Brykovian
Bryk the Cheese Slayer!
USA
58 Posts |
Posted - Nov 18 2004 : 9:44:54 PM
|
quote: Originally posted by Hacker9988
... willing to take any punishment that may come from my hacks to better mankind.
Wow -- aren't you the noble one!
Let me know which e-mail you're sending the BrickCrypt solution to ... thanks!
-Bryk
|
www.mwgames.com |
|
|
masterbooda
Swordmaster
277 Posts |
Posted - Nov 22 2004 : 3:12:35 PM
|
Um....What's a Hack?
:>)Lol...
Can my title be "Talentless Fool"...hmmm...lol
DaBooda out....
P.S. Hack doesn't ryme with Game, so why is it here on a site dedicated to Games?...Hmmm...Does not compute... |
DaBooda Team is back: http://dabooda.789mb.com/ |
|
|
Brykovian
Bryk the Cheese Slayer!
USA
58 Posts |
Posted - Nov 22 2004 : 3:57:03 PM
|
quote: Originally posted by Hacker9988
ok, i'll send u an email once i've got the encryption. I should be done shortly.
Still waiting, and ...
{breathes heavily into cupped hand ... sniffs hand}
... yep! My breathe's still baited!!
-Bryk |
www.mwgames.com |
|
|
Knight Chat X
Squire
USA
24 Posts |
Posted - Nov 23 2004 : 01:20:36 AM
|
quote: If you don't already know from my name, I am a hacker. Normally a quite good one at that, but I'm stuck on something. I can't say much because of the sensitivity of this topic.
It's kinda funny but that sounds like the start of a game.
Here's a little fun game called Uplink, could learn somethin from this: http://www.introversion.co.uk |
|
|
Hacker9988
script kiddie
23 Posts |
Posted - Nov 23 2004 : 11:40:03 AM
|
I have seen that game and it is very far off from real hacking. Real hacking you have to locate a server, not just click on a location and connect. Advice from expirence, that game sux. |
Dim YoureGay as Boolean
If YoureGay = True Then Me.Visible = False Else Me.Visible = True End If |
|
|
Knight Chat X
Squire
USA
24 Posts |
Posted - Nov 23 2004 : 3:26:08 PM
|
It is just a game but for the most part the concepts of older higher level network hacking is there, it provides a real world like element, it actually shares info. of what it would take to perform a successful hack, it shows how serial series connections take place (not recommended), it mentions firewalls, hardware upgrades, scanners, logs, the purpose of each, and much more, and gives a lowdown on the method's that used to be more common, if you really knew what you are doing the obvious would be easily noticed. The game is more of a reflection of older networked systems before computers became more protected, but the basics are there, many aspects of the game are hyped up, but the simpler parts hold true to certain facts.
Bottom line, remove the delayed tracing timer idea and the first thing it should teach you is that when you make a connection there are fingerprints, logs, which record your activities, and you'll also notice for every system you branch off of there is another log, everytime u connect the new connection is logged on every machine leading back to yours, in reality that's all true, even when an IP is spoofed, the bigger picture is the big guys like the white hats monitor bigger stuff, but never assume the small stuff goes ignored, unless you can remove all logs of your activities from all machines you're basically out of luck, back when system's weren't as protected this might have been a piece of cake, but today, no way, even your hardware now contains logs, if you have a high speed connection your modem is basically it's own seperate computer, that's right, and it keeps in sync with your ISP so long as it's connected and power turned on, I could go into this and make a book but I've got more important things to do, I'm just tryin to show ya why it's not such a good idea to hack a website these days, I just do not recommend it, if that saves some kid from making a small mistake that'd cost them more than they know it's worth it to post here.
Think I'm done here, about to watch some new game trailors.
