[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference noted::hackers_v1

Title:-={ H A C K E R S }=-
Notice:Write locked - see NOTED::HACKERS
Moderator:DIEHRD::MORRIS
Created:Thu Feb 20 1986
Last Modified:Mon Aug 03 1992
Last Successful Update:Fri Jun 06 1997
Number of topics:680
Total number of notes:5456

33.0. "Hacking and resumes" by ACE::BREWER () Fri Jul 20 1984 20:26

	Although this is a fascinating topic, that I would like to explore,
isnt this somewhat like admitting in print that you have sucessfully
taken a soldering iron home, or pilfered a box of pens?

	I'm sure that there are MANY out there that could relate experiences
if they werent for the concern of monthly mortgage payments!

	Although I will admit to a certain degree of hacking, I have NEVER
destroyed or misused DEC resources! Curiousity is not malice! Now if you
can convince ABC,NBC,CBS of that ...

	-JB
T.RTitleUserPersonal
Name
DateLines
33.1XENON::MUNYANSat Jul 21 1984 03:0519
I agree... when I was in college I caused many a system crash without
really trying... one time I crashed the system by entering and executing
an example that was actually in the back of one of DEC's manuals...  I
tried to explain that to the system manager but he didn't beleive me...

I can also talk from the other side of the fence... When I worked for an
OEM I managed a large number of systems and had to listen to hackers (like
me) explain why their process came up in the security logs when they didn't
do anything except try to learn how the system works... (My name still does
show up in the XENON log occasionally - there's a lot to learn about VMS
and occassionally the only way to figure out how something works is to try
it even if your not sure what will happen)

Hopefully all you people are at least polite enough to do your big hacks
after hours when no large batch jobs are running.

Steve:	TSTB -(PC)
	.End Start
33.2PSYCHE::MCVAYSat Jul 21 1984 16:5426
 The problem, as I see it, is not legitimate attempts at exploration, 
but genuine illegal acts.  I attempt to crack system security one some 
machine at least once a month, but this is an effort to find a hole, 
bug, or problem.  On occasion I have had my wrist slapped, but in 
general everyone concerned appreciates the difference between a test 
and an attack.

 If you are in my age bracket (ancient, as programmers go), you 
remember when programmers/coders were a small and resourceful 
community, with incredibly high ethical standards.  Everyone knew 
almost everyone else, and programmers in general were not interested 
in (a) money, (b) prestige, (c) food, or (d) sleep--probably in that 
order.  Security was a non-issue, because programmers were, by 
definition, incorruptible.

 The situation has changed, obviously.  With literally millions of 
computer-literate people, the makeup of the programming population 
begins to resemble the general population more closely: meaning that 
there is a certain percentage of inethical, or criminal, users.  This 
group not only tends to give "hackers" a bad name, but also generates 
a lot of publicity.

 Quote from the leader of a security seminar (can't remember his name):
"Five percent of the population will steal no matter what the 
obstacles are; five percent will not steal no matter what the 
opportunities are; and the rest of us are opportunists."
33.3VIKING::WATERSSun Jul 22 1984 01:2712
	tThere are Hackers, and then there are Hackers...
I admit to hacking at systems on occasion, but I think the
biggest difference between 'Hackers' and 'Hackers' is that
one group is malicious in nature. They hack for the sake of
destruction. Those others (including myself) hack for the sake
of learning./ .. As Steve Munyan suggested, some such hacking should be
reserved for the wee hours of the morning (no problem for
a bona-fide hacker!?!). 

	Much of			- Lester
`
33.4ANNECY::DEIGHTONFri Aug 03 1984 16:1421
Unless I'm mistaken a definition of 'hacker' appears in a book called
'Computer Power and Human Reason' (by J. Weisenbaum??), a rather old publication
in this day an age. The gist of the definition is the programmer whose spent
the last 36 hours non-stop trying to debug a program and at 4 a.m. (say
4 hours before the delivery deadline) in desperation HACKS large chunks of
the miscreant program out, re-writes them, shoves them back in and hopes
that he's cured the remaining bug......leading to a well known support
problem. The guys who suck it and see may be tolerated in a development
enivironment (try explaining to 30 development engineers why yesterdays
work needs replacing!!!) but in a commercial environment they can only
be considered a menace ( explain to 10,000 workers why their pay cheques
hit the bank after their mortgage company wanted paying).

As far as those who enjoy/attempt to penetrate systems as total or partial
outsiders......I suspect that apart from the 5% who do it for gain ....most
people do it for the cudos, often using the "I was testing your security
and here are the faults I've found" approach to ensure everyone knows
they did it. The aforementioned book has some interesting psychological
insights into the "computer programmer".

N. Deighton
33.5VAXUUM::DYERFri Aug 03 1984 18:223
	Unfortunately, Weizenbaum has been taken as intellectual justifi-
cation for the oppression of programmers who don't do it top-down.
		<_Jym_>
33.6LATOUR::AMARTINMon Aug 13 1984 13:0314
Re .4:

I know plenty of people who have penetrated systems at one time or another.
I don't recall any of them making any money off of it, but I also don't
recall any of them going to talk to the system administration about how they
broke in either.  By far the majority of break in's I know about have merely
been a pain in the ass, and only stopped after the hole was plugged, or the
perpetrators were caught.  Usually the former.

These were always in environments where the rule was not "do it once, then
tell us how", it was "don't do it at all".  Makes you wonder what passing
laws will do.  I wonder if the majority of the laws talk about how to collect
for lost time and effort, or if they are just bent on punishment?
				/AHM
33.7Off the subject, but while I'm thinking of it..MDVAX3::COARAnd your little dog, 2!Wed Oct 07 1987 19:1521
    Inappropriate response location warning!
    
    Shortly after I became a `white hat' (that is, joined the
    Establishment), we had a professor's son who was a would-be hacker.
    He roamed the (VMS 2.n) system looking for interesting things. 
    The first we really noticed of him was when he tried running
    SYS$SYSTEM:JOBCTL to see what it did - the console went wild, feeping
    about how JOB_CONTROL, username <kid>, didn't have sufficient
    privileges.
    
    He eventually got really annoying, so we wired up a program that
    deleted all logical names (including SYS$INPUT, SYS$COMMAND, and
    SYS$OUTPUT), symbols, and $DASSGNed all his channels.  We named
    it GOD.EXE, put it in one of my directories ([SYSPROG.GOODIES],
    I think), and hid the sources.  His dad caught on when their terminal
    at home was irrevocably hung, and the kid assumed a lower profile
    thereafter, even to the point of asking us for help and teaching.
    
    I think we caught him at just the right time, career-wise.
    
    #ken "The Merciful (heh-heh!)" Coar	:-)}
33.8I'll bare my soul, alsoCSC32::HAGERTYDave Hagerty, TSC, Colorado SpringsSat Oct 10 1987 02:1217
    If Ken can do it, so can I... :-).
    
    One of my favorite hacks was under v3 of VMS, before terminals were
    shareable devices.  I wrote a piece of privileged code that went
    into the UCB for a device and set the shareable bit.  When I then
    tried to allocate the terminal, several things went ballistic:
    
    1) the other process
    2) my process
    3) the system manager.
    
    Oddly enough, the other process worked fine for a while (if I did
    not allocate his terminal), then would go into a black hole. No
    input, no output.
    
    					Dave()