DEF CON 7.0 Begins, and NYT Coverage 129
Slaab writes "The New York Times covers the upcoming DEF CON 7.0 hackers' conference in Las Vegas here. Notice, they are careful to make the correct distinction between "hackers" and "crackers". " If someone had told me two years ago that the NYT would be covering defcon seven, I would have laughed till I cried. It's a different world. The convention starts this evening.
Re:Authentication and stuff.... (Score:1)
password cypherpunks
Worked just fine for me, but I had to accept all the cookies, it didn't let me in when I refused them.
Didn't get an access denied, though.
Boring subject?!?!?!!? (Score:1)
Also, please take a moment to remove such stereotypes as underground = bad people. It is stupid. The "underground world" is composed of poeple who don't live exactly by society's rules, not necessarily against the law!!!!
Code free or die!
Definition of a hacker. (and cracker) (Score:2)
pulling off huge hacks of breaking into buildings and changing their entire look. Most notibly the building that looked like R2D2 this year at a college campus. Im sure you all saw this.
This is exactly the same as breaking into a web server and sticking different pages on the site, as we have all seen. And letting everyone notice it the next morning. There is no difference, they are both hacks pulled off by hackers.
Crackers are people who break codes. Be it cryptology, or copy protection on the latest software, or someones password. This does not include web site alterations and machine alterations (malicious or not.). The process of getting into the system is called the cracking, the process or altertering one from another with what tools and sources you have is called hacking.
End of story. People need to figure this out. And Slashdot readers are a bit behind on the definitions.
Re:Was this supposed to be a joke? (Score:2)
Did Eric Raymond really say that about Defcon? the "People who do real work don't bother with Defcon." statement? Maybe I've been missing something, but Defcon is a weekend conference, and "people who do real work" could take off a day or two to head down to LV to mix and mingle. As I recall, Bruce S. from Counterpane (of Blowfish lore) was an invited DefCon speaker a few years back, and I consider him as a person who does "real work". Persons involved in internet security usually find Defcon a great place to speak and talk about their topics of interest. So according to Eric Raymond, I don't "do real work" because I'm going to check out DefCon this year (a few days away from working on Waimea, which i consider to be real work). At first I thought I was wrong about Mr. Raymond.. After meeting him at a few conferences, he seemed like the kind of arrogant person who scoffs at people who don't recognize him or his contributions to the Open Source movement. As a person who admires his contributions, i have to be disappointed in his personality and character. For such a smart, intelligent person, Eric Raymond blows it by acting like a judgemental holier-than-thou jerk.
Re:Feds in Hunter Orange? (Score:1)
Re:you need a crack on the side of your head (Score:1)
Wanna see a cracker have his bank account cracked? (Score:1)
There are some forces out there that tcp_wrappers can't defend against!
Was this supposed to be a joke? (Score:1)
Waterfront property in Florida? Hmm... like the whole state isn't one big waterfront property...
RB
Interesting article on viruses (Score:2)
Some people make arguments that the only reason for this is because Windows is more common/popular. Yeah... 80000x more common? I think not. Besides, there would be a certain presige in writing a Unix virus as they are so rare.
yay... (Score:1)
Dammit (Score:3)
user: "I cant clear my screen"
tech: "How are you trying?"
user: "I am turning it on and off"
tech: "*gets his gun*"
Need I say more?
NYT slashdotted, mpeg at 11 (Score:1)
We are temporarily experiencing a server error. Wait a few moments, then press Reload or Refresh in your Web browser.
If the problem persists, please try again later.
so what about hacker/cracker? (Score:1)
Re:There are no virii for Unix -- or for anywhere! (Score:1)
I, probably along with almost everyone else on
But, come now! The impression of you that I get is that you prowl about the Usenet and apparently, Slashdot, ruthlessly correcting people. I got a semi-automated message from your address because one of my postings to the Usenet had something wrong with the headers. Do you _really_ care that much about my headers?
