Odyssey Magazine #01
05 марта 1997

History - Hackers - art "it" - about the history of the emergence of hacking.

<b>History</b> - Hackers - art
BRAIN SURGEON
freelance journalist.
paper with some
abridged reprint of the journal
"Computerra" No # 1943
(170)


Music by Shov



                 HACKERS.


 I do not just have to be a witness
disputes about whether there are hackers in Russia and
other countries of the former Soviet Union. So,
I hasten to disappoint you: the hackers we have.
However, I do not know for sure - to upset, or to please 
because their feelings still did not understand. I have some 
information and want to share it with readers.  So, depending 
on the subject of hackers can be divided into three group.



            Software haskers


 Software haskers, or by software hackers who are committed to 
"break" ("crack") software.  This sort of activity has a long 
history: as soon raised the Iron Curtain and the Soviet Union 
reached out new technologies and software products, there the 
need for hackers. People who engage in computers for ten years, 
will remember queries such as "Registration key needed "or" 
Enter password ", ie protection for various programs. Since the 
choice of programs was very limited, choose between protected 
and unprotected programs do not have to. Crowd began to arm 
debuggers, special editors, dumper memory, and other hacker 
tools, to "remove" protection.  A little later, the popularity 
gained computer games, and there are new problems: "Ah, 
attack!" I can not pass this level! That would be an endless 
life ... "And were "masters" - they are "dissected"

Games for everyone there infinite
lives, and so on ...
 But back to the present time.
Software haskers, probably the largest single group of hackers, 
and the damage from the activities of these people is measured 
in millions of dollars. After all, "reveal" not only games and 
programs at the cost of U.S. $ 50-100 - These masters "in the 
teeth," even such expensive products, such as, for example, 
Autodesk 3D Studio (the cost of this package over a thousand 
dollars). Yes there say: Today you can easily buy

for 15 thousand rubles a CD on which is written programs for 
more than 20,000 dollars, and varieties of these discs -

at least a dime a dozen, for every taste.
 Naibolschie suffer loss firms
representing its business in Russia
programs, as well as legitimate users
these products. Simple user who barely scraped together money 
for a computer but he still requires a license and

the software looks at the problem differently. Well, no money, 
and some programs to use would be desirable. So what? 
Manufacturer far, the law seems to be a blind eye to this 
matter, the protection program is not so complicated that some 
hacker regional scale could not remove it -

Why not?
 In any case there are amateurs and professionals. So there are 
a group of professional hackers software. That is, people who 
have a certain amount of ready to remove the protection with 
the a program. As a rule, the elite, masters of the highest 
category. They are known to the general public, often in 
groups. They do not like, many envy them, but that their 
professionalism is not suffering. For commercial software - 
they are the most dangerous enemies. If they have an interest 
in burglary of a software, sooner or

later it will be broken, despite the complexity of security - 
whether it is at least electronic switches such as HASP.



                 Phreaks



   By definition, phreak (read
"Freak") - a person who prefers "alternative" methods of 
payment of television and other communication services. 
Enumerate only the most common "Problem" phreakers: how to call 
from a payphone without tokens, how to use the long distance 
free, how to get a neighbor to pay you, if costs blocker, and 
so on.  This group is perhaps the smallest. If for software 
hacking created a lot of documentation by the hackers, then

information on phreaking not mnogo.Tem
Yet it is very valuable: it can be
"Trick" the ATS on a fairly large amount of
- Not paying bills for phone calls. In our country, phreaking 
is not particularly developed, since the PBX is used mainly 
Pulse dialing. Another thing - for example, the U.S., where 
telephones provide know about the station billed a certain 
sequence of tones, which can simulate a conversation not pay. 
In addition, phreakers who put in their order of additional 
functions ATS (most of us about these functions and have no 
idea).  The sphere of activity phreakers include so-called 
boxes (box) - special electronic devices performing any specific

function. For example, chrome box allows you to manage traffic 
signals; red box - on the phones with touchtone can not pay for 
the conversation.  In recent years, among the Russian phreakers 
a new layer. It is most noticeable in Moscow, St. Petersburg 
and some other major cities where install payphones in the 
electronic credit cards.

 The basis for these cards are chip standard ISO. Find the 
specifications and timing diagrams of a chip do not was too 
difficult, and some phreakers able to reprogram the chips

so that the map was called almost
unlimited credit on phone conversations. Such people are called 
"carders" - carders. With phone cards, they moved to the bank. 
I showed the card one bank, which was recorded

999999999 rubles, that is the maximum
possible amount for the cards of this type.
I was so tempted to come up with such a card to a bank branch 
and ask to have another one, "and then this more money does not 
fit."  Carders - perhaps the most dangerous part

phreakers. However, they, fortunately, is not it
many: to successfully engage karderstvom. need to have deep 
knowledge field of radio electronics and programming circuits.

 Among phreakers grown and strengthened
The third group of hackers.


