FREE BOOKS

Author's List




PREV.   NEXT  
|<   86   87   88   89   90   91   92   93   94   95   96   97   98   99   100   101   102   103   104   105   106   107   108   109   110  
111   112   113   114   115   116   117   118   119   120   121   122   123   124   125   126   127   128   129   130   131   132   133   134   135   >>   >|  
y wanted without leaving a trace of any kind. The best hackers, the most powerful and technically accomplished, were not professional fraudsters. They raided computers habitually, but wouldn't alter anything, or damage anything. They didn't even steal computer equipment--most had day-jobs messing with hardware, and could get all the cheap secondhand equipment they wanted. The hottest hackers, unlike the teenage wannabes, weren't snobs about fancy or expensive hardware. Their machines tended to be raw second-hand digital hot-rods full of custom add-ons that they'd cobbled together out of chickenwire, memory chips and spit. Some were adults, computer software writers and consultants by trade, and making quite good livings at it. Some of them ACTUALLY WORKED FOR THE PHONE COMPANY--and for those, the "hackers" actually found under the skirts of Ma Bell, there would be little mercy in 1990. It has long been an article of faith in the underground that the "best" hackers never get caught. They're far too smart, supposedly. They never get caught because they never boast, brag, or strut. These demigods may read underground boards (with a condescending smile), but they never say anything there. The "best" hackers, according to legend, are adult computer professionals, such as mainframe system administrators, who already know the ins and outs of their particular brand of security. Even the "best" hacker can't break in to just any computer at random: the knowledge of security holes is too specialized, varying widely with different software and hardware. But if people are employed to run, say, a UNIX mainframe or a VAX/VMS machine, then they tend to learn security from the inside out. Armed with this knowledge, they can look into most anybody else's UNIX or VMS without much trouble or risk, if they want to. And, according to hacker legend, of course they want to, so of course they do. They just don't make a big deal of what they've done. So nobody ever finds out. It is also an article of faith in the underground that professional telco people "phreak" like crazed weasels. OF COURSE they spy on Madonna's phone calls--I mean, WOULDN'T YOU? Of course they give themselves free long-distance--why the hell should THEY pay, they're running the whole shebang! It has, as a third matter, long been an article of faith that any hacker caught can escape serious punishment if he confesses HOW HE DID IT. Hackers seem to
PREV.   NEXT  
|<   86   87   88   89   90   91   92   93   94   95   96   97   98   99   100   101   102   103   104   105   106   107   108   109   110  
111   112   113   114   115   116   117   118   119   120   121   122   123   124   125   126   127   128   129   130   131   132   133   134   135   >>   >|  



Top keywords:

hackers

 

computer

 
hardware
 

hacker

 

caught

 

article

 

underground

 
security
 

people

 

software


wanted

 

mainframe

 

equipment

 
legend
 
knowledge
 

professional

 

inside

 
widely
 

varying

 

employed


machine
 

specialized

 
random
 

running

 

distance

 

WOULDN

 

shebang

 

Hackers

 

confesses

 
matter

escape

 

punishment

 

trouble

 
COURSE
 

Madonna

 
weasels
 
phreak
 

crazed

 

expensive

 
machines

tended

 
unlike
 
hottest
 

teenage

 

wannabes

 

cobbled

 

custom

 
digital
 
secondhand
 

accomplished