💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › K1INE › k-1ine_… captured on 2021-12-04 at 18:04:22.
View Raw
More Information
-=-=-=-=-=-=-
,.tii;i::.:::,
,ti;"' '.
.tt;' :
jt;' :;tfLGDfKLLj, t,
: .tLKWitDi;EtKEDWftGjti.
iGKG,DWDfE""' `'it.
iGK;GEGj".. .. `'f
GD;GDf' .. : .. : 'f '
L,Di' ,: G.; .. ,: E,;. f, - w : n t e r 2 o o 5 - . -
;GKf 'f
iG ijtitttjLf L; '
ii 'fKWWKD' Gj
f: .... D;
t;, ,,,,,,:::iEDjj,
jLt;;ittjfjtttiiittjfLGGGGGGGGGGGGGLfLt, ,,;i,
fLLLLLLLLLLLLLLLLGGGLLLGLGGGGGGGGGGGLiLft. ,j; jit
jjtttttttjjjjjjjjjjjjjjjtjtttjtjjjjffL;fGGj, ,i;. ;:..,i ft
fLLLLLGGGGGLfffffjjfffGGGGGGGGGGLLffjjtiLGttj, ,jjtft. ,ffi ifitt
.. 'jGDDDDDfLDDGDDjtLDDDDDGj' .:,;ijLGGGGL: ';. ,ftif' i . t :it:' L
:;ijDDDDDDDDDDffft;: :;tLjt :;Lt j .ti : ..,;:
:LDDDDDGDDDDf: `t, : : :i i ,iijt'
;DDDDD iDDDDf ii i;;;. :;tt'
:DDDDDD. fDDDDDi ij .,Df
jDDDDDD. jDDDDDD :f :L
jDDDDDi :DDDDDG :f ;f
:DDDDt jDDDDi ti. ,:jj
:DD: :DDDf L;;i, :,ij;itfj'
;i ,DD; D `:itjGEDft'
fG: ;j itfD'
i' LtiLLL'
:Kj'
jf
:E. '
Dj
ff +
tG
;E
,E .
;E :
tD
LG .
Kj .
iD;
:Ej
,iGG w
.ijfD h
,,.:;tiiiPRjtTiitt, ,it;GG o
ji;:. .:;ittttti"' `';ti.:LEj
:,;tjtjjtttttttjEKKKt" `:LKL'
,KL' `"E y
j" `tG a
:t :K
f: ,E
:D, ff g
;;;;,,,,;;itjDGGj; ,:,;,;;;;;ii;, ,K o
`'''''` iGiDfjj ,;'' 'tji. tDt n
,D GGi,j' 'fj :Gf n
Lj tGL `iDLt a
tGt D` ,;;;;;i;;iiiGLj,
t;:. .ijj E .,;;;' .;. .iLb
;D Gi .Li `;k c
tf Gj. f, tb a
:D tt :i `B l
:E L t: .. Lt l
iG j .GGfii::;;;tt;,Lj
.Ej f .iDDDGfjfLGLDGDGfT ?
LLfjtiiLj di .ifDKDDDGGDKKEKDGLP"'
,-----. ,-----;LLGKKKKKEEKKEEDGP"'
| | / / `"CYB0RG/ASM";-----.-----.----. ,----.-----------.
| | / / / | | \ | | |
| |/ / / | | \| | |
| + / ,------. '--+ | | + | +------+
| \ \ \ | | | | |
| + \ `------' | | | + | +------+
| |\ \ | | | |\ | |
| | \ \ | | | | \ | |
'-----' '-----' '-----'-----'----' '----'-----------'
````````````````` ``````````````````````````
```````````````````` `````````````````````````````
````` ``````` ```````
````` ``````` ```````
````````````````````````````` ```````` ``````` ```````````````````````
``````````````````````````````` ``````` ```````````````````````````````
```````` ```````` ```````
```````` ```````` ```````
```````` ````````````````````````````
```````` ````````````````````````
O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O
| |
. randOm wOrds .
| |
. Introduction . . . . . . . . . . . . . . . . . . . . . . . The Clone .
| Contact Information . . . . . . . . . . . . . . . . . . . . The Clone |
. Link of the Quarter . . . . . . . . . . . . . . . . . . . . The Clone .
| K-1ine Mirrors . . . . . . . . . . . . . . . . . . . . . . The Clone |
. Nettwerked Donate . . . . . . . . . . . . . . . . . . . . . The Clone .
| Nettwerked Radio . . . . . . . . . . . . . . . . . . . . . The Clone |
. Voodoo Magick Boxes . . . . . . . . . . . . . . . . . . . . The Clone .
| |
. .
| dOcuments |
. .
| Guide to Programming a Samsung SPH A540 Tri-Mode PCS . . . . Kankraka |
. How To Bypass Digital Rights Management Audio Files . . . . Cygnus .