I appologize for the ad hominem nature of my comments, but I, too, care very deeply about the English language. But I don't publicly correct people or spend significant amounts of time to create documents such as the one at the link in your comment. It just strikes me as petty and rude.
Respectfully,
awc
Re:DefCon Underwater (Score:2)
Anyhow...
-awc
Why the NYT's computer coverage rocks (Score:1)
I had dinner with Matt Richtel a couple of months ago (for a totally unrelated reason, I like to think I'm good at computers, but I'm not news or anything), and he is just a completely nice guy. From talking with him, I gathered that he really cares about computers, how they affect the world, and what goes on in the various sub-cultures that exist in our little digital world.
All in all, it re-affirmed my faith that reporting can be done responsibly. That faith hasn't been betrayed by the NYT yet, giving me hope that they will continue their streak and (maybe, hopefully) influence some of the less responsible reporters out there.
Cheers to that.
Hacking==coding&&Hacking!=Electronic_Tress (Score:1)
geach
Re:so what about hacker/cracker? (Score:1)
Hacker/Cracker Bug/Virus (Score:1)
Maybe it had an effect, because this time he says "so-called crackers."
As a hobbyist linguist, I can tell you that hacker will always be mis-used by some. It will never recover from the original mistake.
In addition, while we're at it, "bug" is now being used to refer to viruses, particularly in the Melissa coverage. This is an unfortunate homonym, because as most everybody knows, virus does equal bug in the medical world, but virus does not equal bug in the computer world.
World New York [worldnewyork.com]
Re:they didnt get hackers/crackers right! (Score:1)
esr said it best with
"People who do real work don't bother with Defcon."
ESR also said that the APSL 1.0 was Open Source.
Re:Dammit (Score:1)
-Imperator
Wrong again, people have been hacking before code! (Score:1)
a hacker. A hacker plays with someone elses code,
and alters it to fit their needs. Hackers also alter computer hardware to fit their needs, just like they alter web sites and buildings. The keyword here is the means of altering something that someone else has already started to turn into what you want it to be/do.
Being a coder/programmer does not make one a hacker off the bat. If you are handed source code from your boss and are asked to change it to fit company standards, he is effectively asking you to hack it, changing your role from a programmer (who would start from scratch) to a hack(er).
The has-a-life-o-meter FLATLINES! (Score:1)
Why don't you use that blood sponge in your head to argue about something vaguely important on Slashdot.
Computer Security not interesting? Eh? (Score:1)
He qualifies as a "hacker," and I'd say he even did when he broke ino some systems -- because his actions are done for learning purposes, not malice, and harmed no one.
I don't know all that much about security, but personally I find it fascinating - the psychology and tactics of preventing break-ins must of needs parallel the psychology and tactics of breaking in.
I think your characterization of attendees as all crackers is wrong. Are you trolling?
Maybe you "can't imagine why people would meet for several days on this subject," but that says more about your imagination that it does the people who will be at DefCon.
Maybe one day I'll know enough to justify going there myself.
timothy
Re:Was this supposed to be a joke? (Score:1)
-luge (a once and future floridian)
Re:There are no virii for Unix -- or for anywhere! (Score:1)
Was your post on-topic?
Did anyone really care?
Honest scholarship is one thing, but obsequiously petty nitpicking is another. There is a difference between constructive flaming and pointless harping. While I don't think that you've descended into pointless harping, constructive, that message was not.
-awc
Re:Was this supposed to be a joke? (Score:1)
Cult of the Dead Cow's take on Microsoft (Score:1)
Conversely, the Cult of the Dead Cow claims [cultdeadcow.com] that "Unfortunately for Microsoft, Back Orifice 2000 could bring pressure on the software leviathan to finally implement a security model in their Windows operating system. Failure to do so would leave customers vulnerable to malicious attacks from crackers using tools that exploit Windows' breezy defenses."
I don't think the B02k installation procedure requires the recipient/installer to be root/Administrator for the payload to be delivered.
