ZX Pilot #18
06 января 1998 |
|
about different - About the Hacker in different terms.
About MISC (C) FLORIAN GEYER They are called "Hecker. Besides a passion for computer, curiosity and experimentation, they do no longer binds - or worldview, religion or national origin, or belonging to one political or cultural trends. They - single, highly durable, technically gifted, enthusiastic, often with remarkable intelligence, especially in dealing with computer and software. Sympathetic to them see they harbingers of technologically enlightened leadership elite of the XXI century. Their daily lives - it's computers, terminals, programs, modems, data banks ... Their nickname was formed from "to hack" - any game with computer keyboard in search of keys to other computers data banks or automated communication station. If you are lucky, available free to communicate with another computer, send them messages, read their programs, call laid in their memory information. Do bad ograzhdennuh plants can even change program. But self-respecting Hecker such cases are not zanimaetsyakodeks honor does not allow. And if taken for it, then only to demonstrate to some bank, how bad protected by its own system of electronic data: Hecker day off quickly converts from an account at your bank by, say, thousands of 150 to on Monday by a loud noise Press to return the money to the owner. Hecker, in fact, nice guys. Sit down the night before computer screen and have, like in electronic seven-league boots, flew over the seas and continents, then poking his nose in large vychisletelnuyu installation Research Institute, the vynyrivaya in the computer network industry concern. The biggest jackpot during the existence of a computer Hamburg thwarted Hecker, finding the key to the computing centers National Aeronautics and Space Exploration Space Administration (NASA) and European Organization for Study and Development of Space (ENA). In their saying it was surprisingly easy. Young virtuosos computer in several steps waded into the calculator German Research Society for Aeronautics and Astronautics. They found a command, threw them in America, responded to the CPT password - abbriveaturoy indicating equipment service, the first requirement to produce a keyword typed general password ... 'And I ran goose back, "- says Hecker about his trip overseas, because on the computer screen suddenly appeared FAQ Home Management NASA, with the words "Welcome!". "If Hecker went so far, there is no backstop. He will continue to experiment, " "Says Steffen Werner of" Hamburg Chaos Computer Club. " Penetrated into the NASA Hecker appealed to him in connection with delicacy of the case. All this was possible because of an error manufac - sentatives of the working system. Hecker easily overcome Protective barery.Neskolko keystrokes - and uninvited guests been kept under control around 1600 large computing Institute facilities in nuclear physics, molecular biology, Space Technology, etc., related to each other. By expanding - scheysya of young electronics enthusiasts owners of large UW, of course, are without much humor, especially if they held on magnetic tapes sensitive or not intended to publish the material. But, as emphasized by Hecker, their activities tend to be called criminal. They strongly dissociate themselves from the specialist computer geeks who completely tselenopravlenno penetrate computer systems to obtain specific data and information or illegally copy of the program. Here we are talking about computer spyware, typically collect information about the competition on firm order or seeking personal gain from the sale of illegally razdobytoy information. They are called "krekkerami", ie crackers, almost modern "bugbears." To the dismay of Owners of computers in recent years has developed a new type of Hecker, and its experts believe are even criminal. Somehow Once one has become a talented underground electronics gnaw through boring through the protective shields of large data banks, and he came up with the idea of viral incendiary bombs delayed-action, today known as the effective called computer viruses. That nesveduyuschih has only threatening sound, for specialists - a simple thing. Is a program nachinayuschuyu work only on certain signals while razmnozhayusch - uyusya in collisions with other programs. This program hiding in some useful software - and computer virus was born and sent to circumnavigate the globe. It spreads like a pathogen of the disease when contact with other software, in particular illegal copies of programs, free games, but with data networks. Most viruses are harmless - it's more or less humorous - Skye interference. Thus, "the virus, stopping up to the ears" if you accidentally press the right set of keys, makes lumber from the speaker computer a series of waltzes and marches, so work with it computer fails only in the headphones. Quite harmless and so called "autumn virus." He is shedding uppercase lines on the screen, like in the autumn leaf fall. In another case appears on the screen behemoth, which requires to give him a cupcake. It disappears if puzzled sitting at the computer comes in head napechatt word "fruitcake." But there are some extremely malicious viruses. They are able to erase from memory the whole data banks, or "hanging - Th "to the program every time you use 1500 bits, ie, units of information. The calculator is starting to slow down because he has to handle more and more pointless information, or solid board will cease to hold information. AND Then, as a rule, nothing can be done, because in most programs-interference protection provided against its own destruction - of. Gradually found the answer and the other side. Here again helped hekkery.Po commissioned major manufacturers' software they developed a program search and destroy viruses. Case turned out to be profitable, because the demand for such a great program. However, antivirus programs can detect, not all viruses. Therefore constantly alive the fear of an insidious destroyer, which inexorably begins to act in response to a keyword paralyzing the computer or transistor data. Superstitious Crowd wait for it, so it was led, especially on Fridays, 13 chiala. ° ° ° ° °
Other articles:
Our news - Today, people celebrate Christmas ... |
Fantasy - A Tale Strugatsky "Way to Amalthea (continued). |
COMICS - Anecdotes |
about different - About the Hacker in different terms. |
about different - no diarrhea, so scrofula. |
Advertising - Advertisements and announcements ... |
Similar articles:
В этот день... 21 November