KOMUNIK.10

16 May 1997 - 24 Dec 1999

Topics

  1. modemi (1066)
  2. fax (91)
  3. kom.programi (386)
  4. telemate (85)
  5. telix (40)
  6. zoc (86)
  7. procomm (9)
  8. ptt (743)
  9. strani.sistemi (49)
  10. domaci.sistemi (228)
  11. yuinternet (99)
  12. provajderi (995)
  13. email (326)
  14. www (1322)
  15. ftp (19)
  16. tcp_ip (78)
  17. hakeri (415)
  18. mobil (376)
  19. razno (400)

Messages - hakeri

hakeri.217 bastion, -> #214, kiki
> kosovskih Albanaca. "Nastavicemo da uklanjamo albanske lazi sa > interneta, a planiramo da uklonimo i NATO sajt", rekao je za "Blic" od > 22. oktobra jedan anonimni muski glas, koji se predstavio kao clan grupe > "Crna ruka". Ne bih im preporucio da skidaju NATO sajt, jer je veliki rizik to uraditi, tj. postoji velika verovatnoca da ce biti uhvaceni, a tek bi to bila steta. Neka rasturaju ove sto prenose lazi, tj. manje vazne. Ovi Nato i sl. su suvise obezbedjeni, a i ne prenose velike lazi ko ovi manji. Zato je moj predlog uklanjanje manjih, a kada njih ponestane onda nek predju na zverke.
hakeri.218 ventura, -> #217, bastion
> Ne bih im preporucio da skidaju NATO sajt, jer je veliki rizik > to uraditi, tj. postoji velika verovatnoca da ce biti uhvaceni, Fora je u tome sto nema sanse da to izvedu 'amateri'. Jer ako jedan ili vise klinja sa kompjuterom, provali u kompjuter 'udruzenja' koje godisnje dobija vise od 2 milijarde dolara, onda, zasto oni dobijaju te pare? 1. Treba provaliti u komp. (nemoguce) 2. Treba sakriti trag da te ne uhvate (vrlo vrlo tesko) -Ako te otkriju treba im pobeci (SF) VeNTuRa
hakeri.219 dr.iivan, -> #215, ventura
> > kosovskih Albanaca. "Nastavicemo da uklanjamo albanske lazi sa > interneta, > a planiramo da uklonimo i NATO sajt", rekao je za "Blic" od > 22. oktobra ^^^^ > > Ma jeah, obicno to tako ide... lako im je sa kosova.com da se igraju > kada ga pokrece neki FREE linux, al natov site ve 'malkice' teze, jer za > njih radi citav tim ljudi na KUPLJENOJ verziji UNIX-a, koji se upravo > trude da sprece 'avanturiste' u sprovodjenju nhihovih namera... Pa? :) I IRIX je kupljeni UNIX, na kome radi Afrodita, pa znam ortaka koji sad može da im obriše ceo disk, ukine bilo koji nalog itd :) Stvar je u tome što ovaj na Afroditi može da ima nalog, što je mogao da bude na mašini i odatle radi posao, a to će malo teže da ide sa NATO-om, pošto njegov UNIX verovatno niko osim njega nema, ali nije nemoguće. Teško će iko provaliti u NATO, a još teže posle toga ostati neuhvaćen, ali to nije nemoguće. Na kraju, ako je to neko i uradio - sigurno se neće javiti, a ni mi za njega saznati :) Ko zna koliko hakera raznih obaveštajnih službi u ovom trenutku ima pristup NATO/Pentagon i sličnim serverima all arround the world :) > BTW. ako bi neko zeleo na ovo da spomene slucaj onog Zadrovcana koji je > provalio u 'pentagon', samo da kazem da to nije tacno... Pentagon je > najvise obezbedjen sto se toga tice, a ortak od tog tipa je bio > kontrolor letenja te mu je dao neke 'informacije', sa kojima je on > provalio u kontrolu letenja na nekom tamo aerodromu.Znaci nikakav Ma taj mu je dao informacije koje je našao na nekom hack sajtu, koje su ovi iz Pentagona namerno lansirali, da bi pohvatali naivne klince, a te šifre sigurno nisu bile sa nekog "pravog" Pentagon servera.
hakeri.220 ventura, -> #219, dr.iivan
> I IRIX je kupljeni UNIX, na kome radi Afrodita, pa znam ortaka koji > sad moze da im obrise ceo disk, ukine bilo koji nalog itd :) Pa i ja znam ortaka koji moze da obrise diskove na FON-u i na EUNet-u da dodaje/brise korisnike itd. Naime Covek je root na oba sistema :>> -A neradi se o tome da je kupljeni UNIX sigurniji, sve zavisi od onoga ko ga odrzava, moze neki laik da kupi SCO UNIX pa da mu ga neko ko ima iskustva sa tom vrstom unixa (sysop) sjebe, znaci treba imati iskusne admine da mi maximalno zastitili sistem. A spomenuo sam kupovinu upravo zbog GPL na linux, jer ja sada mogu da 'doradim' svoj linux, tj. da dopisem u kernel da kada proverava user i sifru pre toga da stavim da moze da se pristupi rootu i preko neke druge sifre (koju samo ja znam) i onda taj linux distribuiram, kao neku tralala veziju. i kada neko instalira taj linux, onda se ja mogu uz pomoc moje dorade logovati na taj sistem kao root, ovo pricam zato sto firma koja pravi/prodaje UNIX-e GARANTUJE da na njihovim KUPLJENIM sistemima ne postoji 'back-door'. > njega saznati :) Ko zna koliko hakera raznih obavestajnih sluzbi u ovom > trenutku ima pristup NATO/Pentagon i slicnim serverima all arround the > world :) U to sam siguran, nisu ni oni iz CIA, vrabci. > Ma taj mu je dao informacije koje je nasao na nekom hack sajtu, koje su > ovi iz Pentagona namerno lansirali, da bi pohvatali naivne klince, a > te sifre sigurno nisu bile sa nekog "pravog" Pentagon servera. Isto tako vataju i revolucionare, ono, postave site i onda napale ove, daju im informacije, T&T, onda oni skupljaju te stvarcice, ponesto i naprave, pa onda Pentagonovci izvedu neko stvarno zesce s*anje, i okrive ove druge, a naravno dokaza ima kolko oces...
hakeri.221 spantic, -> #220, ventura
> Pa i ja znam ortaka koji moze da obrise diskove na FON-u i na EUNet-u > da dodaje/brise korisnike itd. Naime Covek je root na oba sistema :>> I ja bih voleo da upoznam tog čoveka. Naime, ja znam tri čoveka koji to mogu da urade na EUnetu, ali zanimljivo, niko od njih niti može niti ima ambiciju da to radi na Fonu.
hakeri.222 gligo,
Crna ruka strikes again...:) Blic prenosi da su ovoga puta 'srusili' site hrvatskog lista Vjesnik.
hakeri.223 dr.iivan, -> #220, ventura
> -A neradi se o tome da je kupljeni UNIX sigurniji, sve zavisi od onoga > ko ga odrzava, moze neki laik da kupi SCO UNIX pa da mu ga neko ko > ima iskustva sa tom vrstom unixa (sysop) sjebe, znaci treba imati > iskusne admine da mi maximalno zastitili sistem. A spomenuo sam kupovinu Tako je, najveća rupa na sistemu su njegovi admin-i.
