|
Odyssey Magazine #01
05 марта 1997 |
|
History - Hackers - art "it" - about the history of the emergence of hacking.

BRAIN SURGEON
freelance journalist.
paper with some
abridged reprint of the journal
"Computerra" No # 1943
(170)
Music by Shov
HACKERS.
I do not just have to be a witness
disputes about whether there are hackers in Russia and
other countries of the former Soviet Union. So,
I hasten to disappoint you: the hackers we have.
However, I do not know for sure - to upset, or to please
because their feelings still did not understand. I have some
information and want to share it with readers. So, depending
on the subject of hackers can be divided into three group.
Software haskers
Software haskers, or by software hackers who are committed to
"break" ("crack") software. This sort of activity has a long
history: as soon raised the Iron Curtain and the Soviet Union
reached out new technologies and software products, there the
need for hackers. People who engage in computers for ten years,
will remember queries such as "Registration key needed "or"
Enter password ", ie protection for various programs. Since the
choice of programs was very limited, choose between protected
and unprotected programs do not have to. Crowd began to arm
debuggers, special editors, dumper memory, and other hacker
tools, to "remove" protection. A little later, the popularity
gained computer games, and there are new problems: "Ah,
attack!" I can not pass this level! That would be an endless
life ... "And were "masters" - they are "dissected"
Games for everyone there infinite
lives, and so on ...
But back to the present time.
Software haskers, probably the largest single group of hackers,
and the damage from the activities of these people is measured
in millions of dollars. After all, "reveal" not only games and
programs at the cost of U.S. $ 50-100 - These masters "in the
teeth," even such expensive products, such as, for example,
Autodesk 3D Studio (the cost of this package over a thousand
dollars). Yes there say: Today you can easily buy
for 15 thousand rubles a CD on which is written programs for
more than 20,000 dollars, and varieties of these discs -
at least a dime a dozen, for every taste.
Naibolschie suffer loss firms
representing its business in Russia
programs, as well as legitimate users
these products. Simple user who barely scraped together money
for a computer but he still requires a license and
the software looks at the problem differently. Well, no money,
and some programs to use would be desirable. So what?
Manufacturer far, the law seems to be a blind eye to this
matter, the protection program is not so complicated that some
hacker regional scale could not remove it -
Why not?
In any case there are amateurs and professionals. So there are
a group of professional hackers software. That is, people who
have a certain amount of ready to remove the protection with
the a program. As a rule, the elite, masters of the highest
category. They are known to the general public, often in
groups. They do not like, many envy them, but that their
professionalism is not suffering. For commercial software -
they are the most dangerous enemies. If they have an interest
in burglary of a software, sooner or
later it will be broken, despite the complexity of security -
whether it is at least electronic switches such as HASP.
Phreaks
By definition, phreak (read
"Freak") - a person who prefers "alternative" methods of
payment of television and other communication services.
Enumerate only the most common "Problem" phreakers: how to call
from a payphone without tokens, how to use the long distance
free, how to get a neighbor to pay you, if costs blocker, and
so on. This group is perhaps the smallest. If for software
hacking created a lot of documentation by the hackers, then
information on phreaking not mnogo.Tem
Yet it is very valuable: it can be
"Trick" the ATS on a fairly large amount of
- Not paying bills for phone calls. In our country, phreaking
is not particularly developed, since the PBX is used mainly
Pulse dialing. Another thing - for example, the U.S., where
telephones provide know about the station billed a certain
sequence of tones, which can simulate a conversation not pay.
In addition, phreakers who put in their order of additional
functions ATS (most of us about these functions and have no
idea). The sphere of activity phreakers include so-called
boxes (box) - special electronic devices performing any specific
function. For example, chrome box allows you to manage traffic
signals; red box - on the phones with touchtone can not pay for
the conversation. In recent years, among the Russian phreakers
a new layer. It is most noticeable in Moscow, St. Petersburg
and some other major cities where install payphones in the
electronic credit cards.
The basis for these cards are chip standard ISO. Find the
specifications and timing diagrams of a chip do not was too
difficult, and some phreakers able to reprogram the chips
so that the map was called almost
unlimited credit on phone conversations. Such people are called
"carders" - carders. With phone cards, they moved to the bank.
