Odyssey Magazine #01
05 марта 1997 |
|
History - Hackers - art "it" - about the history of the emergence of hacking.
BRAIN SURGEON freelance journalist. paper with some abridged reprint of the journal "Computerra" No # 1943 (170) Music by Shov HACKERS. I do not just have to be a witness disputes about whether there are hackers in Russia and other countries of the former Soviet Union. So, I hasten to disappoint you: the hackers we have. However, I do not know for sure - to upset, or to please because their feelings still did not understand. I have some information and want to share it with readers. So, depending on the subject of hackers can be divided into three group. Software haskers Software haskers, or by software hackers who are committed to "break" ("crack") software. This sort of activity has a long history: as soon raised the Iron Curtain and the Soviet Union reached out new technologies and software products, there the need for hackers. People who engage in computers for ten years, will remember queries such as "Registration key needed "or" Enter password ", ie protection for various programs. Since the choice of programs was very limited, choose between protected and unprotected programs do not have to. Crowd began to arm debuggers, special editors, dumper memory, and other hacker tools, to "remove" protection. A little later, the popularity gained computer games, and there are new problems: "Ah, attack!" I can not pass this level! That would be an endless life ... "And were "masters" - they are "dissected" Games for everyone there infinite lives, and so on ... But back to the present time. Software haskers, probably the largest single group of hackers, and the damage from the activities of these people is measured in millions of dollars. After all, "reveal" not only games and programs at the cost of U.S. $ 50-100 - These masters "in the teeth," even such expensive products, such as, for example, Autodesk 3D Studio (the cost of this package over a thousand dollars). Yes there say: Today you can easily buy for 15 thousand rubles a CD on which is written programs for more than 20,000 dollars, and varieties of these discs - at least a dime a dozen, for every taste. Naibolschie suffer loss firms representing its business in Russia programs, as well as legitimate users these products. Simple user who barely scraped together money for a computer but he still requires a license and the software looks at the problem differently. Well, no money, and some programs to use would be desirable. So what? Manufacturer far, the law seems to be a blind eye to this matter, the protection program is not so complicated that some hacker regional scale could not remove it - Why not? In any case there are amateurs and professionals. So there are a group of professional hackers software. That is, people who have a certain amount of ready to remove the protection with the a program. As a rule, the elite, masters of the highest category. They are known to the general public, often in groups. They do not like, many envy them, but that their professionalism is not suffering. For commercial software - they are the most dangerous enemies. If they have an interest in burglary of a software, sooner or later it will be broken, despite the complexity of security - whether it is at least electronic switches such as HASP. Phreaks By definition, phreak (read "Freak") - a person who prefers "alternative" methods of payment of television and other communication services. Enumerate only the most common "Problem" phreakers: how to call from a payphone without tokens, how to use the long distance free, how to get a neighbor to pay you, if costs blocker, and so on. This group is perhaps the smallest. If for software hacking created a lot of documentation by the hackers, then information on phreaking not mnogo.Tem Yet it is very valuable: it can be "Trick" the ATS on a fairly large amount of - Not paying bills for phone calls. In our country, phreaking is not particularly developed, since the PBX is used mainly Pulse dialing. Another thing - for example, the U.S., where telephones provide know about the station billed a certain sequence of tones, which can simulate a conversation not pay. In addition, phreakers who put in their order of additional functions ATS (most of us about these functions and have no idea). The sphere of activity phreakers include so-called boxes (box) - special electronic devices performing any specific function. For example, chrome box allows you to manage traffic signals; red box - on the phones with touchtone can not pay for the conversation. In recent years, among the Russian phreakers a new layer. It is most noticeable in Moscow, St. Petersburg and some other major cities where install payphones in the electronic credit cards. The basis for these cards are chip standard ISO. Find the specifications and timing diagrams of a chip do not was too difficult, and some phreakers able to reprogram the chips so that the map was called almost unlimited credit on phone conversations. Such people are called "carders" - carders. With phone cards, they