemental oxygen is a hack. Riding to the top in a helicopter is not.
Microsoft windows is not a hack. The tools were there. The results are poor considering the tools. Fails both counts.
Hackers build rather than tear down. Do not use the term for wanabes.
Hackers cannot be controlled. I think this is really why the suits, media, corporate etc. get scared.
We need to regain control of the terms, not for the benefit of hackers, but for the washed mass of J Random (L)Users out there.
Bah! (Score:1)
my little rant in agreement (kinda) (Score:1)
Just for the record, I think text like that's a pain in the ass to read and typing it properly takes 1/3 of the time.
*looks perplexed and hits submit*
Password: modesty (Score:1)
Definition of Hacker (Score:1)
it... hurts... (Score:1)
Make it so you can't log on except with a command line terminal too.
Keep the AOLers out!
"Responsibility for my career? I'm just a freakin' phone monkey!"
Can't they be labeled correctly? (Score:1)
This is what I was saying in my post, just not as eloquently.
There is a true difference between the hackers and.. what do we call them? Shrink wrap hackers? Some Assemble required Hackers? Download/Upload Hackers?
Anyway, the difference is the old school hackers were/are on a voyage of discovery, and the new ones are there to destroy and terrorize.
"Responsibility for my career? I'm just a freakin' phone monkey!"
H3Y D00DZ!!!! (Score:1)
H3Y D00DZ!!!! (Score:1)
P.S. I'm not trying to offend the poster of the previous comment
This is not a good debate (Score:2)
This was nothing but comparing apples and oranges.
it... hurts... (Score:2)
So here's my idea: VPI (virtual private internet). Protect the entire thing with strong encryption, the keys for which will only be given to people who show some basic degree of understanding of technology. So, we just let all the jonnie-come-latelies have the internet, and we have our own little niche.
For example, if you can't get the VPI software to work and your first urge is to call tech support rather than RTFM, you can't get on. Or, if you don't understand why your computer that you bought six years ago can't run the latest and greatest 3D game at a reasonable speed, you can't get on.
As a side bonus, this should do away with first posters and other people who ruin the AC thing for those who use it responsibly.
----
hacking == cracking (Score:2)
In short, I can see why hackers are upset at the commandeering of the term "hacker" to be a general description of any computer intrusion, but the answer is not to describe them as crackers instead. "Crackers" is a term that is already taken by a group that does not be deserved to be lumped together with script kiddies any more than hackers do. Polluting one word as retaliation for the pollution of another word accomplishes nothing - the word "hacker" will still be polluted, and all that will have changed is that you'll have succeeded in polluting yet another word.
Can't they be labeled correctly? (Score:2)
People who broke into other computers were sometimes called hackers, but they did it using pure wits and skill. Hardly ever did they damage a system, they just wanted free computer time, or to be able to connect to another computer without paying for a LD call. Few 'hackers' broke into machines or networks, but those that did were almost always just having fun. True, I don't want anyone to have fun on my machine, but they were at most trespassers.. annoyances.
Now, enter the 1990s. Kids with 'virus creation kits' and 'syn bombers' that are already built for them do damage because then they can be '3133t', or have some other title that involves looking like a moron. They do thier best to install backOrifice on some poor housewives web-surfing machine and terrorize her. Then they get together and try to out-posture each other. How many of these 'hackers' have simply found a person who shared the C drive of thier machine and have a cable modem, then installed backOrifice or Netbus and called themselves a hacker 'D00D'? Do these people understand what they did or how they did it? No, but at least they can read the easy steps to do it... I can put a book on a photocopier, but does that make me a novelist?
Hacker has become a label for the latter group, and given the former a bad name. So let's call these 'new hackers' by a different, appropriate name. 'Morons' or 'Juvenile Losers' comes to mind.
For the few that DO know what they are doing, but still damage systems, let's call them 'assholes' (pardon my french). For if you really understand computers, and use that to hurt others, that's like knowing kung fu, and running around town beating people up.
I submit these new labels to the net community, hoping that I can once again call myself a 'hacker' and not have people either hate me, or ask me to crash thier boss' system.
2600 vs IBM (Score:2)
joyriders? (Score:2)
A cracker on the other hand would break into the mall to loot a store while it was closed.
The problem with networks is that they are public by definition. The house analogy is bad because you don't go to other peoples houses from your own house. It is not an access route to another house. On the other hand, if you had a really nice car, would you mind if someone was admiring it in the parking lot? Its a compliment, the same with a hacker that just probes a system without doing any harm. If that person were to then get in the car, that would be considered rude and could be equated with hacking a site and then putting up a new web page that says "I OWN THIS SITE D00DZ".
In conclusion
Goldstein vs Palmer (Score:2)
The *single* biggest proof to anything Goldstein said was Palmer's entire interview.
Goldstein's entire interview: The individual exists today in the form of the hacker. The corporation seeks to destroy the individual to further its own ends.
Palmer's entire interview: There is a threat to business which must be stopped, this threat is the hacker.