| Exclusive Interview: Crys and The Clone . . . . . . . . . . Crys |
. Contributing to the Study of Climate Change . . . . . . . . Wizbone .
| How I Pimped Impark With Simple Social Engineering . . . . . H1D30U5 |
. Free Carwashes for Fun and Profit . . . . . . . . . . . . . Anonymous .
| Back in the USSCanada . . . . . . . . . . . . . . . . . . . Aestetix |
. Obtaining IP Addresses Using MSN Messenger . . . . . . . . . H4v3n .
| A Little Insight Into the Voodoo Magick Boxes . . . . . . . Cyburnetiks|
. HID Access Control: Controlled . . . . . . . . . . . . . . . GLHeX .
| Surviving The Fall of Society . . . . . . . . . . . . . . . Doobie Ex |
. Another malware file . . . . . . . . . . . . . . . . . . . . Aftermath .
| PDF417 and your privacy . . . . . . . . . . . . . . . . . . GLHeX |
. .
| |
. .
| cOnclusiOn |
. .
| Credits . . . . . . . . . . . . . . . . . . . . . . . . . . The Clone |
. Shouts . . . . . . . . . . . . . . . . . . . . . . . . . . The Clone .
| |
O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O
Introduction:
Do you believe in U.F.O.'s, astral projection, mental telepathy, ESP, clairvo-
yance, spirit photography, full-trance mediums, telekinetic movement, the Loch
Ness Monster, and the theory of Atlantis? If you do, then you have come to the
right place.
Everybody's heard ghost stories around the campfire. Heck, my grandma used to
spin yarns about a spectral locomotive that used to rocket past the farm where
she grew up. Now, as if some unseen authority had suddenly given permission,
thousands of people here are talking about encounters they claim to have had
with ghosts. The controversy builds as more sightings are reported and some
maintain that these professional paranormal eliminators on the Internet are
the cause of it all. But you know it's not true. Because I mean, if that's the
case, what do we say about UFO's and alien abductions? Stories dating back to
the ancient days of the egyptians show wall art depicting life forms from the
heavens above. Aliens, man. They are very frightening short green creatures.
And that is the whole problem with aliens. You just can't trust them. Occasion-
ally you meet a nice one... Starman, E.T. But usually they turn out to be some
kind of big lizard.
Well, that's all the time we've got this quarter on World of the Psychic. Next
quarter though... hairless pets. Weird. Until then this is The Clone saying;
when odd, unexplained stuff happens in your community... who ya gonna call?
-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O
Contact Information;
|*> Comments/Questions/Submissions: theclone@hackcanada.com
|*> Check out my site: (Nettwerked) http://www.nettwerked.net
|*> Check out the Web-forum: http://board.nettwerked.net/
-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O
Link of the Quarter:
Every quarter I post one really great "link of the quarter" on each issue
of K-1ine magazine. The link can be anything in the technology industry,
music scene, rave scene, punk scene, or even a good article you read on
a news site. I'll be taking submissions via e-mail or IRC right away; so
get your links in and maybe you'll see it in the next issue of K-1ine!
For the Winter of 2004/2005, the link of the quarter is:
http://www.protoncharging.com/ghostbusters/
Protcon Charging is a website dedicated to anything and everything
related to Ghostbusters. News, Photos, Art Work, a Message Board,
and more. It's definitely worth checking out if you're a "GB" fan!
-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O
K-1ine Magazine Mirrors:
WIRETAPPED
"Wiretapped.net is an archive of open source software, informational
textfiles and radio/conference broadcasts covering the areas of
network and information security, network operations, host integrity,
cryptography and privacy, among others. We believe we are now the
largest archive of this type of software and information, hosting in
excess of 20 gigabytes of information mirrored from around the world."
Now mirrored in two places, one in Belgium and another in Sydney.
http://www.mirrors.wiretapped.net/security/info/textfiles/k1ine/
HACK CANADA
"Hack Canada is the source for Canadian hacking, phreaking, freedom,
privacy, and related information."
http://www.hackcanada.com/canadian/zines/k_1ine/index.html
SECURITY-CORE
"Security-Core mirrors K-1ine.. and that's about it so far."
http://security-core.com/modules.php?op=modload&
name=Downloads&file=index&req=viewdownload&cid=5
.: (.dtors) :.
"we look good... in our new town" - Omin0us' Security website
http://dtors.ath.cx/index.php?page=k1ine
-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O
Nettwerked Donate:
Donate any dollar amount to Nettwerked.net and help us. To learn more on
how to donate, click here. A donation of $25.00+ will automatically put
you on a pre-order for a complimentary Nettwerked t-shirt! Read below:
Your Donation to Nettwerked.net helps us to pay for:
:. Annual domain fees associated with keeping the Nettwerked site running.
:. Bandwidth costs associated with streaming Nettwerked Radio on weekends.
:. Annual Nettwerked Meeting give-aways, and the monthly hardware give-aways.