hakeri.224 ventura,
Q: Kakva je razlika izmedju korisnika i hakera? A: Korisnik misli da kilobajt ima 1000 bajtova, a Haker misli da kilometar ima 1024 metra.
hakeri.225 ventura,
By Reuters Special to CNET News.com December 28, 1998, 3:45 p.m. PT SHANGHAI--Two hackers who broke into a bank computer network and stole 260,000 yuan ($31,400) have been sentenced to death by a court in eastern China, the official Wenhui Daily said today. The Yangzhou Intermediate Court in Jiangsu province also confiscated 40,000 yuan ($4,830) from Hao Jinglong, formerly an accountant at the Zhenjiang branch of the Industrial and Commercial Bank of China, and his brother Hao Jingwen, the newspaper said. The two opened 16 accounts under various names in a branch of the bank in September and later broke into the branch to install a controlling device in a bank computer terminal, the newspaper said. They used the device to electronically wire 720,000 yuan($86,975) in non-existent deposits into the bank accounts. Afterward, they successfully withdrew 260,000 yuan from eight different branches of the bank, the newspaper said. All the money since has been recovered, the newspaper said without giving further details.
hakeri.226 ventura,
Jebote... zamrla ova konfa... evo jednog TXT-a o hakovanju HotMail-a.... hotmail.txt
hakeri.227 sekirica.joe,
Imam bezicni telefon, bez baze i kradem neciji signal. kako bih mogao da ga povezem sa modemom? Sekira.
hakeri.228 ventura, -> #227, sekirica.joe
> Imam bezicni telefon, bez baze i kradem neciji signal. > kako bih mogao da ga povezem sa modemom? :>> Otvori telefon, i onda one dve zice od mikrofona (u slusalici) spojis na kabal koji potom ustekas na modem... i vozi misko... ;)
hakeri.229 rkramer, -> #228, ventura
C:\> :>> Otvori telefon, i onda one dve zice od mikrofona (u slus C:\> spojis na kabal koji potom ustekas na modem... i vozi C:\> misko... ;) :)))))))))))))))))))))))))))))))))))))))))))))))))))) Nadam se da nisu svi nasi 'hackeri' na ovom nivou ;)
hakeri.230 ventura, -> #229, rkramer
> C:\> :>> Otvori telefon, i onda one dve zice od mikrofona (u slus > C:\> spojis na kabal koji potom ustekas na modem... i vozi > C:\> misko... ;) > > :)))))))))))))))))))))))))))))))))))))))))))))))))))) > > Nadam se da nisu svi nasi 'hackeri' na ovom nivou ;) Jebiga... zajebo sam se na brzinu... treba da imas i povratni signal...
hakeri.231 rkramer, -> #230, ventura
C:\> > C:\> :>> Otvori telefon, i onda one dve zice od mikrofona C:\> > C:\> spojis na kabal koji potom ustekas na modem... i vozi C:\> > C:\> misko... ;) C:\> > C:\> > :)))))))))))))))))))))))))))))))))))))))))))))))))))) C:\> > C:\> > Nadam se da nisu svi nasi 'hackeri' na ovom nivou ;) C:\> C:\> C:\> Jebiga... zajebo sam se na brzinu... treba da imas i C:\> povratni signal... Mmmm... Bolje da cutis - samo se dublje ukopavas... ;) Ako malo bolje razmislis, shvatices da su u najmanju ruku i naponski nivoi drugaciji (na samoj liniji imas napon reda 60V !), pa se unosi i gomila smetnji, pa je pitanje da li se radio talasima prenosi ceo bandwith koji inace prolazi kroz telefonsku mrezu itd, itd, da ne razvlacim U svakom slucaju, po meni je jedino realno resenje koje bi _moglo_ da proradi naci jedan od onih matorih modema koji su se kacili na slusalicu (uh... kako se to zove... akusticki _nesto_... to bi dejanr bolje znao :), ali je problem sto su mislim najbrzi takvi modemi bili 1200 bps i to bez MNP-a. Drugo resenje (po meni manje realno ;) bi bilo da ti neko napravi KONVERTOR koji bi koristeci ono sto prima telefon SIMULIRAO uslove sa telefonske linije... Iako je ovo pretpostavljam dovoljno komplikovano da bi pojedinac radio (zbog cilja kakav imas ;) da bude apsolutno neisplativo... :)
hakeri.232 darth.vader, -> #229, rkramer
>> Nadam se da nisu svi nasi 'hackeri' na ovom nivou ;) Mada, uopste nije lose imati tako nesto ;>>>
hakeri.233 vstan, -> #231, rkramer
> kacili na slusalicu (uh... kako se to zove... akusticki > _nesto_... Akustični kupler
hakeri.234 banos,
da li bi neko mogao da mi posalje neki od programa sa kojim je moguce ucu u tuci racun. preko neta hvala unapred
hakeri.235 ventura, -> #234, banos
> da li bi neko mogao da mi posalje neki od programa sa kojim je moguce > ucu u tuci racun. preko neta :)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))
hakeri.236 rkramer, -> #235, ventura
C:\> > da li bi neko mogao da mi posalje neki od programa sa kojim C:\> > ucu u tuci racun. preko neta C:\> C:\> C:\> :))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))) C:\> )))))))) Vidi ko se smeje ;)
hakeri.237 ventura, -> #236, rkramer
> C:\> > da li bi neko mogao da mi posalje neki od programa sa kojim > C:\> > ucu u tuci racun. preko neta > C:\> > C:\> > C:\> :))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))) > C:\> )))))))) > > > Vidi ko se smeje ;) Mozda pogresim na nekim stvarima... ali nisam bas tolko glup...
hakeri.238 rkramer, -> #237, ventura
C:\> > Vidi ko se smeje ;) C:\> C:\> Mozda pogresim na nekim stvarima... ali nisam bas tolko C:\> glup... Koliko glup? :))))
hakeri.239 ventura, -> #238, rkramer
> C:\> > Vidi ko se smeje ;) > C:\> > C:\> Mozda pogresim na nekim stvarima... ali nisam bas tolko > C:\> glup... > > > Koliko glup? :)))) Ti bas zapeo....
hakeri.240 rkramer, -> #239, ventura
C:\> > C:\> Mozda pogresim na nekim stvarima... ali nisam bas to C:\> > C:\> glup... C:\> > C:\> > C:\> > Koliko glup? :)))) C:\> C:\> C:\> Ti bas zapeo.... Nisam zapeo, nego me interesuje... Nisi zavrsio recenicu... :)))
hakeri.241 ventura, -> #240, rkramer
> C:\> > Koliko glup? :)))) > C:\> > C:\> > C:\> Ti bas zapeo.... > > > Nisam zapeo, nego me interesuje... Nisi zavrsio recenicu... Ni ti nisi zavrsio recenicu :)
hakeri.243 ventura,
Samo da vas obavestim da su sve sifre sa EUNet-a skinute, jos pre par meseci. Ukoliko je neko od vas ostecen ima pravo da tuzi eunet jer ste pri otvaranju naloga potpisali ugovor o koriscenju internet servisa. Naravno, kao i uvek, zvanicnici nista ne govore, i sve poricu...