Re:Defcon site 0wned! (Score:1)
---
Re:Was this supposed to be a joke? (Score:1)
Re:DEFCON has been cracked by Anti-Online (Score:1)
Defcon 7 Page Hacked (Score:1)
Language use (OFFTOPIC) (Score:1)
Hmmm. This doesn't really fit your posts. However, they *are* offtopic, unprovoked, and arrogant.
Hey, most *linguists* I know aren't that uptight about language. The only people I know who vent out like this are either snobs, nationalists, or both. I hope you are the exception.
I find it remarkably demoralizing that a work of serious scholarship about a topic in daily use should out of spite be branded a troll by an overzealous moderator.
Last I checked scholarship about the daily use of language is just that: scholarship on the way users use the language. The work you cite *is* based serious scholarship (OED, Latin grammars), but it is not a descriptive work on the actual use of the English language; it is a prescriptive work, which in no way offers any justificaction for its recommendations.
Hey, I _have_ seen language planners from a language academy make recommendations about such issues. The first example I recall, is a recommendation on the correct plural form for the spanish word 'travesti' for a reporter to use in an article on a newspaper with national circulation. The reporter had asked which of two alternate forms to use: one which was paradigmatically more correct, but hardly in use; other which was in common usage. The recommendation was the form in common usage.
Next time, I suppose I should just flame rabidly rather than resort to honest scholarship so you would actually have something legitimate to whinge about.
Well, you didn't flame rabidly. However, let's look at what you wrote:
Egads! Not this `virii' nuttiness again. Please, please, please read the viruses document before you propagate this silly notion. I honestly believe you will find the article informative and convincing.
Hmm. "Nuttiness", "silly notion". Those *are* condescending words, Mr. Christiansen.
Oh well, I got better things to do, anyway. I'll just leave you with a riddle. What's the plural form of 'Elvis'?
Yup, you guessed it: 'elvi'!
(This was stolen from a Married with Children episode.)
---
Re:DefCon Underwater (Score:1)
the honor is all mine (Score:1)
And shouldn't DEF CON feel special, they were good enough to be hacked. Wow, what an honor.
No, really, it is interesting, and I think they should give a prize to the lucky winner(s) who did it. That would be cool.
Re:Wrong again, people have been hacking before co (Score:1)
What you are saying is that Linus is not a hacker because he started Linux from scratch. Hacking has nothing to do with the notion of beginning or continuing someone works. Hacking has nothing to do with vandalism. Hacking have got to do with a disposition of mind bended toward constructing things and sharing them. You can construct these things from scratch or modify the work of other hackers but this is still hacking.
Feds in Hunter Orange? (Score:2)
Re:Was this supposed to be a joke? (Score:2)
Groucho Marx made a film (w/ his bros. I suppose, never saw it) making fun of these people, but at the same time he was investing (and losing money!).
kmj
The only reason I keep my ms-dos partition is so I can mount it like the b*tch it is.
wow, that made me dumber.... (Score:1)
wow what a bunch of rebel kids... sounds more like teen football jocks to me.
Re:cyberpunks11 / punks (Score:1)
l: cypherpunk
p: cypherpunk
--
Dave Brooks (db@amorphous.org)
http://www.amorphous.org
There are no virii for Unix -- or for anywhere! (Score:1)
DefCon Underwater (Score:3)
Soggy crackers... mmmmmm....
Some people need to learn what a virus is. (Score:2)
- coug_
Re:Dammit (Score:1)
Done that, been there.
What amazed me even more than the ignorance of people was their willingness to be ignorant. All too often cries of "But I don't want to have to learn all this 'winders' stuff, I just want it to work!" I couldn't imagine going through life not wondering and thinking and tinkering with things.
Defcon cracked... (Score:1)
i think it'll stay up for a little while, these ppl do have a sense of humour.
Re:Defcon cracked... (Score:1)
Re:Language use (OFFTOPIC) (Score:1)
Of course, this is a flame and it deserves to be moderated down.
_But_, I just want to point out that the AC's response--in defense of TC--is bitching at Luis for arguing in a method similar to (but significantly less pompous) than Tom's.