:. Start up costs associated with development of stickers and t-shirts
Our donation to you:
We have been publishing technical articles for FREE since May 22nd, 1999.
We have contributed countless hours of our own blood (none good enough for
Canadian Blood Services), sweat and tears to help put "Nettwerked" on the
map as one of the resources of choice for the latest in Canadian H/P inf-
ormation. We have helped to create a community of friends through the
message board, monthly meetings, quarterly K-1ine releases, the mailing
list, and recently with the launch of Nettwerked Radio.
Our plans for the future:
In the future we plan on expanding Nettwerked Radio in a very large way,
and this alone will be an expensive and very time consuming task. When
we start selling official Nettwerked t-shirts later this year we will
have a large start up cost. As Nettwerked becomes more interactive and
more of a 'media' in the next couple of years, the costs of running this
site are (most) likely to increase 10-fold. Any donation amount will help
us to achieve these goals. We thank you very kindly for your contribution.
[Note: Your donation will NOT go toward contributing to our lavish and
controversial celebrity lifestyles. Your donation is not tax deductable,
it does however put you on our list of cool people to invite to our
exclusive all-female mud wrestling tournaments.]
Your donation to Nettwerked.net is not expected, but is most appreciated.
To donate please visit http://www.nettwerked.net/donate.html
-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O
Nettwerked Radio (Undergr0und Radio and Music every weekend!):
Tune into this critically acclaimed radio show on:
Saturday and Sunday from: 12:00am - 3:00am (MST).
To listen, please tune in to:
http://68.151.33.191:8000/listen.pls
If you're not sure whether the show is on, just visit nettwerked.net,
and look at the Radio section. If you see lime green "ONLINE", then
we are live. You can listen in using Winamp, XMMS, or anything that
will play Winamp streaming audio. We thank you for your support and
hope that you tune in, give your feedback, and make those requests!
--------------------------------------------------------
Contribute your music to Nettwerked Radio, and be heard:
--------------------------------------------------------
Do you have your own band? Are you a solo artist? Do you make your
own music on your computer, or with regular instruments? Be heard!
Nettwerked Radio, on from 12AM-3AM (MST) every Saturday and Sunday,
is now accepting submissions of YOUR original music for play. We
accept MP3 or OGG formats. If you submit your music, be sure to
include information on the band, and any information; such as
location, and history. Nettwerked Radio will play your music and
advertise your artist information! Nettwerked Radio is a great way
to be heard without having to pay out for advertising, or passing
out flyers, etc.
We respect your copyright too. We will only play your songs when
you want them played. We will not duplicate, share or otherwise
pirate your songs.
All interested artists please send your music and information to:
the.clone@gmail.com
-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O
Voodoo Magick Boxes:
Voodoo Liquidation! - Nettwerked.net is pleased to announce the
return of the Voodoo Magick Boxes! We are selling off the last
of these fine machines, and with a fine price tag. We're selling
for 50% less than their original cost! Buy a Voodoo Machine now:
http://www.nettwerked.net/voodoo.html
Price: $50.00 (US) + $12.00 (US) shipping.
We accept PayPal as a main form of payment, but also accept money
orders. For money orders, please make your payment in American
Funds and mail it to the following Nettwerked business address:
Nettwerked Incorporated
#195-11215 Jasper Ave
Edmonton AB T5K 0L5
Canada
-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O
<TwstdPair> I take it up the ass from #hackcanada and #to2600
<theclone> no shit. you're a loser. what do you expect?
<TwstdPair> leave me alone okay... my dad used to beat me
<theclone> he probably still does and you like it, fag.
<TwstdPair> :( truth hurts.
Phreaky Press Publications presents:
Kankraka's Guide to Programming a Samsung SPH A540 Tri-Mode PCS Phone!
Follow these turbo easy steps to program your Samsung A540 phone, I mean,
jebus, how hard can it be? Ahh yes, I forgot who I'm talking to, so I'll
bust a lil disclaimer action to protect my ass!
- **************************************************************************
If you are incompetent, or otherwise unable to follow simple instructions,
don't start messing with your phone. I'm not gonna be held responsible
cause your dumb ass fucked up and rendered your phone useless. ALWAYS
WRITE DOWN WHAT YOU SEE BEFORE YOU CHANGE IT! That is the key to preventing
you from totally shooting yourself in the foot in this case. Trying to
"hijack" someone's phone number is both illegal, and pointless. The number
is bound to an ESN on the network, so the only way to get their number, is
to steal there phone. Which I also suggest you do not do. There, now that's
cleared up, down to business!
- **************************************************************************
1. Press the PWR key to turn on the phone, yes, you WILL need the phone ON
for this *laughs.* Anyways, make sure it's fully charged, I doubt the battery
dying can do anything good when you are playing with your NAM.