hakeri.244 file, -> #243, ventura
EUnet ne EUNet :)
hakeri.247 dr.iivan, -> #243, ventura
> meseci. Ukoliko je neko od vas ostecen ima pravo da tuzi eunet jer > ste pri otvaranju naloga potpisali ugovor o koriscenju internet servisa. To što sam potpisao taj Ugovor mi ama baš ništa u tom slučaju ne znači. Baš me zanima kako bih ja mogao da tužim EUnet bez dokaza. Sve što ja znam jeste da sam siguran da mi negde fali par sati (ovo samo kao primer), a to ne mogu nikome da dokažem, ponajmanje nekom sudiji našeg suda. Za njega postoji samo lista poziva, a svaki je obavljen sa analogne centrale, pa nema broja telefona u koloni, što znači da nema ni dokaza. Ali zato, kad bih nekim slučajem ja zgrešio nešto na Web-u, EUnet i ima dokaze, i može da me tuži.
hakeri.248 jpedja, -> #247, dr.iivan
> primer), a to ne mogu nikome da dokazem, ponajmanje nekom sudiji > naseg suda. Za njega postoji samo lista poziva, a svaki je > obavljen > sa analogne centrale, pa nema broja telefona u koloni, sto znaci > da nema ni dokaza. > > Ali zato, kad bih nekim slucajem ja zgresio nesto na Web-u, > Eunet > i ima dokaze, i moze da me tuzi. Suma sumarum, eunet su smradovi, a to je poznato jos od kad su se pojavili, s' tim sto sad kad imaju konkurenciju to postaje sve izrazenije ... Pozdrav, Pedja...
hakeri.249 spantic, -> #243, ventura
> Samo da vas obavestim da su sve sifre sa EUNet-a skinute, jos pre par > meseci. Ukoliko je neko od vas ostecen ima pravo da tuzi eunet jer > ste pri otvaranju naloga potpisali ugovor o koriscenju internet servisa. > Naravno, kao i uvek, zvanicnici nista ne govore, i sve poricu... Ja se zbog tebe nadam da imaš neki dokaz za ovu svoju izjavu, s ozbirom da sve što izjaviš podleže tvojoj odgovornosti. Mnogima je poznato da radim u EUnet Yugoslavia. Jedna od mojih primarnih dužnosti je sistem administrator. Citirana izjava je najobičnija neistina i dezinformacija.
hakeri.250 jpedja, -> #249, spantic
> Ja se zbog tebe nadam da imas neki dokaz za ovu svoju izjavu, > s ozbirom da sve sto izjavis podleze tvojoj odgovornosti. JEl to po onom vasem novom zakonu o informisanju , a?
hakeri.251 stameni, -> #249, spantic
>> > Naravno, kao i uvek, zvanicnici nista ne govore, i sve poricu... >> Citirana izjava >> je najobičnija neistina i dezinformacija. Mislim da je bar gore bio u pravu... ;)
hakeri.252 spantic, -> #250, jpedja
> JEl to po onom vasem novom zakonu o informisanju , a? U svakoj normalnoj državi odgovaraš za ono što kažeš. Ako nešto ne možeš da dokažeš to je kleveta i kompenzaciju za nju isplaćuješ oštećenoj strani, a ne državi.
hakeri.253 ventura, -> #252, spantic
> > JEl to po onom vasem novom zakonu o informisanju , a? > > U svakoj normalnoj drzavi odgovaras za ono sto kazes. > Ako nesto ne mozes da dokazes to je kleveta i kompenzaciju > za nju isplacujes ostecenoj strani, a ne drzavi. zaboravio si na kom poluostrvu zivis...
hakeri.254 ventura,
Mali info o Kevinu Mitniku, posto je skoro napunio 4 godine u zatvoru i jos uvek ceka na sudjenje... flyer1.zip
hakeri.255 ventura,
U toku sledece godine izlazi film pod imenom pod imenom "TakeDown", bojkotovan od strane 2600, jer ne opisuje verodostojno hapsenje kevina mitnika.... flyer.zip
hakeri.256 van.gogh,
Crna Ruka...se nadvila nad svetom.... ;) Ono kao...i treba...
hakeri.257 rkramer, -> #256, van.gogh
C:\> Crna Ruka...se nadvila nad svetom.... ;) C:\> C:\> Ono kao...i treba... Samo da momci ne preteraju, pa nam cviknu internet... To bi nam bio zestok autogol... :(
hakeri.258 indi, -> #256, van.gogh
-> Crna Ruka...se nadvila nad svetom.... ;) cujem sjebali su pentagonovo neko sranje u vezi sa mornaricom...
hakeri.259 pperica, -> #256, van.gogh
Pa to oni grade sebi alibi....kad roknu neutronku na kosovo reci ce: nismo mi, eto, srpski hakeri....
hakeri.260 van.gogh, -> #259, pperica
VA>Pa to oni grade sebi alibi....kad roknu neutronku na kosovo VA>reci ce: nismo mi, eto, srpski hakeri.... :))))
hakeri.261 bovi,
Sto se tice Euneta: Meni je naprasno nestalo par sati. Moguce da je to sa kradjom lozinki istina. Ja se ne secam da sam ja to potrosio. Zasto Eunet nije upozorio korisnike na ovo? Ako hoce da sve bude po zakonu, njihovo pravo je da opomenu sve korisnike.
hakeri.262 bovi, -> #261, bovi
> Ako hoce da sve bude po zakonu, njihovo pravo je da opomenu sve > korisnike. ^^^^^ Hteo sam reci obaveza.
hakeri.263 obren, -> #261, bovi
> Sto se tice Euneta: Meni je naprasno nestalo par sati. Moguce da je > to sa kradjom lozinki istina. Ja se ne secam da sam ja to potrosio. > Zasto Eunet nije upozorio korisnike na ovo? Nije bilo nikakve krađe lozinki, u pitanju je obična dezinformacija koja se sada širi kao istina jer je toliko puta ispaljena u javnost. Pogledaj u listi seansi kada si sve zvao i koliko dugo si bio na vezi, sva je prilika da si se ti malo preračunao.
hakeri.264 dr.iivan,
Šta rade ruski hakeri sajtovima američke vlade :) govcrack.jpg
hakeri.265 roach, -> #261, bovi
Najbolje je da odes licno i da uplatis, ovako ce neko iz Eunet-a sigurno da ti uzme malo. :(
hakeri.266 ventura, -> #257, rkramer
> Samo da momci ne preteraju, pa nam cviknu internet... To bi > nam bio zestok autogol... :( Mogu samo da nam precvikaju glavnu 'liniju' koja ide u madjarsku ali nam druge ostaju, uostalom gomila provajdera ima satelitske linkove.