Laterz!
|
The net is getting bigger and bigger. |
|
|
ballistik
Moderator
72 Posts |
Posted - Nov 23 2004 : 4:55:20 PM
|
quote: It is just a game but for the most part the concepts of older higher level network hacking is there, it provides a real world like element, it actually shares info. of what it would take to perform a successful hack, it shows how serial series connections take place (not recommended), it mentions firewalls, hardware upgrades, scanners, logs, the purpose of each, and much more, and gives a lowdown on the method's that used to be more common, if you really knew what you are doing the obvious would be easily noticed. The game is more of a reflection of older networked systems before computers became more protected, but the basics are there, many aspects of the game are hyped up, but the simpler parts hold true to certain facts.
Bottom line, remove the delayed tracing timer idea and the first thing it should teach you is that when you make a connection there are fingerprints, logs, which record your activities, and you'll also notice for every system you branch off of there is another log, everytime u connect the new connection is logged on every machine leading back to yours, in reality that's all true, even when an IP is spoofed, the bigger picture is the big guys like the white hats monitor bigger stuff, but never assume the small stuff goes ignored, unless you can remove all logs of your activities from all machines you're basically out of luck, back when system's weren't as protected this might have been a piece of cake, but today, no way, even your hardware now contains logs, if you have a high speed connection your modem is basically it's own seperate computer, that's right, and it keeps in sync with your ISP so long as it's connected and power turned on, I could go into this and make a book but I've got more important things to do, I'm just tryin to show ya why it's not such a good idea to hack a website these days, I just do not recommend it, if that saves some kid from making a small mistake that'd cost them more than they know it's worth it to post here.
That's what I'm talkin' about! ... well said. |
_____________________ ..::||::.. |
|
|
Crysstaafur
Squire
USA
37 Posts |
Posted - Nov 26 2004 : 7:09:45 PM
|
http://www.thisisnotporn.com
If you can make to the hidden forums at this site, then I honestly verify your skill. I am a retired hacker/phreak.
Sadly, actual hackers are vanishing. Ok, being one of the surviving few that still operate from time to time, let me give you some ideas to try, purpose, well,.. that's for you to decide.
Learn how win32 memory addresses are setup, create a program that uses only peek and poke to write and read values from a lpt port, has an embedded controller receive those signals from a homebrew dev cable to activate a beer catching robot. The point:A true hacker will seem to waste time on things that others would find mind-numbingly pointless.
History lesson/another example:Do you know the name of the first hacker to exist? The father of phone phreaking.. Captain Crunch was his nick. He was the first person who discovered that if you blow a 'captain crunch' whistle (not made anymore...) into a freshly picked up telephone you could dial a single digit. Slight alterations of that signal produce the other tones. even tech tones. 8P Thus the first blue box was born in 1969 at Berkley U.
2nd piece of advice:Unless you can actually crack keyless quantum encryption, always play lame like you don't know a thing. Only share with those who you trust, or in the case of encountering a young one, always challenge them first, if they do well, then reward. If they fail,.. well, by now you should know.
3rd project:Try to write an AI with Heuristic reasoning in VB.
Final point:Not all hackers are theives, not all hackers will call themselves hackers, many aren't even aware that is what they are doing (old Berkley definition of it anyway..). One of the values we hold is that of freedom of information with non-conformity. This is what drives you to your current project does it not? If you really want to buff up in that sense(and I don't condone it, as I have already shown you the white hat direction) then make your own web server, learn to administrate it. Then from another computer connected to the internet elsewhere try to 0wn yourself. That a way, no one innocent is hurt. Think about it. l8trz |
|
|
Brykovian
Bryk the Cheese Slayer!
USA
58 Posts |
Posted - Nov 28 2004 : 8:17:17 PM
|
Excellent post, Crysstaafur! That perfectly fits what I think of a "real" hacker ... but perhaps that has to do with my age.
quote: Originally posted by Crysstaafur
in the case of encountering a young one, always challenge them first, if they do well, then reward. If they fail,.. well, by now you should know.
Sounds familiar ...
And Hacky ... I'm still waiting. Something tells me that Cryss already has my routine figured out.
-Bryk |
www.mwgames.com |
|
|
|
|