-awc
Re:There are no virii for Unix -- or for anywhere! (Score:1)
My comment was further reinforced (in my mind) by his followup.
I didn't comment because I recognized the name--I commented because I both recognized the name and was somewhat irked by the response. I don't know if he was always this pompous, or if it came about naturally through exposure, but it seems consistent with much of the content that I have seen come from him, and I found that interesting and somewhat amusing.
Again, my personal feelings with regard to TC have no bearing on my respect for the amount of time and work that he has invested--work from which I know I have benefitted. And I do, most certainly, appreciate it.
However, when position and title become an effective way to deflect criticism (I'm not saying that Tom did this in any way--I'm being vague and speculative here), any movement that has thus far claimed to be egalitarian and open-minded is, IMO, doomed to a quick descent into infighting and failure.
Well. That was far more than my two bits.
-awc
Oh, and in response to the AC's attack on my site, sod off.
Re:Clueless (Score:1)
Think about what you're saying..
"Security Through Obscurity" (Score:1)
If the people at cDc were really interested in MS beefing up security, they would release the "exploits" BO uses to vendors, instead of every script kiddie in the world. When a exploit arises in Linux, the responsible person doesn't write a program to make it easier to run, s/he writes a patch for it. The people who write exploits are just as bad as script kiddies. Don't try to argue that.
You can all argue that DefCon is not a cracker confrence, but who will believe you? Your best arguement is that "well we've changed the definition of hacker/cracker, so of course it isn't!!".. Sorry if this apears to be a flame, but some of the posts I've seen today are pretty rediculous..
Re:DEFCON!!! (Score:1)
Re:Clueless (Score:2)
Well, if I wanted an undetectable remote-administration tool for an NT network, this sounds like a great tool. You pointed out attributes of BO2k: the user isn't alerted on boot or when the tool is running. These aren't necessarily bad things; it just depends on what you are using BO2k for. In some cases these would be features. The AC is right - this is a tool that can be used for good or evil. Using it for evil should be against the law, of course, but it is that attacker who is in the wrong, not the tools they use.
Re:Was this supposed to be a joke? (Score:2)
Well, for one thing anti-virus companies can probably come out with a detection method for BO2k more quickly if they have the source of the trojan available. This qualifies as a fix to me.
In the larger sense, maybe Microsoft can come up with some fixes to their security system so that an attacker can't run an invisible trojan like this in the first place, or at least can't make it so undetectable. In this case also, BO2k source code is going to help rather than hurt.
Well, in a sense all trojans have to exploit the user, right? By definition a trojan is non-self-propagating; the user has take action before the trojan can run on a system, as opposed to a virus or worm which are proactive in acquiring system resources. BO2k also seems to be exploiting the OS in the sense that the OS allows it to be made undetectable (by the user).
I'm not sure that cDc are terrorists any more than people who manufacture fertilizer, fuel oil, or big trucks, for example (at least in this particular case - I'm not an expert on their past history). People who use BO2k to break into systems that don't belong to them should definitely feel the full penalty of the law, of course.
But look at it this way - if cDc can write a trojan like this, then how do you know that a similar trojan doesn't already exist? If BO2k can do what they say it can on NT, then there's no way to be sure that other trojans aren't already doing the same things. I don't know that this is the case, but no one can prove that it isn't - remember, the security loophole that allows BO2k to run undetectably is already present; cDc didn't create it just so they could write BO2k. Hopefully all the coverage of BO2k will result in the quick release of security tools that will uncover it as well as other trojans of the same sort, and will also lead to Microsoft making some changes to their security model so that trojans like BO2k are less likely to run or are less likely to run undetectably.
Re:Indeed, but I respectfully disagree. (Score:1)
Did you ever try to something like "the data're in" rather than "the data's in"? Forget it!
It is "crackers" actually. (Score:2)
Well it doesn't seems so, as they say:
We are not trying to teach you to learn how to hack in a weekend, but what we are trying to do is create an environment where you can hang out with people from all different backgrounds. All of them interested in the same thing, computer security.