hakeri.267 rkramer, -> #266, ventura
C:\> > Samo da momci ne preteraju, pa nam cviknu internet... C:\> > nam bio zestok autogol... :( C:\> C:\> Mogu samo da nam precvikaju glavnu 'liniju' koja ide u C:\> madjarsku C:\> ali nam druge ostaju, uostalom gomila provajdera ima C:\> satelitske linkove. C:\> Ajme, opet ti... ;) Mislio sam na skidanje celokupnog domena sa mreze. Ionako smo na blacklistovima mnogih provajdera zbog spamovanja i mail bombinga.
hakeri.268 ventura, -> #267, rkramer
> Ajme, opet ti... ;) :) > > Mislio sam na skidanje celokupnog domena sa mreze. Ionako smo > na blacklistovima mnogih provajdera zbog spamovanja i mail bombinga. Aaaaa too :) Pa ako ga skinu nasi provajderi mogu da predju na .net domene...
hakeri.269 rkramer, -> #268, ventura
C:\> Aaaaa too :) C:\> Pa ako ga skinu nasi provajderi mogu da predju na .net C:\> domene... Pcelice mamina... Ajde, idi blago nama da spavas, vidi se da si umoran od svega ;)
hakeri.270 kiki, -> #266, ventura
> Mogu samo da nam precvikaju glavnu 'liniju' koja ide u madjarsku > ali nam druge ostaju, uostalom gomila provajdera ima satelitske linkove. a mogu samo i da nam gadjaju EUnet ( :>>>>> ), InfoSky.. itd ;)
hakeri.271 vantic, -> #270, kiki
-> a mogu samo i da nam gadjaju EUnet ( :>>>>> ), InfoSky.. itd ;) PTT daj Boze ,pa da izgrade novi!
hakeri.272 fear,
Ode ova tema dodjavola ali evo jedan programcic za zajebavanje po netu imate vise mogucnosi boom pismo, ping, ip scanner, port scanner.....
hakeri.273 ventura,
S-Tools 4.0 Interesantan programcic koji sluzi za sakrivanje fajlova u BMP i WAV. Sakriveni fajl se kriptuje, sakrije se u sliku/Wav, a slika ostaje ista. s-tools4.zip
hakeri.274 fear, -> #273, ventura
I sta se time postize?
hakeri.275 obren, -> #274, fear
> > S-Tools 4.0 > > > > Interesantan programcic koji sluzi za sakrivanje fajlova u BMP i WAV. > > Sakriveni fajl se kriptuje, sakrije se u sliku/Wav, a slika ostaje > > ista. > > I sta se time postize? Ova tehnika se naziva steganografija i predstavlja vid enkripcije kojem se sve više poklanja pažnja. Radi se se o tehnici kojom se u multimedijalne datoteke na pogodan način ukodira i neka informacija (obično tekst) tako da se to ne primeti (bitovi koji nose kodiranu informacije su rasuti po slici na pogodan način tako da se vizuelno/na sluh ne primećuju ali se mogu restaurirati na prijemnoj strani). U čemu je kvaka kod ove tehnike: kada šalješ poruku šifrovanu recimo PGP-om ili nekim sličnim programom, automatski budiš sumnju da se u poruci krije nešto važno i tajno te samim tim pobudjuješ interesovanje kod odgovarajućih službi ;) Čak iako ne mogu da razbiju šifrat, mogu jednostavno da obrišu takvu poruku ("nestala u morima Interneta") i osujete prenost informacije. Međutim, ako pošalješ e-mail poruku u kojoj diskutuješ o sisatim plavušama i uz nju zakačiš JPG sa jednom od njih, ali takav da se u sliku ukodirane neke dodatne informacije koje prijemna strana očekuje, ovakva poruka najverovatnije neće pobuditi pažnju dežurnog "špijuna" ili softvera za filtriranje e-maila. Čak iako odluči da pogleda kakva je to slika u pitanju videće zaista običnu "sisatu plavušu" ali ne i informaciju koja je utisnuta u samu sliku. Nadam se da sam uspeo da dočaram u čemu je kvaka.
hakeri.276 dr.iivan, -> #273, ventura
> S-Tools 4.0 > > Interesantan programcic koji sluzi za sakrivanje fajlova u BMP i WAV. > Sakriveni fajl se kriptuje, sakrije se u sliku/Wav, a slika ostaje ista. Da li ovaj program radi i obrnuti smer?
hakeri.277 dr.iivan, -> #275, obren
> > > S-Tools 4.0 > > > Interesantan programcic koji sluzi za sakrivanje fajlova u BMP i WAV. > > Ova tehnika se naziva steganografija i predstavlja vid enkripcije kojem > se sve više poklanja pažnja. Radi se se o tehnici kojom se u > > kod odgovarajućih službi ;) Čak iako ne mogu da razbiju šifrat, mogu > jednostavno da obrišu takvu poruku ("nestala u morima Interneta") i > > Međutim, ako pošalješ e-mail poruku u kojoj diskutuješ o sisatim > plavušama i uz nju zakačiš JPG sa jednom od njih, ali takav da se u sliku > ukodirane neke dodatne informacije koje prijemna strana očekuje, ovakva Da li postoji način da strana koja nije prijemna provali da u fajlu postoji neki drugi sadržaj osim slike? Na koji način prijemna strana dekodira dokument? Da li taj način obezbeđuje da niko osim nje ne može da vidi dokument? I postoji li još koji program slične namene i da li se njegov princip šifrovanja razlikuje?
hakeri.278 ventura, -> #276, dr.iivan
> > S-Tools 4.0 > > > > Interesantan programcic koji sluzi za sakrivanje fajlova u BMP i WAV. > > Sakriveni fajl se kriptuje, sakrije se u sliku/Wav, a slika ostaje ista. > > Da li ovaj program radi i obrnuti smer? Naravno... samo program nije bas najjasniji sto se tice koriscenja, elem, kratko uputstvo... otvoriti program i u njega prevuci neki bmp/wav, potom u tu sliku dovuci neki fajl i upisati zeljenu sifru. potom desnim dugmetom se klikne na sliku i ide na save ili save as. i onda sliku saljes nekome... primalac isto tako prevuce tu sliku u program, klikne desnim dugmetom i ide na Reveal, unosi frazu, i pojavljuje se prozorcic sa sakrivenim fajlovima, koji se prevlace na zeljenu destinaciju.
hakeri.279 ventura, -> #277, dr.iivan
> Da li postoji nacin da strana koja nije prijemna provali da u fajlu > postoji neki drugi sadrzaj osim slike? Pa ako pretrpas sliku odnosno ako je slika mala a fajl koji stavljas veliki onda ce se pri velikom zumu videti mali 'sum' i moze da se posumnja, ali ukoliko se u recimo sliku od mega stavi text od par kila, a pritom je slika prepuna boja i ostalih dzidzbidza, gotovo je nemoguce sa sigurnocu reci da ima u toj slici nesto. > Na koji nacin prijemna strana dekodira dokument? Da li taj nacin > obezbeduje da niko osim nje ne moze da vidi dokument? Procitaj moju predhodnu poruku. Taj fajl koji se umece u sliku se predhodno kriptuje jakim algoritmom, sto je dosta sigurno. > I postoji li jos koji program slicne namene i da li se njegov princip > sifrovanja razlikuje? Verovatno postoji, mada u ovom programu ima dosta sigurnih algoritama, i zato je pouzdan...