               Net Hackers



  This group split from Fricker, when our country began to 
actively develop networking technology. It was at this time 
when the internet-service providers have begun grow like 
mushrooms, have developed network based on X.25, and Russia 
have become available networks such as CompuServe, GNN, America 
OnLine (AOL). Service providers have always been fairly 
expensive, and because many have tried to have access 
illegally, often bypassing the security systems of these 
networks.  Not yet fully established on Russian soil advanced 
Western technology allowed many "holes" for network hackers who 
did not fail to take advantage of this. Now you can find an 
extensive documentation on "How to break

Unix "," How do I get root access in FreeBSD "and the like.
 Nevertheless, the authors prefer to keep some unsaid, that is, 
information acquired the status of "just for Reflections. "I 
can confidently say that people who successfully broke 
protection of Unix-based systems are very, very little. Network 
hackers on the Internet, of course, dangerous (remember 
Mitnick), since can be very great damage, destroying data. 
However, as a rule, they prefer no touching, moving farther, 
capturing more and more new "Horizons". That's because they 
have to improve security, patching

hole.
 Network hackers often use computer networks, using a hole in 
the credit card authorization. For example, America OnLine 
simply checks your credit card, but do not authorize the 
holder, then is, to generate the card number is a special 
program, you can use AOL services free of charge. Sometimes the 
card number is extrapolated from the number actually existing 
one.  But let's not keen on i-net and

way. Let us remember the "native" X.25-network.
Oh, what a scope for a hacker! In the former
USSR were connected to the X.25 many
Institution: we can recall, for example,
Moscow Finance House, information
ATC network, LAN state
enterprise system REMART, Dionysus,
REX400. Where to locate a person,
which, say, begins to pick passwords to a particular system, it 
is very difficult and I even think that it is impossible.  But 
networks X.25, in contrast to the i-net, are not the 
information environment, and the information superhighway. 
Let's say I want to give a friend who lives in another town, 
any of the information. I can call him directly and pay for 
long-distance (If I do not Fricker), and can call on

local telephone X.25 and leave the information out there, buddy 
will take it from there - And for long-distance charge. Such

system, as Dionysus, ROSNET, ROSPAK, IASNET, GLASNET, 
calculated on a limited terms of subscribers, and often do not 
have a serious defense.  Network hacker has a good understanding

in communication systems and methods for their protection.
Life Hacker Network - is a permanent
Search for holes, the constant risk that you can track down - 
in all, a very dangerous and interesting case. Among the 
network hackers there are also professionals, that is, those 
over it is paid. Hacking systems sometimes is executed on 
demand, and sometimes the provider recruits a hacker, pay him

stable rate, provides free access. Job Network is a hacker to 
crack the protection provider and tell them about it. 


   Hackers are quite common
around the world: they get into various systems, "break" the 
software and is not like to pay for the phone. They have their 
own ftp, my WWW-pages, their team - team. That Hackers have 
come up with the slogan "KEEP CYBERSPACE FREE! "In connection 
with attempts I censorship in Internet - after all except

pornography under it fell down and hacker conference (alt.2600 
and others). Very often on sites hackers can see the blue 
ribbon - symbol of freedom Internet. 


                 *



   Some necessary clarifications:


   Provider - the company that provides organizations and 
individual users services for Internet access.


   WWW (World-Wide Web) - The World Wide Web - a hypertext 
system for publishing information on the Internet. 

   FTP (File Transfer Protocol) - File Transfer Protocol - the 
rules of transfer files between computers over the Internet.


   Kevin Mitnick - the computer "junkie", hacking protection 
for hacking reached even before computers and the DEC VAX,

achieved absolute power over the networks,
but doing it without any interest in the profits. In the 
greatest hacker America was not even your computer!

More if it is you're interested, you
can read in the book Dzh.Markof,
K. Hefner. Hackers. Trans. from English. -
Kiev: "Poligrafkniga.

__________________________________________




Other articles:

Entry - About the authors of the magazine and the magazine.

Entry - About the authors of the journal

Entry - Guide to the shell of the magazine.

a rest - GLODING PROGRAMMING (Programming upwards diagonally)

Assembler - How to calculate the sine assemlere.

System - IBM: On algaritme compression Lempel-Ziw Welch and its implementation for format GIF.

Miscellaneous - about computer problems: PROS and Scorpio, IBM ...

a rest - "Fun with the parties."

Demorynok - Hit Parade music demonstrations.

History - Hackers - art "it" - about the history of the emergence of hacking.

History - The classification of hackers.

a rest - "How to break down half?".

Letters - Reviews the readers of the magazine.

Contest - Competition for the best puzzle!

Assembler - A quick calculation of the address by two coordinates.

IS DOS - Problems and Solutions

News - news of city.

Demolition - Game Description THE DOOBLE.

Demolition - Game Description BLOOD WYCH.

Review - New games: RETURN TO HOME 4, CITADEL, KLADEMINER, BRIDGE PLAYER, CRUSHER, AMERICAN TURBO KING, RAD RAMP RACER, KUNG FU MASTER, CHOY LEE, SIDERAL WAR, ARKARUM, DIRT TRACK RACER, DOUBLE DRAGON 2, NIGHT BREED, THE CYCLES, MOONTORC, KOMMANDO 2.

System - Description of system software: UNIVERSAL SPRATE STUDIO (USS)

Guests - Old friends: On the history of the Krasnodar group UNIT-5

System - Description of system software: ACCEPT PROTECTION SYSTEM V1.0.


Темы: Игры, Программное обеспечение, Пресса, Аппаратное обеспечение, Сеть, Демосцена, Люди, Программирование

Similar articles:
Around the World - APPLE presented a clear project PC.
Advertising - Advertisements and announcements ...

В этот день...   29 April