2. Press MENU, 9,1,0 "Enter Lock ??????" appears on the screen
3. Enter the six-digit First Subsidy Lock Code, 858091. "Svc Menu, 1: Basic"
appears on the screen. You're now able to program your phone for a different
network.
4. Press 1 to enter Phone Number programming. "Service Mode NAM 1 CDMA" appears
5. Enter the 10-digit PCS phone number, followed by OK "NAM1 Home SID" appears.
Press OK to continue. Telus' SID is 16422, NID 65535. The phone was made for
Telus, so should automatically have that set. That information I guess is only
useful for those trying to get a different phone to work on the Telus Mobility
Network. The unit will then return to the Service menu. "Svc Menu, 1: Basic"
appears on the screen.
6. Press the END key to complete the programming. The handset will reset and
the new NAM will be in effect.
There are other options to play around with, Phone Number, General, NAM, and
A-Key. My phone lacks an A-Key, perhaps this is why my wireless web ceases to
function...
To enter Field Service, press MENU, 9, 0. Unfortunately, I don't know the lock
code for that.
Well, there ya have it, hope this becomes beneficial to someone out there,
happy "hacking!"
The above work is Copyright (c) 2004 by Phreaky Press Publications, and is
freely distributable without changes. E-mail Pheaky Press at the following:
kankraka(at)gmail(dot)com
~~SHOUTS~~
Mad shouts go out to The Clone, H1D30US, KarmaFoxx, Persephone, Tek, MsViolet,
The_p0pe, Port9, Pinguino, Mister Fitch (You know why!), MadCatX, **Kappy**,
and the rest of the Canadian scene!
-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O
<Kankraka> there is an imbred kid at my school
<Kankraka> he looks like a potato
<senorita> and that makes Kankraka hungry
How To Bypass Digital Rights Management Audio Files:
Digital Rights Management (which, now will just be referred to as "DRM"), is
a sneaky way for artists to protect their music.
If you download a song from a legal place - in cyberspace - such as Napster2,
you may find that these files that you download will be playable on that
computer only. They also, only - if the company has set this up - might be
playable on the companies media player (several companies have done this.)
However, there is a way to get around this.
What you'll need:
- A sound card that can record from itself (in the volume control, in the
recording section, look for 'What 'U' Hear', 'Wave Out Mix', or 'Stereo Mix'.
This is covered later.)
- A good audio editing program, meaning - if you are using Windows - NOT THE
DEFAULT RECORDER that comes with Windows! (Found in Start >> Programs >>
Accessories >> Entertainment). I recommend something powerful, yet, easy to
use, such as the free wave editor that comes with Nero Burning ROM (Nero Wave
Editor). If you are crafty enough, you'll be able to find some good programs,
that you'd usually pay for, for free.
Such good programs are:
Steinberg's "WaveLab 4"
Adobe's "Audition"
If you are using Linux, there are default recorders that will do what you're
doing, just fine.
- The player, to play your files.
- One last thing, and this is VERY IMPORTANT! You will need all of your sounds
turned off. Things that make sounds (such as msn messenger, windows', or
Linux's sounds). Turn all of those off before recording. Why? Because, you
are recording all of the sound sources that are heard from your computer.
Everything (except beeps emmited from the internal hardware speaker).
Including little msn "bloips".
PROCEDURE:
1. Open up the programs that you'll me using, these will include: Your wave
editing program. Your player. The recording volume control.
To get to this (assuming you are in Windows):
If it's there, click the speaker in the taskbar, that's in the bottom
right-hand corner, depending on your Windows version, it will either be
yellow, or grey.
If you are in Windows XP, you may need to un hide the icons in the taskbar
to get to the speaker, this is achieved by clicking the big blue, silver,
or olive green arrow by all the icons.
If it's not in the taskbar, you can also get to it by going to Start >>
Programs >> Accessories >> Entertainment >> Volume Control.
Once you are there, go to Options >> Properties >> And, in the next menu
that pops up, select recording >> Check all the boxes in the bottom menu >>
Click OK.
Look for 'What 'U' Hear', 'Wave Out Mix', or 'Stereo Mix' in the recording
control panel in your recording volumes control. Check the box that is under
that name.
Hit record on your wave editor.
Hit play on your player.
Assuming it's working, you should see the level meters bouncing up and down
with the sounds. If you are within "clipping area" or, the red area of the
meters, go to your recording control volume panel and turn the slider down,
for the one that you selected until you are in the green area in your reco-
rder.
Repeat steps 3 and 4 again.
Once it's finished - if you can, you should normalize the sound level to -
(minus) 6dB. NOT 6dB! MINUS 6dB!
Save to the WAV format if you can. This preserves full audio quality.
Do whatever you want to with your new - unprotected - file!
- Cygnus
-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O
Exclusive Interview: Crys and The Clone
(February 2005)
"How old were you when you got your first computer?"