hakeri.280 fear, -> #275, obren
Uspeo si da docars u cemu je kvaka. Hvala.
hakeri.281 fear,
Malo sam procesljavao kroz ranije poruke u ovj konferenciji i video kriptere i kad pokusam da da desifrujem onaj chalenge.txt on mi kaze could not open destination file.
hakeri.282 obren, -> #277, dr.iivan
> Da li postoji način da strana koja nije prijemna provali da u fajlu > postoji neki drugi sadržaj osim slike? Naravno, tehnika nije 100% imuna na oktrivanje iako je neki danas zovu i "stealth cryptography" ;) a svi znamo da ono što je stealth nije baš uvek nevidljivo ;)) Inače steganografija je vrlo korišćen metod u totalitarnim državama koje zakonima zabranjuju svojim gradjanima da koriste PGP i sl. progame, kao što je recim Kina. Zanimljivo je da i jedna Francuska zabranjuje svojim građanima korišćenje "jakih" algoritama i programa za enkripciju. Ukoliko neki Kinez pošalje e-mail poruku koja u sebi sadrži PGP tagline, sigurno će biti provaljen i policija će mu pokucati na vrata da se raspita šta to on krije od države. Međutim, ukoliko isti taj Kinez pošalje svom prijatelju u Americi PGP-ovan tekst u sklopu slike sa venčanja svoje sestre i prigodnim propratnim tekstom, najverovatnije neće pobuditi ničiju sumnju i u toj kombinaciji je glavni štos. > Na koji način prijemna strana dekodira dokument? Ako pitaš za S-Tools, odvučeš sliku/zvuk u okvir prozora ovog programa, klikneš desnim tasterom na sliku i odabereš "Reveal" (i otkucaš lozinku). > Da li taj način obezbeđuje da niko osim nje ne može da vidi dokument? Čak i da neko provali da se u slici nalazi utisnuto i nešto više, i dalje mu ostaje problem kako da razbije to nešto više. Koliko sam video, može se birati između nekoliko ponuđenih algoritama za jaku enkripciju, među kojima je i IDEA koga koristi popularni PGP, kao i diskutabilni DES, čija dužina ključa je prekratka za današnju snagu računara. Opet, ako gajiš sumnje prema implementacijama koje je odradio autor ovog programa, datoteku možeš prvo kriptovati ručno pomoću nekog proverenog programa (recimo PGP) pa tek onda provući kroz S-Tools, čime postižeš čak tri vida zaštite podataka - dva šifrovanja i jedno kamufliranje ;) > I postoji li još koji program slične namene i da li se njegov princip > šifrovanja razlikuje? Svakako, potraži na internetu ključnu reč "steganography" naći ćeš sigurno dosta informacija, pa i programa na tu temu. Ipak, ovaj koji je Ventura poslao je jedan od boljih koje sam video, mada je način korišćenja pomalo čudan i neintuitivan.
hakeri.283 ventura, -> #281, fear
> Malo sam procesljavao kroz ranije poruke > u ovj konferenciji i video kriptere > i kad pokusam da da desifrujem onaj > chalenge.txt on mi kaze could not open destination file. A ti si ga otvaro u wordu... ql... BTW malo si zakasnio sa tim dekriptovanjem... svi ti fajlovi su dekriptovani i nalaze se u istoj konfi.
hakeri.284 fear, -> #283, ventura
Znam ali nema ih vise. CU
hakeri.285 aandric,
Jel isao neko na www.srbija.com? Ono je nevidjena bruka i zahteva osvetu po hitnom postupku!
hakeri.286 fear, -> #285, aandric
>Jel isao neko na www.srbija.com? >Ono je nevidjena bruka i zahteva osvetu po hitnom postupku! Povajder je prepun (BeoTelNet) i stalno je zauzeto. Sta je na www.srbija.com? Sta je tako strasno.
hakeri.287 ventura, -> #285, aandric
> Jel isao neko na www.srbija.com? > > Ono je nevidjena bruka i zahteva osvetu po hitnom postupku! :)) To stoji tako vec 3 godine...
hakeri.288 aandric, -> #287, ventura
AA> > Jel isao neko na www.srbija.com? AA> > AA> > Ono je nevidjena bruka i zahteva osvetu po hitnom postupku! AA> AA> :)) To stoji tako vec 3 godine... Moguce, nikad ranije nisam isao. Sad slucajno odem kad ono: shahovnica. Jebote, reko, sta je ovo. Pa sto niko nista ne preduzme?
hakeri.289 ventura, -> #288, aandric
> Moguce, nikad ranije nisam isao. > Sad slucajno odem kad ono: shahovnica. > Jebote, reko, sta je ovo. > > Pa sto niko nista ne preduzme? A imas isto tako jugoslavija.com
hakeri.290 dusandz, -> #289, ventura
)--> A imas isto tako jugoslavija.com A topic kanala #serbia na DALNetu je 'ZA DOM!'...
hakeri.291 killboy,
Sta je ovo bre po srpskim sjtovima?!!!!
hakeri.292 aandric, -> #291, killboy
AA> Sta je ovo bre po srpskim sjtovima?!!!! Ma to samo pokazuje koliko su iskompleksirani i koliko misle samo na nas.
hakeri.293 dr.iivan, -> #282, obren
> Inače steganografija je vrlo korišćen metod u totalitarnim državama koje > zakonima zabranjuju svojim gradjanima da koriste PGP i sl. progame, kao > što je recim Kina. Zanimljivo je da i jedna Francuska zabranjuje svojim > građanima korišćenje "jakih" algoritama i programa za enkripciju. Pa Francuska je policijska država, po rangu odmah tu negde oko nas :) Ne priznaje nacionalne manjine, a ima ih dosta sa separatističkim idejama i sve to jako prikriva. Kad bi se tamo desilo nešto slično bivšoj SFRJ, od Francuske ništa ne bi ostalo. > > I postoji li još koji program slične namene i da li se njegov princip > > šifrovanja razlikuje? > > Svakako, potraži na internetu ključnu reč "steganography" naći ćeš > sigurno dosta informacija, pa i programa na tu temu. Ipak, ovaj koji Vrlo zanimljiva stvarčica, prvi put čujem za to :) Hvala tebi i venturi na pojašnjenju.
hakeri.294 ventura, -> #292, aandric
> AA> Sta je ovo bre po srpskim sjtovima?!!!! > > Ma to samo pokazuje koliko su iskompleksirani i koliko misle samo > na nas. A kojim to srpskim sajtovima?
hakeri.295 ventura,
Ovo nemoze proci tek tako... > ========================= > 85476 Za ventura Nije procitano > Od killboy 04.05.99. 17:30 128 chr > --------------------------------------------------- > E sve mi je jasno kako se ulazi u sistem ali > kako da provalim pass i user name to mi nije jasno. > Pomagaj molim te. > Pozdrav > -------------------------------------------85476---
hakeri.296 rkramer, -> #295, ventura
C:\> Ovo nemoze proci tek tako... C:\> C:\> > ========================= C:\> > 85476 Za ventura Nije procitano C:\> > Od killboy 04.05.99. 17:30 128 chr C:\> > --------------------------------------------------- C:\> > E sve mi je jasno kako se ulazi u sistem ali C:\> > kako da provalim pass i user name to mi nije jasno. Pa objasni coveku... ;) (NHF, nije moglo da prodje tek tako...)
