💾 Archived View for spam.works › mirrors › textfiles › hacking › cbrsp-1.hac captured on 2023-06-14 at 16:46:28.
-=-=-=-=-=-=-
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :::: We, the People proudly Present :::: :: :: :: The Cyberspace Chronicle Volume 1, number 1 :: :: :: :: Brought to you by Phardak :: :::: :::: :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: First off, Welcome! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Carrying on a war against misinformation and injustice is hardly something I can do by myself. If you wish to contribute to this magazine, telnet to MARS hotel (130.18.64.3 log in as bbs) and send mail to DigitalBishop. It's cumbersome but seeing as how I have no real internet address, it'll do. This magazine speaks out for the rights of those who have been injusticed by the likes of Tom Forester, the US Government, and Bell Security. Once again, speaking out for hackers' rights is risky and hence the alias. Such is another injustice. For did someone not say, long ago, that "all men were created equal"? If you are going to submit something to me, make the subject either Personal (to me personally), Letters to the Editor (which may be reprinted herein), or Submission (an article which may be used). This will provide some distinction. Part 1: Tom Forester, the computer nerd ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Mister Forester and his hippocritical words piss me off. This word's for you, Tom. I'm not going to resort to name calling or generalizations, look where they got Tom! Everyone who gains access to a computer system through unintended channels is NOT vandalizing it. Vandalizing would include leaving notes or modifying data, which is simply not done by those whom I would call "hackers". Tom Forester states that hackers did damage to the E911 system, which routes and handles 911 calls. THESE HACKERS DID NO SUCH THING. They distributed a file describing how such calls are handled to the public. This document was later found to be public access information. In other words, Mister Forester has blown distribution of information out of proportion into maliciously damaging a system. Not quite the same, Tom. Tom, you will probably be greatly disillusioned by this, but I am not a social outcast. I have girlfriends and accquaintances just like other people. Normal people, if you will. I do not wear glasses, I do not wear plaid (God I hate plaid), and I don't have a pocket protector. Right now I am wearing a Metallica T-Shirt and some old jeans. Whoops, that makes me a heavy metal fan. Do I worship Satan too? I am not mad at society, nor do I take said anger out on systems by means of hacking. I have only had one pizza delivered to this house in all the years I have been alive, I rarely drink carbonated beverages, and eat even fewer snacks. Generalization contributes to racism, Mr. Forester. It is now also a cause of discrimination against hackers. Where were we? Oh yes, my computer skills are mediocre. I've been using computers since I was 4, that gives me 10 years of experience, plus mastery of C, Pascal, 6502 and 65816 assembly language, not to mention higher level languages like BASIC, Logo, etc. and partial mastery of 80x86 AT Assembly language. One again, a generalization. Also, Mr. Forester, it is time to clamp down on hacking and throw all these nerds in jail. This was based on your words and generalizations, not mine. Why do I hack? To free information from Illuminati hands, to show system administrators their security holes. Ask Prarie States Marketing of Lenexa, KS if any harm was done to their system. No, I left a little note to them showing them all the security holes they had. When I came back, they had patched these holes. Maybe it's also a game of chess for me, outwitting the sysop. The idea of Pawn takes King always appealed to me. There are many definitions of 'hacking'. My personal definition, is any person who obtains access to a system through unauthorized channels and does not damage the system. It stands to reason, however, that hackers modify security logs to ensure their safety, lest Big Brother and his injustices come knocking at your door. When the public thinks of hacking, they will think of someone who 'breaks in' to a top secret computer and trashes everything. This guy would not be a hacker, but would be an outcast of any hacker community as would anyone else who damages a system, or creates viruses. This sort of thing is not tolerated anywhere in the world, Forester, not even by those uncouth, nerdly hackers. You also have the media to thank for that misleading definition of 'hacker'. God, I could go on forever, but I think I'll stop here, Forester. Tom Forester is not a psychologist, neither is he an ethicist, nor is he an anylist. Other than that, he's a good writer, I want you to know.