ZX Pilot #18
06 января 1998

about different - About the Hacker in different terms.

<b>about different</b> - About the Hacker in different terms.
    About MISC


(C) FLORIAN GEYER


   They are called "Hecker. Besides a passion for computer, 
curiosity and experimentation, they do no longer binds - or 
worldview, religion or national origin, or belonging to one 
political or cultural trends. They - single, highly durable, 
technically gifted, enthusiastic, often with remarkable 
intelligence, especially in dealing with computer and software. 
Sympathetic to them see they harbingers of technologically 
enlightened leadership elite of the XXI century. Their daily 
lives - it's computers, terminals, programs, modems, data banks 
... 

   Their nickname was formed from "to hack" - any game with
computer keyboard in search of keys to other computers
data banks or automated communication station. If you are lucky,
available free to communicate with another computer, send them
messages, read their programs, call laid in their memory
information. Do bad ograzhdennuh plants can even change
program. But self-respecting Hecker such cases are not 
zanimaetsyakodeks honor does not allow. And if taken for it, 
then only to demonstrate to some bank, how bad

protected by its own system of electronic data:
Hecker day off quickly converts from an account at your bank
by, say, thousands of 150 to on Monday by a loud noise
Press to return the money to the owner.

   Hecker, in fact, nice guys. Sit down the night before
computer screen and have, like in electronic seven-league
boots, flew over the seas and continents, then poking his nose 
in large vychisletelnuyu installation Research

Institute, the vynyrivaya in the computer network industry
concern. The biggest jackpot during the existence of a computer
Hamburg thwarted Hecker, finding the key to the computing 
centers National Aeronautics and Space Exploration

Space Administration (NASA) and European Organization for
Study and Development of Space (ENA). In their
saying it was surprisingly easy. Young virtuosos
computer in several steps waded into the calculator
German Research Society for Aeronautics and
Astronautics. They found a command, threw them in America,
responded to the CPT password - abbriveaturoy indicating 
equipment service, the first requirement to produce a keyword

typed general password ... 'And I ran goose
back, "- says Hecker about his trip overseas, because
on the computer screen suddenly appeared FAQ Home Management
NASA, with the words "Welcome!". "If Hecker went so
far, there is no backstop. He will continue to experiment, "
"Says Steffen Werner of" Hamburg Chaos Computer Club. "
Penetrated into the NASA Hecker appealed to him in connection 
with delicacy of the case.


   All this was possible because of an error manufac -
sentatives of the working system. Hecker easily overcome
Protective barery.Neskolko keystrokes - and uninvited guests
been kept under control around 1600 large computing
Institute facilities in nuclear physics, molecular biology,
Space Technology, etc., related to each other. By expanding -
scheysya of young electronics enthusiasts owners of large
UW, of course, are without much humor, especially if they
held on magnetic tapes sensitive or not intended
to publish the material. But, as emphasized by Hecker, their
activities tend to be called criminal. They
strongly dissociate themselves from the specialist computer 
geeks who completely tselenopravlenno penetrate computer systems

to obtain specific data and information or illegally
copy of the program. Here we are talking about computer spyware,
typically collect information about the competition on firm 
order or seeking personal gain from the sale of illegally

razdobytoy information. They are called "krekkerami", ie
crackers, almost modern "bugbears." To the dismay of
Owners of computers in recent years has developed a new type of
Hecker, and its experts believe are even criminal. Somehow
Once one has become a talented underground electronics
gnaw through boring through the protective shields of large 
data banks, and he came up with the idea of ​​viral incendiary 
bombs delayed-action, today known as the effective

called computer viruses.

   That nesveduyuschih has only threatening sound, for
specialists - a simple thing. Is a program nachinayuschuyu
work only on certain signals while razmnozhayusch -
uyusya in collisions with other programs. This program
hiding in some useful software - and
computer virus was born and sent to circumnavigate the globe.
It spreads like a pathogen of the disease when
contact with other software, in particular
illegal copies of programs, free games, but with
data networks.

   Most viruses are harmless - it's more or less humorous -
Skye interference. Thus, "the virus, stopping up to the ears" 
if you accidentally press the right set of keys, makes lumber 
from the speaker computer a series of waltzes and marches, so 
work with it computer fails only in the headphones. Quite 
harmless and so called "autumn virus." He is shedding uppercase

lines on the screen, like in the autumn leaf fall. In another 
case appears on the screen behemoth, which requires to give him 
a cupcake. It disappears if puzzled sitting at the computer 
comes in head napechatt word "fruitcake."


   But there are some extremely malicious viruses. They are 
able to erase from memory the whole data banks, or "hanging -

Th "to the program every time you use 1500 bits, ie,
units of information. The calculator is starting to slow down
because he has to handle more and more pointless
information, or solid board will cease to hold information. AND
Then, as a rule, nothing can be done, because in most
programs-interference protection provided against its own 
destruction - of.


   Gradually found the answer and the other side. Here again 
helped hekkery.Po commissioned major manufacturers' software

they developed a program search and destroy viruses. Case
turned out to be profitable, because the demand for such a 
great program. However, antivirus programs can detect, not all 
viruses. Therefore constantly alive the fear of an insidious 
destroyer, which inexorably begins to act in response to a 
keyword paralyzing the computer or transistor data. 
Superstitious Crowd wait for it, so it was led, especially on 
Fridays, 13 chiala. 


° ° ° ° °




Other articles:

Our news - Today, people celebrate Christmas ...

Fantasy - A Tale Strugatsky "Way to Amalthea (continued).

COMICS - Anecdotes

about different - About the Hacker in different terms.

about different - no diarrhea, so scrofula.

Advertising - Advertisements and announcements ...


Темы: Игры, Программное обеспечение, Пресса, Аппаратное обеспечение, Сеть, Демосцена, Люди, Программирование

Similar articles:
C. Expirience - Cheat for the game Space Crusade.
Review - An overview of new programs: Dragonia, Dinamite Dux, Guella War, Ring Wars, Spike Harold, Stryker in the Crypt of Trogan, 1999.
Iron - an overview of the microprocessor Zilog Z380, continued.

В этот день...   21 November