hakeri.297 killboy,
Shta bre ne mozhe da prodje tek tako bre. Lepo sam te pitao da mi objasnish a ti me tu blamirash. grrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
hakeri.298 aandric,
Da li je nekako moguce pogledati spisak svih fajlova koji se nalaze na odredjenom mestu na Internetu, bez logovanja na server? To bi bilo nesto kao otkucati "DIR" u nekom direktorijumu. (npr. treba mi informacija o spisku fajlova na http://members.xoom.com/_XOOM/ggromozeka/aviation/*.* )
hakeri.299 ventura, -> #298, aandric
> Da li je nekako moguce pogledati spisak svih fajlova koji se > nalaze na odredjenom mestu na Internetu, bez logovanja na > server? To bi bilo nesto kao otkucati "DIR" u nekom > direktorijumu. Mislim da bi se sa UUCP-om to moglo uraditi... samo sto server koji gledas treba da podrzava UUCP
hakeri.300 madamov, -> #298, aandric
> (npr. treba mi informacija o spisku fajlova na > http://members.xoom.com/_XOOM/ggromozeka/aviation/*.* ) FTP klijent Anarchie Pro na Macintoshu to može. P.S. Što u temu hakeri, pobogu?
hakeri.301 aandric, -> #300, madamov
AA> > (npr. treba mi informacija o spisku fajlova na AA> > http://members.xoom.com/_XOOM/ggromozeka/aviation/*.* ) AA> AA> FTP klijent Anarchie Pro na Macintoshu to može. AA> AA> P.S. Što u temu hakeri, pobogu? E steta, treba mi za PC. P.S. Zato sto mi treba za neke manje vise nedozvoljene radnje, a rekoh verovatno ce neko ko prati ovu temu znati da mi da odgovor;)
hakeri.302 ventura, -> #301, aandric
> E steta, treba mi za PC. Pa nije problem da nadjes emulator mekintosa...
hakeri.303 aandric, -> #302, ventura
AA> > E steta, treba mi za PC. AA> AA> Pa nije problem da nadjes emulator mekintosa... Ajd reci mi proceduru i posalji ako mozes emulator za Mac.
hakeri.304 ventura, -> #303, aandric
> AA> Pa nije problem da nadjes emulator mekintosa... > > Ajd reci mi proceduru i posalji ako mozes emulator za Mac. Nisam se nikada zezao sa mac-ovim emulatorima, ali na amiginom emulatoru ide odprilike ovako: skines neki fajl sa neta, i uz pomoc posebnog programa prebacis taj fajl u image koji predstavlja amigin disk (ili mountujes svoj disk, mada neznam dali mac-ov emulator podrzava mountovanje) i onda pustis emulator i pokrenes program...
hakeri.305 dekiz,
Potrebaqn mi je program "KABOOM" ako ga neko ima neka ga posalje ovde u conf. LLGS!
hakeri.306 killboy, -> #305, dekiz
> Potrebaqn mi je program "KABOOM" ako ga neko ima neka ga posalje > ovde > u conf. > LLGS! Za shta sluzhi taj program i shta radi?
hakeri.307 ventura,
Evo nekih interesantnih fazona iz jedne knjige... #1 kreirajte neki direktorijum i umesto njegovog imena odkucajte karakter alt+255, potom se kuca xcopy c:\ c:\(alt+255) /s/e #2 u neki batch se ubaci: ECHO Y format c: /q #3 c:\>debug -e 100 neki tamo dump.... -g c:\> #4 ovaj je najinteresantnij: u autoexec se ubaci linija prompt=$E[0;30;40m i u config.sys device = c:\windows\command\ansi.sys ne preporucujem da ovo probavate na svom komp-u...
hakeri.308 indi, -> #307, ventura
-> Evo nekih interesantnih fazona iz jedne knjige... -> ne preporucujem da ovo probavate na svom komp-u... reci onda priblizno sta bi se deslio kad bi se svaka od ovih stvarcica uradila i iz koje je to knjige?
hakeri.309 rotten,
Ajd ako neko ima program za skidanje necijeg IP-a neka ga baci!
hakeri.310 killboy, -> #309, rotten
Imamja ali samo sa ICQ ako ti treba
hakeri.311 kiki, -> #310, killboy
> Imamja ali samo sa ICQ ako ti treba Za koji icq? 98 ili 99?
hakeri.312 killboy, -> #311, kiki
Valjda za 98 mozhda radi i na 99(isprobano na 98).
hakeri.313 indi, -> #312, killboy
-> Valjda za 98 mozhda radi i na 99(isprobano na 98). e, jeste culi za ver 2000? :)
hakeri.314 kiki, -> #312, killboy
> Valjda za 98 mozhda radi i na 99(isprobano na 98). To sam i predpostavljao, radi samo na 98 verziji.. probano na 99 i ne radi.
hakeri.315 killboy, -> #314, kiki
Bilo je dosta o tome u nekoj newsgroup-i ne radi valjda zato shto je drugachiji .exe fajl.