The first time I got my computer. That's an excellent question. You see,
as a kid I used computers all the time in school. I first started using
the Apple IIe in grade three, and really only used that computer up until
grade 9. I guess I went to the poor inner-city schools because we were
using Apple IIe's in the 1990's! You see my mom didn't want to pitch the
funds to purchase a computer for me, so I was forced to use computers at
my sisters' house (386 SX 25, which eventually became mine), at the lib-
rary using the Edmonton Freenet, at the Edmonton Space and Science Centre
(graphical net on dual ISDN 128 lines using Netscape 2.11! Hah!). So to
answer your question; I was 15 (the year 1997) when I got my first com-
puter. Let me tell you, this computer was so old school but it worked,
and I loved it. Want to know how old it was? Think pre-386. Infact, think
pre-286! That's right, I owned a 8088. My aunt was given an old Commodore
8088 PC Clone one day from some family at her local church. Of course she
had no use for it since she already had her own computer. She knew I loved
and adored computers, so she gave it to me. This old Commodore 8088 PC
Clone run at a whopping 11Mhz, had a 40MB (Mega Byte!) hard drive, had 1MB
of ram, and for software ran DOS 5.0 with Windows 3.0. The screen was black
and white, and was really fuzzy. It was the perfect machine to play with
Basic, run old DOS Terminal Emulation programs (for Freenet and BBS' of
course), and to play my favorite game; Strip Poker. Good times were had
on it. I still wish I had that old beast. Then again, I doubt I'd have
enough room in this small apartment I'm currently in.
"How old were you when you first started using the Internet?"
I was 12 years old when I started using the Internet. I remember it clearly
because it was May of 1994 and I was ready to finish grade 8. Our class was
given the opportunity to use the ONE Macintosh computer in the entire school
with graphical Internet access... hell the only one with Internet period. I
believe the first site I visited was Sony.com because I clearly remember me
reading the "gossip" about the launch of the Playstation in Japan. My first
experience with text Internet was using a 'guest' account on the Edmonton
Freenet (now called Edmonton Community Network - which, I regret to say has
gone out of business as of this year). I had a Lynx Browser based "shell",
the 'go' to feature was disabled, and it really sucked until I paid for my
own real account which cost me a whole $15.00 a year! It was great. I got
Pine-based e-mail, the Lynx Browser (not limited), the Tin Newsreader and
the Pico Editor with a spell checker installed. It wasn't much now that I
look back at it, but it was all we had! Look at me... I'm turning into one
of those old BBS geezers reminiscing about the old days of computers. heh.
"What initially attracted you to the Internet?"
As a kid I remember reading a lot computer magazines (Mondo 2000, Wired
Magazine, 2600, Blacklisted 411) that always talked about the "Information
Superhighway", about how the Internet was the "newest greatest thing" since
sliced bread. To be honest with you, what initially attracted me to the
Internet was the hype of it all. After finally getting on the Internet, I
discovered a whole new world of like-minded individuals who shared the same
interests as me. The resources (www, search engines, news groups, ftp,
gopher, etc) that were available to me were (and still are) unbelievable.
"How did you first get interested/involved with hacking?"
Without incriminating myself too much, I would have to say what first piqued
my interest in the hacking world would be: Blacklisted 411, cDc (Cult of the
Dead Cow), 2600 Magazine, Phrack 'zine, and lastly L0pht Heavy Industries.
Before I even knew about any of these groups / magazines / 'zines, my first
real "experience" hacking was at age 11. I lived in an apartment building
that had recently implemented a building security system that required ind-
ividuals who wished access to the building to enter an extension to gain
access to the building. With a little time and energy my brother and I
determined that the building management had REALLY easy to guess pin codes
that were used on every single building across the complex. When the pin got
changed, they would set the pin code to a very easy to easy pin code, and we
would eventually (with a lot of effort, I might add) bruteforce enough pins
to finally get to the right code. It became a cat and mouse game; building
management would change a pin, we'd guess it, and then they'd change it hop-
ing we wouldn't guess it again. I wonder if they ever figured out that a 4
digit pin code can be bruteforced in less than 3 hours, typically.
"What has kept you involved with hacking/phreaking all these years? I.e.
Interest, money, chicks, the thrill, a sense of �Robinhoodesque goodness,
etc."
Chicks. No really, I would say the community. The people I have had the pl-
easure of meeting over the years, including the wonderful friendship I have
created with Hack Canada and friends is what has kept me around this long.
The thrill of exploring, learning and expanding my mind has also kept me
around. Knowing that what I have contributed has changed someone's perspe-
ctive of the world in one way or another is motivating enough to keep me
kicking around.
"What is the origin of your alias, 'The Clone?'"
It all began at a little Edmonton Public Library (Woodcroft library to be
exact). At the age of 12 I had somehow come up with the alias/nickname/
handle "The Vortex", but quickly became unsatisified with that name for
reasons unknown. After reading through several books next to the Edmonton
Freenet "Dumb Terminal" (it was essentially a box with a keyboard, and a
VT100 style monitor), a science fiction book about cloning caught my eye.
It was from that point on (at age 13) that I decided "The Clone" was the
most suitable nickname for me, and it stuck. 10 years later, and look at
me; I'm still The Clone!
"Did you use other aliases previous to or after adopting 'The Clone?'"
Yes, but I'll leave it up to your imagination and "cyber-sluething" to
figure it out. Because naturally if I told you those nicknames, I would
have to kill you*. (* Not really).
"How long have you been running nettwerked.net?"
Before I go on explaining how Nettwerked started, I feel explaining what
led up to Nettwerked.net a tad more interesting. In the beginning there
was VI (Virtual Insanity). I met the leader of this hacker group (Prince
Slick) and his pal Kinslay3r on a popular Internet text-based chat server
called "Alamak Chat" (www.alamak.net) in the summer of 1997. After a two-
year stint in this organization, I moved on and started a half-serious
group (which quite frankly was more of a duo) with long-time friend
Wizbone. We called the group "Telus Watchers". Telus Watchers had its own
website on then free web-page service provider HyperMart.net. The site
contained a few of our hacker / phreaker files, and a collection of misc-
ellaneous scene-related links. Soon after Wizbone and I discovered a
homegrown site calling itself "Hack Canada" (www.hackcanada.com). You see
Wizbone actually came across this site by pure chance back in 1998 when
surfing through Wired.com (Wired News, a great techo-resource, though it's
no MONDO-2000; may it rest in peace). Wired had covered a story about how
Edmonton based Hack Canada had created a redbox program for the Palm Pilot
PDA. Intrigued by this article, Wizbone set his sights on communicating
with the group's webmaster, CYB0RG/ASM, about Telus Watchers and the scene
in general. Soon after Wizbone joined forces with Hack Canada as a core-
member, Telus Watchers disappeared soon after, and as a result I was on my
own. In May of 1999 out of pure bordem I started Nettwerked (also hosted on
HyperMart.net until 2000, when I purchased a real domain name) - a "non-
member" site dedicated to researching phone phreaking, hacking, and every-
thing else in between. Shortly after creating this site, I began publishing
my own phone phreaking related "philes" on Nettwerked, and after writing up
a few decent articles, put them into a compilation that eventually became
K-1ine Magazine; now the longest running H/P 'zine in Canada! Oh and in
case you were wondering, I *was* invited to join Hack Canada around a month
later and graciously accepted. ;)
"How does hacking differ from phreaking?"
These days hacking and phreaking really aren't that different. Phone systems
are now computer controlled at the Central Office (C.O.) of the ILEC (Incu-
mbent Local Exchange Carrier). But don't get me wrong; there definitely is
a significant difference between hacking and phreaking. With conventional
"hacking", you're typically sitting at computer screen writing code, break-
ing through the security on remote terminals, doing authorized or unauthor-
ized vulnerability assessment, reverse engineering, or just simply making
software/hardware you are working with do something it wasn't meant to do.
With phreaking, you are almost always dialing on a telephone. Phreaking is
the art of telecom exploration. Phreaking normally involves a lot of sequ-
ential and non-sequential dialing through local, long distance, or toll free
#'s for the sole purpose of discovery. "But discovery of what?" you ask.
Simple; when phreaking you're typically scanning for vulnerable PBX (Private
Branch Exchange) systems, Voice Mail, test numbers (i.e. loops, diverters,
test tones), payphones, and more. With the introduction of VoIP (Voice over
Internet Protocol), phreaking and hacking in a lot of ways have blended into
one. Now you can have corporate or residential phone service routing over the
Internet. What does this mean? It means that individuals with hacking exper-
ience can now exploit telecommunications networks from behind the keyboard
instead of with the touch of the phone pad. Phreakers who wish to stay ahead
of the game are encouraged to learn more about computer hacking in order to
make the most of VoIP (SIP and equivalent); though I figure you have at least
another 30-40 years before POTS (Plain Old Telephone Service) Copper becomes
completely obsolete. I've personally always found phreaking more interesting
than hacking as my large assortment of technical telco articles will show you.
"How would you define the terms 'Black Hat Hacker', 'White Hat Hacker', and
'Gray Hat Hacker?'"
I would define it this way; An Easy Way For The Media To Categorize A Complex
And Uncategorizable Scene. There is no black or white. There is a gray area...
like everything in life, naturally. People are never 100% bad or 100% good.
You have your "script kiddies" (morons who do DDoS'ing, and deface webpages
for no political or "hacktivism" reason) and then you have everyone else. I
really hate labelling.
"What do you feel motivates most hacking? Ie. Greed, curiosity, boredom,
wanting to help (company�s security, an individual, humanity in general?"
Despite what Mass Media wants to have you believe; hacking is still mostly
motivated by curiosity and the desire to challenge ones self. There are
always individuals who are in "it" for greed and for destructive purposes,
but we all know those people aren't even hackers in the truest sense of
the word.
"What do you wish would motivate hacking, in a perfect world?"
Curiosity and a desire to challenge ones self. I wish more hacking was done
for political reasons, and done to help change the world in a positive way
(i.e. by preserving privacy, helping the Internet run more efficiently
through creative programming). Hackers that define hacking done the right
way; Hack Canada (www.hackcanada.com) does it right. Read up on our fight
against BarLink, read about our research into telecommunications security,
PDA security, and wetware hacking. Oxblood Ruffin from Cult of the Dead Cow
(www.cultdeadcow.com) did it right when he coined "hacktivism". According to
TheHacktivist.com "Hacktivism is the fusion of hacking and activism; politics
and technology. More specifically, hacktivism is described as hacking for a
political cause. In this context, the term hacker is used in reference to its
original meaning. As defined in the New Hacker's Dictionary, a hacker is "a
person who enjoys exploring the details of programmable systems and how to
stretch their capabilities" and one who is capable of "creatively overcoming
or circumventing limitations". Activism is defined as "a policy of taking
direct and militant action to achieve a political or social goal". Therefore,
a clinical definition of hacktivism is: Hacktivism: a policy of hacking,
phreaking or creating technology to achieve a political or social goal".
"What motivates your hacking?"
The three c's: Curiosity, Control, and Caffeine!
"What purpose does a hacker�s alias serve?"
A hackers alias serves many purposes. The ability to stay anonymous, the
ability to have another online identity without having to worry about being
identified in person; and thus judged as something. A hackers alias usually
says something about their personality in one way or another. You see with
MY alias it's obvious I'm an anti-birth activist who is all for the cloning
of children for reproduction rather than having to make a woman suffer thr-
ough 9 months of hell.
"What are your feelings regarding the hacker stereotype perpetuated by movies
like 'Hackers' and newspapers reporting on major viruses/worms?"
It used to bother me. But as years went by, I simply gave up trying to conv-
ince the world what "hackers" are and what "criminals" are. If the media is
too stupid to know the difference, and the people swallowing it up are too
stupid to figure out the difference then I see no use in trying to waste my
time explaining it to them. I prefer to focus my energy on useful things.
"Do you feel you behave differently in online situations than in real life?"
To be honest with you; not at all. There are a LOT of people I know online
that act completely different in person than they do online, but I believe
its not on purpose. Then again, I've had the unfortunate opportunity to talk
to a few kids who act like they are the roughest thing to come out of maximum
security prison when online, and when I do eventually meet them in person th-
ese rough kids turn out to be prepubescent little twerps. I like to call this
"small mans syndrome".
"How important was/is your reputation in the hacking community?"
When I first got involved in the hacking community my reputation mattered a
lot because in a small way I was trying to build a positive reputation. By
now I imagine I've gathered somewhat of a positive reputation (with the
exception to a few morons online who I won't name) in the hacking community.
Through the 150+ H/P article contributions, the K-1ine 'zine contribution,
the Nettwerked Radio Show, Def Con conference appearances, and the monthly
Nettwerked Meetings I've made a LOT of friends and thus built a reputation.
So how important is it now? VERY important. Reputation is everything. Show
me one person that doesn't care about his or her reputation. You simply
cannot find anyone who doesn't care - unless they're mentally retarded.
"Do you feel most people (hackers or civilians) create online personas as
well as their pseudonyms?"
Of course. For some being online is an escape from the realities of "real
life".
"What are some pseudonyms you found particularly memorable? I.e. Wizbone,
DaGrl4U, etc."
From the Freenet.net newsgroup days I would have to say; Crys, Bronaugh,
Dagrl4u, N_Space, Sven, and wizbone. I miss those days... back when I
could be a total idiot and usually get away with it. God, Wizbone and I
caused so much shit for the Freenet staff... I'm surprised they didn't
just come down to our homes and beat us to death with cat-5 cables. I
know I would if I had to deal with kids that were as crazy as us. haha.
"Would you say you have trouble dealing with people face to face?"
No. Ask anyone I know, I'm probably one of the more social people out
there. I love meeting people, hanging out with old friends, and having
a great time. If you're looking to categorize an entire culture, or look
to stereotype a hacker, you're talking to the wrong guy. I'm probably
the furthest from your text book example of an "anti-social geek" that
you'll ever find (i.e. I get laid, I have lots of friends, and I'm
extremely social).
"Do you find it at all odd to call people by their aliases rather than
their given names?"
Not at all. When online, at the Nettwerked Meetings, or when I'm conso-
rting with a group of my "hacker friends", using each others aliases
instead of our real names is second nature. We don't even think about
how "odd" it is to use each others aliases as opposed to real names.
The only exception where I might find it odd to call someone by their
alias is if we're in a group where a large number of friends know a
particular person by their real name, and a small number do not. If
someone makes the mistake of calling me "The Clone" around friends
that only know me by my real name, jokes will ensue.
