Copy Link
Add to Bookmark
Report

The Cyberspace Chronicle Vol 01 No 01

eZine's profile picture
Published in 
The Cyberspace Chronicle
 · 5 years ago

  

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:::: We, the People proudly Present ::::
:: ::
:: The Cyberspace Chronicle Volume 1, number 1 ::
:: ::
:: Brought to you by Phardak ::
:::: ::::
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

First off, Welcome!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Carrying on a war against misinformation and injustice is hardly
something I can do by myself. If you wish to contribute to this
magazine, telnet to MARS hotel (130.18.64.3 log in as bbs) and send
mail to DigitalBishop. It's cumbersome but seeing as how I have no
real internet address, it'll do.

This magazine speaks out for the rights of those who have been
injusticed by the likes of Tom Forester, the US Government, and Bell
Security. Once again, speaking out for hackers' rights is risky and
hence the alias. Such is another injustice. For did someone not say,
long ago, that "all men were created equal"?

If you are going to submit something to me, make the subject either
Personal (to me personally), Letters to the Editor (which may be
reprinted herein), or Submission (an article which may be used). This
will provide some distinction.

Part 1: Tom Forester, the computer nerd
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Mister Forester and his hippocritical words piss me off. This word's
for you, Tom. I'm not going to resort to name calling or
generalizations, look where they got Tom!

Everyone who gains access to a computer system through unintended
channels is NOT vandalizing it. Vandalizing would include leaving
notes or modifying data, which is simply not done by those whom I
would call "hackers". Tom Forester states that hackers did damage to
the E911 system, which routes and handles 911 calls. THESE HACKERS DID
NO SUCH THING. They distributed a file describing how such calls are
handled to the public. This document was later found to be public
access information. In other words, Mister Forester has blown
distribution of information out of proportion into maliciously
damaging a system. Not quite the same, Tom.

Tom, you will probably be greatly disillusioned by this, but I am not
a social outcast. I have girlfriends and accquaintances just like
other people. Normal people, if you will. I do not wear glasses, I do
not wear plaid (God I hate plaid), and I don't have a pocket
protector. Right now I am wearing a Metallica T-Shirt and some old
jeans. Whoops, that makes me a heavy metal fan. Do I worship Satan
too? I am not mad at society, nor do I take said anger out on systems
by means of hacking. I have only had one pizza delivered to this house
in all the years I have been alive, I rarely drink carbonated
beverages, and eat even fewer snacks. Generalization contributes to
racism, Mr. Forester. It is now also a cause of discrimination against
hackers. Where were we? Oh yes, my computer skills are mediocre. I've
been using computers since I was 4, that gives me 10 years of
experience, plus mastery of C, Pascal, 6502 and 65816 assembly
language, not to mention higher level languages like BASIC, Logo, etc.
and partial mastery of 80x86 AT Assembly language. One again, a
generalization.

Also, Mr. Forester, it is time to clamp down on hacking and throw all
these nerds in jail. This was based on your words and generalizations,
not mine. Why do I hack? To free information from Illuminati hands, to
show system administrators their security holes. Ask Prarie States
Marketing of Lenexa, KS if any harm was done to their system. No, I
left a little note to them showing them all the security holes they
had. When I came back, they had patched these holes. Maybe it's also a
game of chess for me, outwitting the sysop. The idea of Pawn takes
King always appealed to me. There are many definitions of 'hacking'.
My personal definition, is any person who obtains access to a system
through unauthorized channels and does not damage the system. It
stands to reason, however, that hackers modify security logs to ensure
their safety, lest Big Brother and his injustices come knocking at
your door. When the public thinks of hacking, they will think of
someone who 'breaks in' to a top secret computer and trashes
everything. This guy would not be a hacker, but would be an outcast of
any hacker community as would anyone else who damages a system, or
creates viruses. This sort of thing is not tolerated anywhere in the
world, Forester, not even by those uncouth, nerdly hackers. You also
have the media to thank for that misleading definition of 'hacker'.

God, I could go on forever, but I think I'll stop here, Forester.

Tom Forester is not a psychologist, neither is he an ethicist, nor is
he an anylist. Other than that, he's a good writer, I want you to
know.

** If you reading this have anything to say to Forester to be printed in the next issue, or anything to say to me, please send it.

Part 2: Definition of a hacker
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
What is a hacker, to clarify the word? A hacker is someone who:

-> NEVER damages any system
-> USUALLY tells the system operator of security holes one he has
finished
-> ALWAYS gains access thru unauthorized channels

'Nuff said? Undoubtedly, I forgot a few. Mail them to me.

Part 3: A parting thought (and a poor choice of words!)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
If I left anything unsaid, write an article.
Hello to the Computer Underground Digest,
The EFF,
Knight Lightning,
and the MECH.
Expect future issues to be lengthier than this one..

You'll hear more from me soon.

- Phardak

loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT