"Hacking is the art of esoteric quests, of priceless and
worthless secrets. Odd bits of raw data from smashed machinery of intelligence
and slavery reassembled in a mosaic both hilarious in its absurdity, and frightening
in it's power." Dr. Who 4113
The Hacker Nations
Some hacking culture information: { lexicon }
- Computer Hackers: grew out the phreaks in the early 1980's; people
who want to do stuff beyond the limits with their computers - this does not
refer to the programmer definition, nor does it necessarily make a statement
on how 'elite' the 'hacker' is. Whether the more honorable profession likes
it or not, those who misuse information and/or are simply fools or power freaks
are still 'hackers' by the popular lexicon, not necessarily by those of us
whom are hackers.
- Crackers: a subset of hackers, these people enjoy doing whatever
they please to whomever or whatever, with no thought of the damage or consequence.
- IRCers: a subset of computer hackers, those who enjoy manipulating
the Internet Relay Chat and it's related technology
- Phreaks: began in the early 1970's; people who want to manipulate
the phone systems, either for intellectual challenge or to screw the phone
companies.
- Warez 'Do0dZ' ( Pirates ): began when the first commercial
program appeared; those who want the newest software without paying for it.
The best in this field hack and crack serial numbers and turn it into their
own challenge.
- Lamerz: are pirates who just download what they can and keep a low
profile.
- VXers ( virii ): gain pleasure from writing programs or code that
manipulate or destroy another system or information.
- Carders: credit card fraudsters are people who seek out other people's
information and essentially steal their identity for the sake of his/her own
goal by illicit means
- Anarchy Philers: not to be confused with the political science of
anarchism; these people write or distribute philes describing how to make
bombs or disrupt socially accepted standards
These sets and subsets are also divided by skill and purpose. Some of the members
will get bored fast and don't do much, others dedicate their lifestyle to the
sole purpose of their passion.
Generations of hackers
{ note: the internet year is 3 months long, so skills and technology
change faster than these definitions can. if you have an opinion as to the wording
of this document, please email me. I'll post what is reasonable and acceptable
)
- Generation One: 1970-79 { socially outcast and brilliant in effort &
code }
- Generation Two: 1980-1988 { vastly overknowledged and frustrated at the
lack of knowledge available }
- Generation Three: 1989-1995 { in the limelight of illegal pursuits, greater
span of knowledge; lacking in certain skills of the first two generations
}
- Generation Four: 1996-1998 { security conscious & ravenous for any
information }
- Generation Five: 1999-Present { Those who store/edit or manipulate the
information we see so as to shape or redefine the society to which it is expressed
to.} The Most dangerous type!
With the internet being the society of information and not of culture, this next
generation will be able to shape the entire world by their own means. Don't know
about you, but that scares me!
Afterthoughts:
Hacking as we know it had a beginning and it will have an ending. However; hacking
as we understand it is a small form of a greater action - that being a rebellious
manipulation of knowledge. Hacking in it's purest form has existed since
humankind first learned how to create. And humankind first subverted its creation
for its own purposes.
Now for the meat of the matter:
I am a Generation Two hacker, I don't do anything malicious or break into systems;
at least not without getting paid for it. Which makes me a so called white hat
hacker...
Please visit http://tatumweb.com/iptools.htm
for the IP tools that were here.
That is the PROPER lcoation and author of the Code that was here. I was misinformed
by a fellow Hacker who said the code was his.
Take note people always make absolutely certain of your information. In today's
information age, it is careless and stupid not to do otherwise.
My apolgies to Rich Tatum for not doing my research and getting his permission
For other 'HACKER' links see me directly or my main page.
I will only be updating my links { on this page } when new or better technology
comes along
- .../faqs/hacker-howto.html
- D.I.R.T.
- How to
Build a HERF Device
- How
to Build a LASER Listener
- How
to Benchtop TEMPEST Interceptor
- Anti-Online A group
of not so cool dudes!
- Attrition.org
- Hacker News Network
- Daily Hack News
- Active Matrix's Hideaway
- Excellent sight! { pun intended }
- Cracking....
The Code of Ethics
- Remote
Explorer
- E-Mail
Bombs and Countermeasures
- How
to find security holes
- Flaws in Computer
Systems
- Autonomous
Mobile Cyber Weapons
- Cracking DES
- PalmPilot
Phreaking
- Exploit
World
- Microsoft
Security Exploits
- Techniques
Adopted By "System Crackers"
- How
to finger a user via telnet
- How
to forge email -- and how to spot forgeries
- How
finger can be used as to crack into non-public parts of an Internet host
- How
to get Usenet spammers kicked off their ISPs
- More
on dealing with Usenet spammers
- How
to nuke offensive Web sites
- Internet
for Dummies
- Linux
for beginners
- Intro
to TCP/IP - Oversized ping packet and denial-of-service exploits explained
- More
on TCP/IP - Port surfing! Daemons!
- The L0pht
- Black
Crawling Systems Archives
- Cult of the Dead
Cow
- 2600 Magazine
- The Original
& World Famous "CrookBook"
- European Satellite Hacking
Page
- Phrack Magazine
- Brians
Hacking Page
- Ice9
- Sniffit
- Ways
that Malicious Hackers can get your Passwords
- Technotronic
- Reverse
Code Engineering
- German Computer Freaks
- Chaos Computer Club
- HTML
Hacking Scripts
- The
How To Hacker's Defense Site in Zero to 60 Seconds
- The Nexus
- The Black Hole
- The Replay
Remailer - Anonymous E-mail ;-)
- E-Mail Bomber
- The
Goose
- The
Internet Underground
- Welcome to the Underground
- No More Secrets
- Wiretap at Spies.Com
- DefCon
- Guide
to Lockpicking
- Telecom
Digest Archives for Phreakers
- Underground
Filez
- Hacks
& Cracks Home Page
- Kludge
- Crypt Newsletter
- White
Lightning
- Hacking &
Phreaking Filez - A - H
- Hacking &
Phreaking Filez - I - Q
- Hacking &
Phreaking Filez - R - Z
- Hacking in Progress
- Bokler's
Guide to "Cracker" Software
- The
Raven's List
- Biohazard
- Captain Crunch
- Fravia's Reverse Engineering
Page
- The
Hacker Crackdown
- Unauthorized Access
- Mind Vox
- Minor Threat
- The Havoc Technical Journal
- EHAP - Ethical Hackers
Against Pedophilia
- Klon
- Legion of Doom
- Logic
Bomb's Information Tenement
- Phone Losers of America
- Satan
- Steppin's Underground
Links
- Takedown
- Lost in the
Matrix
- The
Strange World of Tapu
- RootShell - Tons
of Filez & Appz for Hacking
- Chaostic.com
- Hackers
Domain
- The
Final Frontier's Virus & Source Code Links
- Computer
Virus Research Lab
- Phreak's
Virii
- Welcome to Godland
- Virii
- Learning
about Cryptography
- Crypto
Glossary and Dictionary of Technical Cryptography
- Windows
Buffer Overflow
- 1631 Providers of
Internet Access
- System One
- Nightmare
Jokers Virii World
- The 80's Hacking
Text Archives
- MailBomber
Archives
- Man
Eats Dog
- The Hacking
& Anarchy Archives
- Archive
of Hacked Web Sites
- People
Hacking: The Psychology of Social Engineering
- Social
Engineering - just a new twist on an old con game
- Cracking
a Social Engineer
- The
Complete Social Engineering FAQ
- CIAC
- Computer
Security Technology Center
- COAST
- Computer
Crime
- High Tech Crime Investigation
Association
- FIRST
- National Computer Security
Association
- National White
Collar Crime Center
- InfoSecurity News
- SATAN
- Site Security
HandBook
- Association for Computing Machinery
- Computer Crime Laws
- Computer Security Research
Centre
- Information Security
Institute
- NIST
- InfoWar
- Security
Digest
- Information Systems
Security Association
- Secure Computing Magazine
- The