Underground+"computer security" equals pretty much crackers for me. Unless you are a cracker, "computer security" is rather boring (yes useful, necessary, but boring), and I can't imagine why people would meet for several days on this subject.
Ok this won't be the only subject, but then this is very present.
The texts, adds and links on the pages make that very clear, for instance, anyway:
Hacking, Cracking, Phreaking, Interviews, Speakers, Hacker Jepoardy, Hacker Death Match, Babes of DEF CON, HNC Goes Wild in Las Vegas, Capture the Flag, DEF CON Social Engineering Contest.... also Watch the Dark Tangent fight to the death in Hacker Death Match!!
But maybe I have missed the talk "The evolution of FreeBSD internals since 4.4BSD", in the program.
It never cease to amaze me, how crackers, or crackers-alike, continuously claim they are "hackers", now even pretending doing the "cracker/hacker" distinction correctly.
Re:Dammit (Score:1)
"If you know more than me, why the hell are you calling?"
Fun Fun Fun, also is that true at the end of your response about looking ofr a job?
Re:Was this supposed to be a joke? (Score:2)
That was sort of funny, but I think ESR has a little bit of a double standard going on here. This article doesn't mention it, but the source for Back Orifice is supposed to be released as well. If BO2k is open-sourced as promised, then not only will there be more chances to collaborate to make it more destructive, but there will also be more chances for security-minded administrators (and shouldn't they all be?) to fix their systems before they are attacked, rather than waiting on Microsoft to figure out what the exploit is and issue a fix.
Maybe ESR can argue that the effects of the BO2k release will be entirely negative (which I'm not sure I agree with), but he should be happy that at least the source is also going to be provided.
Uhh... Hemos (Score:1)
Check: http://www.nytimes.com/library/tech/98/08/cyber/a
Re:It is "crackers" actually. (Score:2)
Actually, I find comp. security quite interesting. Then again, I'm one of those weirdos who likes studying things like the raw math behind crypto. I'm not a cracker, just a nerd/tweak/tinkerer/student/programmer with aspirations toward hackerdom.
Re:It is "crackers" actually. (Score:1)
Hacking, Cracking, Phreaking, Interviews, Speakers, Hacker Jepoardy, Hacker Death Match,
Babes of DEF CON, HNC Goes Wild in Las Vegas, Capture the Flag, DEF CON Social
Engineering Contest.... also Watch the Dark Tangent fight to the death in Hacker Death
Match!!
But maybe I have missed the talk "The evolution of FreeBSD internals since 4.4BSD", in the
program.
Along with:
....and so on and so forth. I'd be there in a minute, if it wasn't for my current limited cashflow and the fact that I hate Vegas.
K.
-
How come there's an "open source" entry in the
Re:Authentication and stuff.... (Score:1)
K.
-
How come there's an "open source" entry in the
Just my opinion but what you just described..... (Score:1)
Re:DEFCON has been cracked by Anti-Online (Score:1)
Re:Was this supposed to be a joke? (Score:1)
Re:Feds in Hunter Orange? (Score:1)
Actually, they were all clean-shaven, and wore nice watches and loafer shoes, usually khaki pants. Of course, so did the CEOs in attendance, and ex-cops...
Re:Was this supposed to be a joke? (Score:1)
Re:DEFCON has (NOT) been cracked by Anti-Online (Score:1)
Re:DEFCON has been cracked by Anti-Online (Score:1)
I've never actually heard of ADM before (except in
Oh, by the way, even if I am an idiot, that makes you someone who has nothing better to do than talk to idiots.
-=The Comeback King,
Re:Was this supposed to be a joke? (Score:1)
Fetchmail and hyperbole - what's the pay like?
K.
-
How come there's an "open source" entry in the
Re:It is "crackers" actually. (Score:1)
Says you. I work for the ISS X-Force [iss.net], and I'm not bored.
Re:DefCon Underwater (Score:2)
It should be more like that!
#define unstable 1
const int nt = unstable;
if(nt) { switchTo.linux(); }
Indeed, but I respectfully disagree. (Score:1)