Hrmm... seems like one confirmed the other, the question we must each ask ourselves is, "Am I an individual, or a corporation?"
hacking == cracking (Score:2)
In much the same way, does it really matter if the popular definition of hacker is something other than what we take it to mean? The people that it matters to know the difference. It may well grate to hear the term being abused, but I also get irrationally annoyed with TV car safety adverts talking about the "force of an elephant". We're not going to be able to change the popular meaning, so why worry about it?
teen-age hackers... (Score:2)
The only time i have ever done anything Malicious is once during a computer class, I logged onto a Mac server as my teacher, because i wanted to see if i could guess her password (it was very obvious).
IMO, your view that all teenage hackers are destructive and evil is wrong. From my experience the teens that REALLY qualify as hackers, respect their computers as well as everyone else's. The "destructive" hackers you talk about, tend to reside on AOL, are idiots, and they don't respect their PC's. Now ofcourse their are exceptions, but those people can't even be called hackers. Would a Car enthusiast break the windshield of someone else's car for fun? No, and a REAL computer enthusiast (a hacker) wouldn't destroy someone else's computer.
Oh Gawd... (Score:3)
I know many of us here on
But I don't start viruses, crack programs, or delete files incomputers.
There are two types of hackers which are (to borrow from rap) Ols School and New School.
The old school hackers built Altairs, bootstrapped OS's onto their boxes, owned an Osbourne, were telnetting before anyone knew what telnetting was, had HTML 1.0 websites up, and basically flexed their love and knowledge of computers in any way they could. While some hackers were definately malicious, most of us weren't.
Come on, let's see hands. How many of us hacked into a site to see if we could, and then left after looking around?
But enter the new school.
These "new wave" live to destroy. No, I'm not talking to you, these guys are still in junior high and high-school, not online right now.
Yes, they are smart, but as one 14 year old I know says, "I like to blow a system, I like the control I have".
I guess this is their worldview, and while I don't agree with it, they can have it.
But the consequences to that worldview is unfortunate. They make it so those of us who do not do malicious actions (and in fact guard against them now) are grouped together with them.
So the question is, how do we get the mainstream to make the distinction?
"Responsibility for my career? I'm just a freakin' phone monkey!"
Security Responses and Free Software (long) (Score:4)
Originally, it was considered acceptable to have a relatively open system and to tighten security only when that system was actively abused or harmed. This was partly due to simple trust, but also partly due to the fact that the consequences of security threats on Net systems weren't nearly as bad as they are today. There were very few malicious crackers, and because of the small size of the Net it was easy to track them down. Most security-hole exploitation was done in fun, and without doing damage.
Later, after the RTM Internet Worm, it became expected that security holes would be reported as bugs, and that system maintainers would upgrade their systems to patch known holes. This is what we have CERT bulletins for --- to warn us of holes which have been discovered, so that we can secure our systems before they are exploited. In addition, we have systems such as SATAN that can diagnose existing, known security holes so that we can patch them. However, none of these measures are effective against a newly-discovered exploit which only the crackers know about.
Now, however, the increasing dependence of both the global economy and global culture on the Net has made it essential that we keep ahead of the crackers. So we now keep copious logs of all network activity, and we have security packages that alert us to activities which might be a prelude to an attack --- such as portscans. Even if we don't know of a security hole in our systems, we can at least notice when someone else is looking for one. Some of these packages simply alert the sysadmin to suspicious activity; others actively firewall out a site from which they detect a portscan.
Some free-software operating systems have kept up marvelously with this trend. OpenBSD, for instance, takes pride in being "proactively" secure, and sends regular security bulletins to the system administrator. Debian GNU/Linux also stands tall in security, making many logging and threat-detection packages easily available, as well as having reasonably paranoid security defaults. Debian's apt system also makes it trivially easy for system maintainers to keep up to date on security patches.
However, despite these advances in security, it's still true that far too many "Joe Redhat" users get rooted every day. Some systems aren't keeping up --- and in a sense, because Unixoid systems run more network services and in fact are designed for network operation, a poorly-secured Linux-based system may be worse, security-wise, than Windows.
Some would say "If a user doesn't know enough to secure his/her system, s/he deserves to get rooted." As a network systems administrator for a small college, I cannot accept that as a responsible answer. We encourage technically-minded students to put up Linux- and BSD-based hosts on our campus network --- not only for fun, but to encourage them to learn about these systems. However, if one of these students gets rooted, that exposes the rest of our network to greater hazard: something that I don't want to happen. Hence, I have a vested interest in ensuring that these students have good security on their personal systems, even though I can't go around auditing them.
An inexperienced user needs more help making his/her system secure than does a seasoned sysadmin. We cannot afford to think of security as something that can be traded off for ease of configuration, system simplicity, or ease of use. Unless those who intend to deliver "free software for the masses" --- Red Hat Inc. and its ilk --- make their systems more "proactively secure", free software will not live up to its security potential. If this goes on, "Joe RedHat" will keep getting rooted, and Linux-on-the-Desktop will be a security disaster.