Amazing #02
14 июля 1998

At leisure - 10:2 Hacker eRRoR new virus from Mitnick.

<b>At leisure</b> - 10:2 Hacker eRRoR new virus from Mitnick.
(C) 1998 by Mr.Beeper

Music by Ironman

As you may recall, dear readers, in the first
room zhuranala AMAZING was an article about hacking tricks, and 
that with them when their zasekali.Iz all listed there hackers, 
Kevin Mitnick (CONDOR) was the most effective (23 burglary with

extensive destruction of that February 15, 1995
year he was sentenced to 460 years in prison
freedom) despite the fact that he was born in 1964
year.


  And now that I have learned about this wonderful hacker.


  Many users of the World Wide Web greeted the new year in
waiting for the effects of the new
computer virus, which the terrorists
laid on the server's most popular search engine. Community 
search engine Yahoo was surprised to read in its screen text: 
"Everyone who has now gone on the server is received as a gift 
logical bomb. "virus must have been executed in a

of the next few days and wipe out all of the information stored 
in computer memory. A condition for providing anti-virus 
program unidentified terrorists have set release from prison of 
a famous computer hacker Kevin Mitnick, who managed to crack 
one of the most protected Networks - Pentagon - and was able to 
steal secret military information. As it turned out, the 
statement of the terrorists was not a What a joke. 
Lzheterroristy used ignorance of the users of the fact that

a simple reading of the text information on
server can not serve the cause of a virus.



           B 10:2 Hacker eRRoR


     Curiosity - a natural attribute of human nature, which is 
already apparent from infancy. Who among We did not try to see 
what was there, inside this clever children's toy, the Rubik's 
Cube or radio? However, developers do not make great radio 
secrets of their devices, but that's for programs ZX-SPECTRUM, 
alas, not so. 

  Typically, the more complex and interesting
program, the more secure it is protected from
attempts to see "how it is arranged."
Situation ceases to be funny, when we
want not just to satisfy his curiosity
the set and try to modify what - no
whether the program for their own purposes, or want to
replaced in the program all the English texts
in Russian.

     But if it was even so, so no.
Many people pick their programs in order to maim everything 
that is possible, vlepit his name in a nubud scroll or text 
file. And on that still takes so and give this bullshit 
remix'irovanuyu one of your friends sellers, and this seller, 
even to someone ... Here and there buggy programs from

our - completely harmless hu ... Kerov.
To you ... (I am ashamed to even write it).

  Well, I can understand the tactics of hacking
programs to see how de
bark those innye or procedures, but the rest, I did not 
understand everything I can. 

  Here's an example we take the game - "Mortal
Kombat ". This is probably the exception to the rule. As long 
as I can remember nebylo more of such protection on speccy up 
to now. The protection of long time could not break, but still 
found DOWN and cracked it. A question arises why

?? That would show "what we are supposedly cool"
? Or for money? Most likely our
example fits the first answer. I could still
would bring a lot of such examples, but it would be quite a 
long time. - Comrades hackers!

- Ministry of Health warns ...
"Hacking entails not reparable
consequences, since in thinking of such matters, your brain 
secretes a lot of gray matter! From this it follows that, after 
several break-ins, your brain overflow of the substance and then

will be a big fireworks display - one of your brain is ...



          (C) 1998 by Mr.Beeper


For those who are going to leave our home

                 SPECCY -

             Dedicated to ...



Computer Tips "huckster" as needed
pokupatu computer in our city.

To make such a purchase is possible, though difficult. It is 
important to first honestly answer the most currently a number 
of issues. Try them formulated from a professional point

view:


          1.A should I buy?


              2.What is it?


             3.Po what price?


      4.Gde and how fast to do it?


  I do not know whether to start a modern Kharkiv office with 
wall-paper, as stated in the well-known advertising, but with 
the computer - I'm sure. Well this is what progress has been in 
business and slope at the same time! Means and instruments

able to collect beautiful, and print, but
still life, and bookkeeper uslozhnit.A about the game and say 
no - there must be a CPA Dhu two computers to buy, but then 
neither poDOOMat together, no flying. and what weight

cue argument in favor of computerization - y
susida e, i meni potribno. "So fly
or ... No "or"!