"Does your answer above change with the development of a real life
relationship?"
No, not at all.
"Do you feel things like sexism, racism, and bigotry can/do exist in
'online communities', and within interactions such as chatrooms and
online dating?"
Yes. You can change the communications protocol, but you can't change
people. People are always sexist, racist, and down right disgusting.
You get them in "real life" and you get them online. From my personal
experience, I have found that people are bigger racists, sexists,
assholes online than in person; because they feel they're anonymous
and therefore unaccountable for their behaviors. In a lot of cases,
they are not accountable. On the Nettwerked Discussion Board and on
IRC, we occassionally get people who behave in an inappropriate way.
We make sure to promptly warn them that their behavior will not be
tolerated, and any further unappropriate behavior will result in
their removal. The problems we have are very minimal though. Most
people in our community are great.
"How has (the physical act of) hacking changed since you began?"
If by the "physical act of hacking" you mean dumpster diving, modi-
fying payphones for the purpose of free calls and/or phreaking,
then I would have to say it hasn't changed much. Except now we have
people who call themselves "Urban Explorers". I have nothing against
Urban Exploration, because it's exciting to go somewhere you're not
supposed to go, and finding places less travelled. The only problem
is; I don't see how "Urban Exploration" is anything new. People have
been exploring abandoned buildings, tunnels, sewers for years without
the trendy label of urban explorer. Same shit, different name.
"Has the hacking scene changed at all? I.e. Attracting more/less
people, different people, more/less official interference/interest,
etc.?"
A perfect example of the "hacker scene" going mainstream would be
with the 1983 release of the cult hacker movie "Wargames" starring
Matthew Broderick. After kids (and some adults) learned of modems,
and wardialing, computer hacking, and phone phreaking, soon came a
whole generation of people wanting to BE the Wargames character
"David Lightman". After this movie was released, the media soon
picked up on hacking culture, doing what it does best; scaring the
public with tell tale stories of how "hackers" are stealing their
credit card numbers, personal information, etc.
As the BBS days fizzled away and the Internet became the new main-
stream, the "computer underground", or at least the perception of
it, has changed dramatically. You still have your hardcore groups
(Cult of the Dead Cow, Hack Canada, etc.), but you also have a LOT
more people on one giant computer network with a voice. With the
Internet hacker culture has grown from thousands of tiny Bulletin
Boards around the world, to millions of web sites around the world.
We now have mailing lists, chat rooms, free VOIP conferencing sys-
tems, interactive hacker / phreaker radio Shows, and much more!
"What do you see in the future of hacking? Ie. Less/more theft,
less/more interest in freedom of information/privacy acts, etc?"
More focus on privacy through encryption. With the advent of tech-
nologies like quantum computing, the systems encryption that we
all rely on for our privacy and protection will become obsolete.
Infact the encryption we know today is becoming slowly obsolete.
Quantum Entanglement is more than just a theory; it's now a real-
ity. Within the next 10 years, I imagine there will be a hardware
and software based Quantum Entanglement solution for every aspect
of our lives; from banking to web site security. In the future we
will probably have the same old problems; more theft, more script
kiddies doing Denial of Service Attacks, more government agencies
and movie/music trade groups trampling on our rights, and more
hackers standing up trying to stop all the bullshit from getting
worse.
In the future we're also going to see more hackers focused on the
privacy aspect of computers more than anything. After 9/11, the
United States Government and private business began large data
mining activities (*cough* GMAIL *cough*). According to a recent
General Accounting Office (GAO) report to the Subcommittee on
Financial Management, the Budget, and International Security,
Committee on Government Affairs, of the United States Senate, the
federal government has been using data mining techniques for many
purposes, from attempting to improve government services to trying
to detect terrorist patterns and (hackers) activities. No less
than 52 federal departments and agencies are using or are planning
to use data mining, 131 data mining efforts currently are operatio-
nal, and 68 such efforts are intended. A lot of hackers are scared
of this, very scared. Don't believe me? Go to www.freshmeat.net and
search "privacy". You will be surprised by the number of open source
software projects dedicated to it. For a Canadian feel, go to Hack-
Canada.com and read about how we are fighting privacy violations
(BarLink) in our own province! This isn't stuff that is happening
far away... it's happening in our backyards. It's happening right
now. It's up to hackers to stop it. Do you think Green Peace is
going to make a difference? Those idiots are now on the Government's
agenda. They are partisan hacks. Same with a lot of groups out there.
This is my call to hackers out there reading my interview: if you
see a violation of your rights, all you have to do is speak up to
make a difference. Start protesting that shit... start defending
your rights before the government takes them away permanently.
-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O-o-O
<tek> hi, my name is tek, and i'm hear to smash all hopes, dreams, aspiration,
and goals.
_oo##'9MMHb':'-,o_
.oH":HH