moved to the bank. I showed the card one bank, which was recorded 999999999 rubles, that is the maximum possible amount for the cards of this type. I was so tempted to come up with such a card to a bank branch and ask to have another one, "and then this more money does not fit." Carders - perhaps the most dangerous part phreakers. However, they, fortunately, is not it many: to successfully engage karderstvom. need to have deep knowledge field of radio electronics and programming circuits. Among phreakers grown and strengthened The third group of hackers. Net Hackers This group split from Fricker, when our country began to actively develop networking technology. It was at this time when the internet-service providers have begun grow like mushrooms, have developed network based on X.25, and Russia have become available networks such as CompuServe, GNN, America OnLine (AOL). Service providers have always been fairly expensive, and because many have tried to have access illegally, often bypassing the security systems of these networks. Not yet fully established on Russian soil advanced Western technology allowed many "holes" for network hackers who did not fail to take advantage of this. Now you can find an extensive documentation on "How to break Unix "," How do I get root access in FreeBSD "and the like. Nevertheless, the authors prefer to keep some unsaid, that is, information acquired the status of "just for Reflections. "I can confidently say that people who successfully broke protection of Unix-based systems are very, very little. Network hackers on the Internet, of course, dangerous (remember Mitnick), since can be very great damage, destroying data. However, as a rule, they prefer no touching, moving farther, capturing more and more new "Horizons". That's because they have to improve security, patching hole. Network hackers often use computer networks, using a hole in the credit card authorization. For example, America OnLine simply checks your credit card, but do not authorize the holder, then is, to generate the card number is a special program, you can use AOL services free of charge. Sometimes the card number is extrapolated from the number actually existing one. But let's not keen on i-net and way. Let us remember the "native" X.25-network. Oh, what a scope for a hacker! In the former USSR were connected to the X.25 many Institution: we can recall, for example, Moscow Finance House, information ATC network, LAN state enterprise system REMART, Dionysus, REX400. Where to locate a person, which, say, begins to pick passwords to a particular system, it is very difficult and I even think that it is impossible. But networks X.25, in contrast to the i-net, are not the information environment, and the information superhighway. Let's say I want to give a friend who lives in another town, any of the information. I can call him directly and pay for long-distance (If I do not Fricker), and can call on local telephone X.25 and leave the information out there, buddy will take it from there - And for long-distance charge. Such system, as Dionysus, ROSNET, ROSPAK, IASNET, GLASNET, calculated on a limited terms of subscribers, and often do not have a serious defense. Network hacker has a good understanding in communication systems and methods for their protection. Life Hacker Network - is a permanent Search for holes, the constant risk that you can track down - in all, a very dangerous and interesting case. Among the network hackers there are also professionals, that is, those over it is paid. Hacking systems sometimes is executed on demand, and sometimes the provider recruits a hacker, pay him stable rate, provides free access. Job Network is a hacker to crack the protection provider and tell them about it. Hackers are quite common around the world: they get into various systems, "break" the software and is not like to pay for the phone. They have their own ftp, my WWW-pages, their team - team. That Hackers have come up with the slogan "KEEP CYBERSPACE FREE! "In connection with attempts I censorship in Internet - after all except pornography under it fell down and hacker conference (alt.2600 and others). Very often on sites hackers can see the blue ribbon - symbol of freedom Internet. * Some necessary clarifications: Provider - the company that provides organizations and individual users services for Internet access. WWW (World-Wide Web) - The World Wide Web - a hypertext system for publishing information on the Internet. FTP (File Transfer Protocol) - File Transfer Protocol - the rules of transfer files between computers over the Internet. Kevin Mitnick - the computer "junkie", hacking protection for hacking reached even before computers and the DEC VAX, achieved absolute power over the networks, but doing it without any interest in the profits. In the greatest hacker America was not even your computer! More if it is you're interested, you can read in the book Dzh.Markof, K. Hefner. Hackers. Trans. from English. - Kiev: "Poligrafkniga. __________________________________________
Other articles:
Similar articles:
В этот день... 21 November