   First Council "huckster" - buy yourself a
First of all ... man who
Computers parsed. Otherwise, after a month
- Other parts of his climb, turn off the screen, a whiff of 
fried, and this "box" would be propping up the broken chairs. 
No longer a secret: the computer Specialist - a 80% success 
buying and your business in the future (if the computer chosen 
for the house - the main specialist Choose your child). Call it 
a Early the next morning and set out for detail

their point of view, that your company needs to do a computer. 
Just let them try again in two hours, consider a configuration 
and a list of required software security and, more importantly, 
to explain to you - what and why. If you can not, then the 
second Board "huckster" - urgently looking for a new 
specialist, the benefit Polytechnic swarms with them, and 
"worth" the student is not expensive. Who searches will always 
find. But if your computer special puzzle decided then

the question arises: How much will all this
cost? Well if money is no problem,
then you must buy something - anything more expensive -
it is the same and better, it is longer and
have to wait. And if the budget has
to spare, then take your pick from "Hot Line". Here
it is important to remember that any computer equipment becomes 
obsolete noralno six months, cheaper in half a year, and in 
general then it must be discarded. So choose the ones where 
more will suit the conditions of warranty service. For example, 
buy anywhere near your company - to carry in repairs nearby. As 
a consequence of the above - the third council "huckster" - 
charge searches your computer tech. Let through friends and 
relatives of family friends to find out more about the 
operating characteristics of the proposed purchase and the 
reputation of the seller. Let takes for himself (let him feel 
it), will be cheaper and better. Was important to determine the 
form of payment. And here's why. If you are going to pay cash 
"equivalents" then, in the - first, part of the companies you 
have them simply will not take, and in the - second - if take, 
it would be "a lot of problems," Rush during assembly, and 
hence - the loss of quality. So it is better "by bank transfer. 
Do not hurry: as long as money will reach for the day - 
another, and accessories will gather in the city 
pokachestvenney, and the computer not only undoing, but it 
might even have time to test. 95% of the computers on the 
market of our City gathered at the knees of our own countrymen, 
and sometimes even very good. But this fourth council - when 
you pick up equipment from the warehouse with an eight of your

programmer, and let him and nobody else,
Check all. So you may say, what
warranty or promise - check "on the spot." And the last. When 
the long-awaited computer will be in your firm, decide where he 
will stand, check quality but is summed up the network 
(electrical, telephone, computer). Do not pass it all the time, 
he and so flimsy. Let him meet one person, let near him never 
strangers, alien computer specialists and advisers,

otherwise it (the computer) will not survive long.
I wish that your "box" brings joy
from work, and most importantly - the game.


                              Mr.Beeper

P.S. This text should not be taken
seriously when buying computers as
SPECTRUM, ROBIK, etc. etc.







Other articles:

From the Author - the history of creation of 2nd issue of the magazine.

Authors - the authors of the magazine.

Review - an overview of programs from: STV v1.3, Sample Editor v2.1, TDU v1.0, Crasher, RBI, YES, RDG, MOdule Converter, RC v1.4, Dark Square, in 1912 a secret book.

Softyatina - an overview of new media and games: Odyssey # 2, Oberon # 4, Spectrofon 22-23, ZX-Format 7, Amiga # 1, Faultless 8, ZX-REVIEW 5-6 Amazing 1, X-Reversy, The Last Curieur, Pro Trackerr 3.0.

User'am - Risc processor - the path to the future.

User'am - 64 kilobytes of FIDONet.

User'am - UFO-2 "Devils of the Abyss", on the road to perfection.

User'am - Course polodogo user.

Assembler - talk about a necessary procedure as the derivation of the sprite.

Assembler - Time Management (work with interruptions).

Assembler - Sharing ZX ASM 3.0 and STS 5.1.

Assembler - SH-93: Procedures for direct work with the floppy drive controller.

Present - description of Turbo Disk Utility v1.0.

Present - description of the Sample Editor v2.1 (beta).

Present - description of the Real Commander v1.4.

Present - description of the game Dark Squares v1.98 (demo version).

At leisure - I saw the Amiga and IBM's work and I can not express their thinking about it!

At leisure - answers to frequently asked questions about your Amiga.

Miscellaneous - history: History of Clive Sinclair.

Miscellaneous - Modem: How to use the modem, implements the correction / compression MNP4/MNP5, v.42/v.42bis.

Miscellaneous - lmg: History of Education Last Masters Group.

Spending - Stirlitz.

Spending - ochepyatki: ochepyatoki committed in newspapers and magazines.

Spending - ORT: ADVERTISING motor trade!

Iron - a detailed description of modems.

At leisure - 10:2 Hacker eRRoR new virus from Mitnick.


Темы: Игры, Программное обеспечение, Пресса, Аппаратное обеспечение, Сеть, Демосцена, Люди, Программирование

Similar articles:
Topic - My Choice - PC.
Letter - Alexei Nikiforov of the newspaper "LPRINT".
of us - a few words from the authors.

В этот день...   21 November