hakeri.316 jones,
Ajde ako neko zna kako da dekodira *.pwl fajlove neka javi... pozdrav
hakeri.318 ventura,
Evo par intervijua sa Kevinom Lee Poulsenom, u jednom od njih se spominje ona cuvena kradja porsea... The Kevin Poulsen Story 2: Tattoos and Reform The Site: So are you rehabilitated? Poulsen: If nothing else I'm just too old for that sort of thing. The Site: What's ahead for you? What are you going to do in the future? Poulsen: Right now I'm doing political work with a grassroots organization in Los Angeles. Once my supervision restrictions are lifted, or if they're eased-- in the last year, my probation officer has learned a bit more about computers and he's beginning to feel like he might be able to give me a little leeway there if I don't have access to a modem or a network or any location with all of that stuff. Then I would like to, of course, get back involved with computers. A lot of opportunities are available now that weren't back when I first go into this trouble. The Site: So you have an unusual design on your T-shirt. Actually that's, you have the tattoo too right? Poulsen: Yeah, this is based on a prison tattoo, an authentic prison tattoo that I got. The Site: What some guy named Rocco came over and scratched it in your skin? Poulsen: Well, I don't remember his name. I don't think it was Rocco. It cost me a lot in cigarettes in order to get it done. The Site: Really? And you gave him the drawing and he tattooed it on? Poulsen: I Xeroxed my arm, and he... The Site: But, no, the original tattoo, you drew something and then.. Poulsen: Yeah, I gave him the concept. and he sort of drew it out and I said, "yeah, make a change there, make a change there," and then he slung the ink as they say. The Site: And now you have this T-shirt. So what, what does it mean? Poulsen: I actually don't like to verbalize what it means because if I could put it into words, then I wouldn't have had to make it into a picture. The Site: But now that's part of the great seal of the United States, isn't that on the back of the dollar bill? Poulsen: Well it's much older than that. It goes back to Masonry and it's been linked to the Bavarian Illuminati and... The Site: It's kind of a cultish kind of a thing, huh? Poulsen: Yeah. I guess to me it represents the power structure in general. The Site: OK. So that's the government? Poulsen: Right. The Site: So, for instance, when you cracked radio station contests and were able to win those contests, does does that count? It sounds to me like you're taking money. Poulsen: Well, they were giving the stuff away anyway. The Site: So why not just have it be you? Poulsen: Yeah, I mean you could certainly argue that I cost them in that the credibility of their contests was affected, and they may not be able to get as good ratings the next time they do a promotion like that. Yeah, that was definitely a gray area. Plus, I certainly have victimized the people that played that contest and thought they had a chance of winning when didn't or had a much slimmer chance than they would have otherwise. There's also a feeling in the hacker community that it's wrong to profit from your hacking. That's actually something that goes way back to the roots of hacking where people actually said it was wrong to go to work for a corporation and be paid to design computers or write software. So yeah, I definitely crossed the line in some ways. The Site: Right. I mean you would sit, according to, and now I would have to say I'm quoting in many cases Jonathan Littman's book about you, The Watchman. I know you just rolled your eyes. I've looked at your webpage, and you're obviously not real happy about it. So before I go on quoting Jonathan Littman, maybe you should tell me what's wrong with that book? Poulsen: It's really readable. I recommend it to somebody that wants a good, easy read. It's a good story. He wanted it to read like fiction and so he he wrote it like fiction. The Site: And yet he interviewed you, he interviewed your friends, he got a lot of information out of you, right? Poulsen: Yeah, but he makes things up. I'm not going to say the entire book is made up, he gets the major events right. But by changing a lot of little things-- dialogue, things that I said, things that other people said, or circumstances, or omitting characters that were involved in certain hacks. He portrays an overall image that just isn't accurate. It's like he started with the title; "...the twisted life and crimes of a serial hacker." And then he wrote the book in such a way that fit the title and did whatever he had to make that work. The Site: If I talk about an incident that is not so, that Jonathan made up, you tell me. But since that, right now, is the only source we have for information about you, let's talk about one incident that he talks about, the Mutual of Omaha basement. You were able to get in, tap into Telenet, which is the network, the online connection that banks use to send unencoded information back and forth. At that point, you had access to unencrypted transactions, passwords, information. You had the information you needed to steal billions. Poulsen: Actually, Eric did that. I wasn't involved in the Telenet tap. He shared some of the data with me. The biggest catch from that was the California Department of Motor Vehicles. The Site: The ability to get information about people through their driver's license or their vehicle tags. Poulsen: Yeah, exactly. It came in handy. If I saw suspicious cars I could run them, and if it comes back with no listing, or something, well, then I know it's probably the FBI. The Site: So why did Eric do that. Why didn't he steal all that money he had access to? Poulsen: He tried. After he turned me in and went to work for the FBI, he started doing credit card scams on the sly, and they tried to arrest him for that. He took off, and as a fugitive he engineered what would have been a theft of how much? I think 250,000 dollars from a bank using the same Telenet tap again, or another one that he set up. But it didn't go through because he just didn't know what he was doing. The Site: You certainly had the ability to do this kind of thing though? Poulsen: I imagine so, but I never really looked into it. The Site: You had no interest in doing that? Poulsen: No. In the radio stations, you know, that was definitely a gray area. But they were giving the stuff away, so it didn't feel like theft. Transferring money from one bank to another, that's outright theft. The Site: And so you had no interest in doing anything like that? Poulsen: No serious interest. The Site: Yeah. So, a theoretical interest. It sounds like this is an intellectual challenge more than anything else for you? What was the pleasure, what was the interest in doing this? Poulsen: Like I've said before, it it has the same intellectual satisfaction that ordinary hacking, computer programming, hardware, has plus the added element of risk and of adrenaline and having actual opponents you're working against. The Site: So going to a job where you would be a security advisor and hack into banks at their behest to try to help them with their security would have less interest since there is no risk in getting caught? Poulsen: Yeah I think that could be fun because it's getting around things and finding loopholes, and you get to use the devious portion of your brain, which is always good to exercise now and then. But, it certainly wouldn't be the same as hacking. The Site: Is there, do you think there's hysteria around the idea of hacking? I mean that people are going overboard at the risks that hackers... Poulsen: Yeah and I think it's, the hysteria is something that serves a specific portion of society, the government and the large corporations that want to see more restrictive laws either governing how we can use technology like the Internet-- you've seen the Communications Decency Act, the Communications for Law Enforcement Assistance Act-- their attempts to legislate encryption. Hackers are useful as scapegoats, as ways of justifying these more restrictive laws. The Site: So what's their long term agenda? Poulsen: The Internet is really an unprecedented use of technology. It's global, it ignores borders, it's very difficult to control or to censor, and I think that makes a lot of people nervous. Their long-term agenda would be to change that and put more severe restrictions on it. Are Hackers Dangerous? The Site: So what do you think? Are hackers dangerous? Are they a threat to the international community? Obviously you're not, but others? Poulsen: I still haven't heard of a case of a hacker doing anything that's really dangerous. We've been around for a long time, and there still haven't been any major computer catastrophes that have been attributed to hackers. The Site: Is there, do you think there's hysteria around the idea of hacking? I mean that people are going overboard at the risks that hackers... Poulsen: Yeah and I think it's, the hysteria is something that serves a specific portion of society, the government and the large corporations that want to see more restrictive laws either governing how we can use technology like the Internet-- you've seen the Communications Decency Act, the Communications for Law Enforcement Assistance Act-- their attempts to legislate encryption. Hackers are useful as scapegoats, as ways of justifying these more restrictive laws. The Site: So what's their long term agenda? Poulsen: The Internet is really an unprecedented use of technology. It's global, it ignores borders, it's very difficult to control or to censor, and I think that makes a lot of people nervous. Their long-term agenda would be to change that and