ВУЗ:
Составители:
Рубрика:
81
In the introduction to this book I described hacking as a sport; and like most
sports, it is both relatively pointless and filled with rules, written or otherwise, which
have to be obeyed if there is to be any meaningfulness to it. Just as rugby football is
not only about forcing a ball down one end of a field, so hacking is not just about
using any means to secure access to a computer.
On this basis, opening private correspondence to secure a password on a
public access service like Prestel and then running around the system building up
someone's bill is not what hackers call hacking. The critical element must be the use
of skill in some shape or form.
Hacking is not a new pursuit. It started in the early 1960s when the first
"serious" time-share computers began to appear at university sites. Very early on,
'unofficial' areas of the memory started to appear, first as mere notice boards and
scratch pads for private programming experiments, then, as locations for
games.(Where, and how do you think the early Space Invaders, Lunar Landers and
Adventure Games were created?) Perhaps tech-hacking—the mischievous
manipulation of technology--goes back even further. One of the old favorites of US
campus life was to rewire the control panels of elevators (lifts) in high-rise buildings,
so that a request for the third floor resulted in the occupants being whizzed to the
twenty-third.
Towards the end of the 60s, when the first experimental networks arrived on
the scene (particularly when the legendary ARPAnet--Advanced Research Projects
Agency network-- opened up), the computer hackers skipped out of their own local
computers, along the packet-switched high grade communications lines, and into the
other machines on the net. But all these hackers were privileged individuals. They
were at a university or research resource, and they were able to borrow terminals to
work with.
What has changed now, of course, is the wide availability of home
computers and the modems to go with them, the growth of public-access networking
of computers, and the enormous quantity and variety of computers that can be
accessed.
Hackers vary considerably in their native computer skills; a basic knowledge
of how data is held on computers and can be transferred from one to another is
essential. Determination, alertness, opportunism, the ability to analyze and synthesize
the collection of relevant helpful data and luck--the pre-requisites of any intelligence
officer--are all equally important. If you can write quick effective programs in either
a high level language or machine code, well, it helps. Knowledge of on-line query
procedures is helpful, and the ability to work in one or more popular mainframe and
mini operating systems could put you in the big league.
The materials and information you need to hack are all around you--only they
are seldom marked as such. Remember that a large proportion of what is passed off
as 'secret intelligence' is openly available, if only you know where to look and how to
appreciate what you find. At one time or another, hacking will test everything you
know about computers and communications. You will discover your abilities increase
in fits and starts, and you must be prepared for long periods when nothing new
appears to happen.
In the introduction to this book I described hacking as a sport; and like most sports, it is both relatively pointless and filled with rules, written or otherwise, which have to be obeyed if there is to be any meaningfulness to it. Just as rugby football is not only about forcing a ball down one end of a field, so hacking is not just about using any means to secure access to a computer. On this basis, opening private correspondence to secure a password on a public access service like Prestel and then running around the system building up someone's bill is not what hackers call hacking. The critical element must be the use of skill in some shape or form. Hacking is not a new pursuit. It started in the early 1960s when the first "serious" time-share computers began to appear at university sites. Very early on, 'unofficial' areas of the memory started to appear, first as mere notice boards and scratch pads for private programming experiments, then, as locations for games.(Where, and how do you think the early Space Invaders, Lunar Landers and Adventure Games were created?) Perhaps tech-hacking—the mischievous manipulation of technology--goes back even further. One of the old favorites of US campus life was to rewire the control panels of elevators (lifts) in high-rise buildings, so that a request for the third floor resulted in the occupants being whizzed to the twenty-third. Towards the end of the 60s, when the first experimental networks arrived on the scene (particularly when the legendary ARPAnet--Advanced Research Projects Agency network-- opened up), the computer hackers skipped out of their own local computers, along the packet-switched high grade communications lines, and into the other machines on the net. But all these hackers were privileged individuals. They were at a university or research resource, and they were able to borrow terminals to work with. What has changed now, of course, is the wide availability of home computers and the modems to go with them, the growth of public-access networking of computers, and the enormous quantity and variety of computers that can be accessed. Hackers vary considerably in their native computer skills; a basic knowledge of how data is held on computers and can be transferred from one to another is essential. Determination, alertness, opportunism, the ability to analyze and synthesize the collection of relevant helpful data and luck--the pre-requisites of any intelligence officer--are all equally important. If you can write quick effective programs in either a high level language or machine code, well, it helps. Knowledge of on-line query procedures is helpful, and the ability to work in one or more popular mainframe and mini operating systems could put you in the big league. The materials and information you need to hack are all around you--only they are seldom marked as such. Remember that a large proportion of what is passed off as 'secret intelligence' is openly available, if only you know where to look and how to appreciate what you find. At one time or another, hacking will test everything you know about computers and communications. You will discover your abilities increase in fits and starts, and you must be prepared for long periods when nothing new appears to happen. 81
Страницы
- « первая
- ‹ предыдущая
- …
- 79
- 80
- 81
- 82
- 83
- …
- следующая ›
- последняя »