I showed the card one bank, which was recorded
999999999 rubles, that is the maximum
possible amount for the cards of this type.
I was so tempted to come up with such a card to a bank branch
and ask to have another one, "and then this more money does not
fit." Carders - perhaps the most dangerous part
phreakers. However, they, fortunately, is not it
many: to successfully engage karderstvom. need to have deep
knowledge field of radio electronics and programming circuits.
Among phreakers grown and strengthened
The third group of hackers.
Net Hackers
This group split from Fricker, when our country began to
actively develop networking technology. It was at this time
when the internet-service providers have begun grow like
mushrooms, have developed network based on X.25, and Russia
have become available networks such as CompuServe, GNN, America
OnLine (AOL). Service providers have always been fairly
expensive, and because many have tried to have access
illegally, often bypassing the security systems of these
networks. Not yet fully established on Russian soil advanced
Western technology allowed many "holes" for network hackers who
did not fail to take advantage of this. Now you can find an
extensive documentation on "How to break
Unix "," How do I get root access in FreeBSD "and the like.
Nevertheless, the authors prefer to keep some unsaid, that is,
information acquired the status of "just for Reflections. "I
can confidently say that people who successfully broke
protection of Unix-based systems are very, very little. Network
hackers on the Internet, of course, dangerous (remember
Mitnick), since can be very great damage, destroying data.
However, as a rule, they prefer no touching, moving farther,
capturing more and more new "Horizons". That's because they
have to improve security, patching
hole.
Network hackers often use computer networks, using a hole in
the credit card authorization. For example, America OnLine
simply checks your credit card, but do not authorize the
holder, then is, to generate the card number is a special
program, you can use AOL services free of charge. Sometimes the
card number is extrapolated from the number actually existing
one. But let's not keen on i-net and
way. Let us remember the "native" X.25-network.
Oh, what a scope for a hacker! In the former
USSR were connected to the X.25 many
Institution: we can recall, for example,
Moscow Finance House, information
ATC network, LAN state
enterprise system REMART, Dionysus,
REX400. Where to locate a person,
which, say, begins to pick passwords to a particular system, it
is very difficult and I even think that it is impossible. But
networks X.25, in contrast to the i-net, are not the
information environment, and the information superhighway.
Let's say I want to give a friend who lives in another town,
any of the information. I can call him directly and pay for
long-distance (If I do not Fricker), and can call on
local telephone X.25 and leave the information out there, buddy
will take it from there - And for long-distance charge. Such
system, as Dionysus, ROSNET, ROSPAK, IASNET, GLASNET,
calculated on a limited terms of subscribers, and often do not
have a serious defense. Network hacker has a good understanding
in communication systems and methods for their protection.
Life Hacker Network - is a permanent
Search for holes, the constant risk that you can track down -
in all, a very dangerous and interesting case. Among the
network hackers there are also professionals, that is, those
over it is paid. Hacking systems sometimes is executed on
demand, and sometimes the provider recruits a hacker, pay him
stable rate, provides free access. Job Network is a hacker to
crack the protection provider and tell them about it.
Hackers are quite common
around the world: they get into various systems, "break" the
software and is not like to pay for the phone. They have their
own ftp, my WWW-pages, their team - team. That Hackers have
come up with the slogan "KEEP CYBERSPACE FREE! "In connection
with attempts I censorship in Internet - after all except
pornography under it fell down and hacker conference (alt.2600
and others). Very often on sites hackers can see the blue
ribbon - symbol of freedom Internet.
*
Some necessary clarifications:
Provider - the company that provides organizations and
individual users services for Internet access.
WWW (World-Wide Web) - The World Wide Web - a hypertext
system for publishing information on the Internet.
FTP (File Transfer Protocol) - File Transfer Protocol - the
rules of transfer files between computers over the Internet.
Kevin Mitnick - the computer "junkie", hacking protection
for hacking reached even before computers and the DEC VAX,
achieved absolute power over the networks,
but doing it without any interest in the profits. In the
greatest hacker America was not even your computer!
More if it is you're interested, you
can read in the book Dzh.Markof,
K. Hefner. Hackers. Trans. from English. -
Kiev: "Poligrafkniga.
__________________________________________
Other articles:
Similar articles:
В этот день... 14 December