Computer Underground
- SPAWAR InfoSec
Web Site
- Computer
Security FAQ's
- UCL
Crypto Group
- RSA Data
- Cypherpunks
Home Page
- Alt.2600
Hack FAQ
- Computers
& Society Archives
- Cipher
- Risks-List Forum
Archives
- The Computer
Security Act
- Crypt Newsletter
Home PAge
- The Computer
Law Observer
- L0pht Security
Advisories
- Security Mailing
Lists
- The Manhattan
Cyber Project
- Center for Secure
Information Systems
- Sneakers
- Tiger Team Mailing List
- GrayAreas
- Journal of Computer
Security
- Disaster Recovery Journal
- Virus Bulletin
- The
WWW Security FAQ
- alt.comp.virus.FAQ
- The Sniffer FAQ
- The
Hacker Crackdown
- TakeDown
- Break In
- The
Social Organization of the Computer Underground
- Rise
of the Underground Engineer
- Cryptography
FAQ
- Computer
Viruses - Prevention, Detection & Treatment
- The
Green Book
- Guide
for Protecting LAN's & WAN's
- Cyphernomicon
- Information Warfare
- How
to Hacker-Proof your Computer System
- Improve
the Security of your Site by Breaking into It
- Steganography
Info & Archive
- United
Nations Manual on Computer Related Crime
- Department
of Justice Guidelines for Searching & Seizing Computers
- Computer
Fraud & Abuse Act
- SCAB -
Seized Computer Analysis Software
- Foreign
Industrial Espionage Threat
- Clipper Chip
Reverse Engineering
- IACIS
- Digital Crime Investigative
Network
- Investigators
& the Internet
- Summary
of FBI Computer Systems
- The
National Security Agency Handbook
- Data Recovery Software
- Computer
Crime Research Resources
- TEMPEST
Monitoring in the Real World
- TEMPEST Monitoring
- How it's Done
- Rise of the TEMPEST
- Electronic Eavesdropping
Machines for Christmas?
- The
Moller Paper on TEMPEST
- Seline Paper on
TEMPEST
- EMP & TEMPEST Protection
for Facilities
- The ORIGINAL Wim Van Eck
Paper on TEMPEST
- Reception of Electromagnetic
Radiation from RS232 Cables
- Complete
TEMPEST Solutions
- TEMPEST
in a Teapot
- The FAA and
HERF
- HERF
- High Energy Radio Frequency
- Hardening
your Computing Assets against HERF
- Killing
your Enemies Computer for Fun & Profit
- Rumors about
HERF Guns
- HERF &
EMP
- Electromagnetic
Effects
- Police Prepare
Stunning End for High-Speed Car Chases
- Electromagnetic
Methods
- Destructive
Energy Devices
- Magnetic
Manipulation of the Mains
- MIT Distribution
Site for PGP - Pretty Good Privacy
- PGP Phone
- Nautilus Secure Phone
Software
- Shredder95
- Garbage
Can
- ICQ Internet
Pager
- Misc
Security Programs
- KeyLogger95
V. 2.0
- BCWipe for Windows 95/Windows
NT 4.0 .
- Password Cracking
Programs
- Computer
Security Tools
- More Security
Tools
- MS-DOS
System Security Tools
- UNIX
General Security Tools
- MacIntosh
General Security Tools
- Security
Tools Collection
- Security
Tools for Internet Administrators
- Wall's
List of Computer Security Tools
- Computer
Security Tools & Resources
- Security
Administration Tools
- Encryption
& Security Tools
- Dave Central
- Encryption Tools Archive
- FreeWare
Encryption Tools
- Anti-Virus
Tools Shareware & Freeware
- Anti-Virus
Tools for 1997
- Anti-Virus
Tools
- Anti-Virus
Tools and Techniques
- Virus and
Anti-virus Information
- Anti-Virus
Scanners for Windows
- Anti-Virus
Scanners for Windows 95
- TCP
Sequence Predator 1
- TCP
Sequence Predator 2
- UDP
Denial ov Service
- ICMP Unreachable
Attack
- Telnet
Gateway
- NUKE
- Octopus
PortStrangler
- Cloak