put more severe restrictions on it. The Site: Well, how much of that is because it hasn't happened, and how much of it is because nobody wants to tell that it happened? I mean isn't there a bit a coverup going on? Poulsen: When a major long distance company's network fails, the first response is 'hackers did it,' then it turns out to be a software bug. The Site: They like to blame you guys. Poulsen: Yeah when there are power outages because of a computer error it's the same thing. Hackers have been around since the beginning of the computer revolution. In fact they, they basically started the computer revolution. And if nothing's happened yet, the odds are nothing's going to. The Site: I want to ask you a little bit about how hackers are approached. Hackers have some skills that would be useful for corporations, for governments. Do they ever approach you and say, "Hack for us? Help us out?" Poulsen: Not me personally. It's well known that the CIA has, you know, a computer intrusion program for breaking into computers in foreign governments, probably for more corporate espionage. The Site: So some hacker probably wrote those programs for them. Poulsen: That seems pretty likely. It would make sense for them to go to somebody that's been doing this all their lives, rather than somebody that just graduated college. The closest I know of something like that happening, is one of my co- defendants-- who actually was an informant it turns out-- who worked at a investigative corporate security firm in Southern California. And this was somebody who had ties to the intelligence community. But all they paid him to do was wiretap individuals for the benefit of other corporations that were paying them, the clients. The Site: You're talking about Eric? Poulsen: Yeah. Eric. The Site: "Eric." How big a problem is this? I've heard hackers say the real problem is not hackers on the outside, the real problem is internal jobs done by disgruntled employees or corporate espionage. Would you agree with that? Poulsen: Yeah, it certainly makes a lot more sense to worry about the people that are inside that have access to the information or the equipment or whatever directly than to worry about somebody coming in from the outside. That's definitely where more of the threat would be. By the time a hacker gets to the point where he or she can break into computers at will, they've been around long enough so that they've also been ingrained with a hacker ethic that would prohibit them from doing anything malicious like that or selling information to foreign governments. People that are inside well they just suddenly have access to this stuff so it would be... The Site: They have no ethic, they got the information and they, for one reason or another, may want to use that. Poulsen: Yeah. I would say that's where the threat is. The Site: This hacker ethic is interesting though. It seems variable. I mean some people believe it's one thing, some people believe it's another thing. Is there a real code, or is it just whatever you say it is? Poulsen: The basic part that never changes is that you are not supposed to be malicious, you are not supposed to do damage, and you're not supposed to cost anybody money. Excepting the money they spend catching you and putting you in prison. That's unavoidable. From: sschoenh Date: 07/31/97 03:34:23 PM AST Subject: question for kevin What do you think about this idea? Because of your experience and because of increasing legal restrictions on the flow of information, elite hackers sell out and go to work for the powers that [wanna] be [forever] instead of remaining a sort of alternative source of information. The powers that be (megacorps/gov't) get more and more powerful, creating a true power elite and a class of drones (people who can't hack well enough not to get caught by the sold out elites). Isn't this where we're headed? What are your plans? Are you going to work for The Man? >>KP<< I think that hackers have a future as the proverbial fly in the ointment to the "power elite." As for me going to work for The Man: Been there; done that. >>/KP<< 2 From: hont Date: 07/29/97 12:20:24 PM MST Subject: Kevin Poulsen In your previous interview it said that you weren't aloud to touch a computer until 1999. Are you still reading up on current technology in the computer world so you don't fall behind on information, or have you given up on the idea of ever getting a job and working with computers again? So much has changed from back in the '80s that it seems that it would be difficult for you to keep up unless you had the opportunity to operate a computer and test out new things. My second question is, were you ever banned from using a touch tone phone for the phreaking you did way back as a kid? -WiL Poulsen 3 From: Steve_Lemanski Date: 07/24/97 04:51:00 PM CST Subject: question What does 1999 hold in store for you, especially with rapid advancements in technology concerning computers in conjunction with the dependency life and BUSINESSES have with computers? Do you have any new interests you would like to investigate besides your love for phones meaning "There is no crime if there is no law"? Are you going to be the proverbial kid in the candy store with a crisp ten dollar bill? >>KP<< I'm still keeping up on developments in technology, but consider this: Unix was hot in the '80s, it's hot now; HTML is new, but hypertext isn't; and the Internet is still based on TCP/IP, just as it was in the beginning. Most of the changes in the past six years have been social and political, not technological. >>/KP<< 4 From: Hotclue Date: 07/28/97 09:15:23 PM AST Subject: Your Career Plans Did you ever try going to work for Bill Gates? He could use the help. I bet he'd love to have you, although... on second thought... it's scary imagining what you could probably do to him... >>KP<< Bill hasn't called yet. >>/KP<< 5 From: allisone Date: 07/28/97 05:58:07 PM MST Subject: Constitutional Rights to Privacy on the Internet Dear Kevin, In regards to the events you have endured with government agencies, criminal convictions, incarceration, and the probationary criteria, have you, either on your own or through legal counsel, considered the ramifications of the government eroding away citizens' constitutional rights through their "unmonitored espionage" on the American public? I ask this in part due to a discussion with concerned friends over the fact that government agencies having the "right" and access to an individual's personal business and interests. Many ordinary citizens are wary of joining in on the online information revolution for fear of government intervention and the possibility of loss of privacy. These people have a legitimate concern, as I see it. The RICO [Racketeer Influenced and Corrupt Organizations] act can lialie person of his or her properiteen I would lik k yxe owpobilitf ce Myself, I have nothing to hide. No revolutionary agendas, no illegal pursuits, etc. But I do wonder if this wonderful tool could be turned against us. Thanks you for your thoughts on this subject. Beverly Allisone AKA Deli Mama :) Good luck, Kevin, in future pursuits. I think you're an all- right guy! >>KP<< I share your concerns totally. The RICO act, and civil forfeiture in general, has been terribly abused by the government. Same with conspiracy laws. The lesson here is that any expansion of governmental powers will inevitably be abused by a zealous cadre of True Believers looking out for Our Best Interests. That's something to keep in mind when considering laws like "Digital Telephony," proposals to discourage or restrict the use of strong encryption, and the emerging double standard for "computer crimes" versus their low-tech equivalents (a la Kevin Mitnick). >>/KP<< 6 From: Ufohacker Date: 07/28/97 03:48:07 PM AST Subject: I'VE GOT A QUES!!!!!!! hello i'm Mulder Bean and i wanted to ask you what scifi book do you like (hacker related) and what kind of Puters do you like??? >>KP<< Computers: Mac; anything running Unix Science Fiction Novels: Shockwave Rider, John Brunner; Neuromancer, William Gibson; The Watchman, Jon Littman >>/KP<< 7 From: christer.nissen Date: 07/28/97 06:22:41 PM ZE2 Subject: Letting the mind free... Everyone wants to be a famous hacker. Not everyone makes it. I can only speak for myself, but I have always had a burning desire to discover new grounds within the different computer areas. Now I'm planning to join a university to learn even more... what I want to know (finally.. :-)) is if it's worth the time... do I get an as solid and complete understanding of computers that great hackers as Kevin Mitnick and many others has proven themselves to have-- or can I learn most things on my own by just reading books? S w e d e n >>KP<< Reading books >>/KP<< Toliko za sada...
hakeri.319 milosch,
Da li postoji elegantan nacin, ili bar bilo kakav nacin da se saznaju e-mail adresa ili neki drugi podatci (provajder, drzava i sl) ako mu se zna trenutno dodeljeni IP broj. pozdrav Milos
hakeri.320 ventura, -> #319, milosch
> Da li postoji elegantan nacin, ili bar bilo kakav nacin > da se saznaju e-mail adresa ili neki drugi podatci > (provajder, drzava i sl) ako mu se zna trenutno dodeljeni > IP broj. Uzmi netscan tools, i uz pomoc alatke resolv host, pretvori taj IP u oblik poput ppp31-11.propvajder.net. posle toga izbaci samo ono pre provajder.net i upotrebi whois servis na tu adresu, ili idi na www.networksolutions.com i tamo nadji WHOIS i direktno preko web-a proveri, i dobices adresu broj telefona, email i ostalo od njegovog provajdera... posle toga zamolis provajder da ti da odredjene podatke, i opises sta ti je taj IP uradio... i misim ako oce dace ti ako ne...