On 3/13/14, 7:35 PM, Larry Sheldon larryshel...@cox.net wrote:
Not sure I can agree with that. I have been in this game for a very
long time, but for most of it in places where the world's population
cleaved neatly into two parts: Authorized Users who could be
identified by the facts that they
On Mon, Mar 17, 2014 at 10:21 AM, Sholes, Joshua
joshua_sho...@cable.comcast.com wrote:
On 3/13/14, 7:35 PM, Larry Sheldon larryshel...@cox.net wrote:
Not sure I can agree with that. I have been in this game for a very
long time, but for most of it in places where the world's population
cleaved
On 3/17/2014 9:10 PM, shawn wilson wrote:
The point is that 'computer security' involves innovation as much as
is done at hacker spaces (which can be geared to hardware or computer
security or whatever). I think the difference you're trying to argue
is the legality and not the task or process. I
On 3/13/14 6:22 AM, Sholes, Joshua wrote:
If one came up in this field with a mentor who was old school, or if one
is old school oneself, one tends use the original (as I understand it)
definitions--a cracker breaks security or obtains data unlawfully, a
hacker is someone who likes ethically
On 03/16/2014 08:51 PM, Jay Hennigan wrote:
On 3/13/14 6:22 AM, Sholes, Joshua wrote:
If one came up in this field with a mentor who was old school, or if one
is old school oneself, one tends use the original (as I understand it)
definitions--a cracker breaks security or obtains data
On 14 March 2014 05:14, shawn wilson ag4ve...@gmail.com wrote:
On Mar 13, 2014 7:37 PM, Larry Sheldon larryshel...@cox.net wrote:
..
Sorry for my note. Didn't mean it to sidetrack the question (I probably
should've).
/me o_O
Social perception of hacking affect law-making.
Computing security
On 3/13/14, 12:35 AM, shawn wilson ag4ve...@gmail.com wrote:
A note on terminology - whether you know what you're doing, actually break
into a system, or obtain a thumb drive with data that you weren't supposed
to have - it has the same end so I'd refer to it by the same term -
hacking. Trying
On Thu, 13 Mar 2014 13:22:40 -, Sholes, Joshua said:
If one came up in this field with a mentor who was old school, or if one
is old school oneself, one tends use the original (as I understand it)
definitions--a cracker breaks security or obtains data unlawfully, a
hacker is someone who
On Thu, Mar 13, 2014 at 10:13 AM, valdis.kletni...@vt.edu wrote:
On Thu, 13 Mar 2014 13:22:40 -, Sholes, Joshua said:
If one came up in this field with a mentor who was old school, or if one
is old school oneself, one tends use the original (as I understand it)
definitions--a cracker
On Thu, Mar 13, 2014 at 11:45 AM, James R Cutler
james.cut...@consultant.com wrote:
And Bill documents yet another redefinition. Prior to that time, at MIT a
hacker produced a novel variation of technology using it in ways not
previously envisioned but not necessarily unlawful.
Mating two
I'm an ISP in Germany and a cracker (not a hacker :) ) has targeted a
customers of mine in the last days. The cracker was successful and caused
financial damage / was successful with data theft. I set a trap and finally
caught his real IP address - a Comcast user in the US (100% not a proxy
Re: hackers vs crackers
I was at one of the early Hackers Conferences in the late 1980s,
organized by Stewart Brand (The Whole Earth Catalog, The Well.)
The attendees were quite impressive, not sure why I was invited :-)
Todd Rundgren, Jerry Pournelle, Ted Nelson, the founders of a number
of
On Thu, 13 Mar 2014 12:46:06 -0400, William Herrin said:
Correct me if I'm wrong, but by the time hacker emerged as a word
distinct from hack it already carried implications of mischief and
disregard for the rules in addition to the original implication of
creatively solving a technical
On 3/13/14, 11:09 AM, valdis.kletni...@vt.edu wrote:
On Thu, 13 Mar 2014 12:46:06 -0400, William Herrin said:
(Contemplate for a bit why Kirk
wasn't bounced out on his butt from the Academy)
Apparently the thinking about hacking was a little more permissive in 1966.
signature.asc
On Mar 13, 2014, at 12:46 PM, William Herrin b...@herrin.us wrote:
On Thu, Mar 13, 2014 at 11:45 AM, James R Cutler
james.cut...@consultant.com wrote:
And Bill documents yet another redefinition. Prior to that time, at MIT a
hacker produced a novel variation of technology using it in ways
On Mar 13, 2014, at 12:24 PM, William Herrin b...@herrin.us wrote:
I'm afraid my google-fu doesn't reach back to the 1960's. You don't
happen to have a handy reference do you?
http://en.wikipedia.org/wiki/Hacker_%28term%29
On Mar 13, 2014, at 3:24 PM, William Herrin b...@herrin.us wrote:
On Thu, Mar 13, 2014 at 3:15 PM, James R Cutler
james.cut...@consultant.com wrote:
As of early 1960's - See history of WTBS, Ralph Zaorski, Dick Gruen,
Alan Kent, and many others - The then current usage of hacker was
simply
On Mar 13, 2014, at 2:30 PM, James Downs wrote:
On Mar 13, 2014, at 12:24 PM, William Herrin b...@herrin.us wrote:
I'm afraid my google-fu doesn't reach back to the 1960's. You don't
happen to have a handy reference do you?
http://en.wikipedia.org/wiki/Hacker_%28term%29
On Mar 13, 2014 7:37 PM, Larry Sheldon larryshel...@cox.net wrote:
On 3/13/2014 8:22 AM, Sholes, Joshua wrote:
On 3/13/14, 12:35 AM, shawn wilson ag4ve...@gmail.com wrote:
A note on terminology - whether you know what you're doing, actually
break
into a system, or obtain a thumb drive with
From: Dobbins, Roland [mailto:rdobb...@arbor.net]
Sent: Tuesday, March 11, 2014 8:06 AM
Although it's questionable whether or not it's possible to remotely absolutely
ascertain whether the attacking machine in question was being operated by
miscreants unbeknownst to its actual owner.
Though
On Mar 12, 2014, at 5:10 PM, Vitkovský Adam adam.vitkov...@swan.sk wrote:
Though it's 100% correct would this withstand in the court?
TIINAL - The Internet Is Not A Lawyer.
;
---
Roland Dobbins rdobb...@arbor.net //
On Tue, Mar 11, 2014 at 3:00 AM, Markus unive...@truemetal.org wrote:
I'm an ISP in Germany and a cracker (not a hacker :) ) has targeted a
customers of mine in the last days. The cracker was successful and caused
financial damage / was successful with data theft. I set a trap and finally
On 3/12/2014 5:41 AM, Dobbins, Roland wrote:
TIINAL - The Internet Is Not A Lawyer.
NANOGINTI
There ARE rules in the environment, however. For example, there is one
that I am too lazy to look-up that argues for the use of a .sig
separator -- .
I heard cheese works really well for catching crackers.
Sent from my T-Mobile 4G LTE Device
Original message
From: Larry Sheldon larryshel...@cox.net
Date: 03/12/2014 9:08 AM (GMT-08:00)
To: nanog@nanog.org
Subject: Re: How to catch a cracker in the US?
On 3/12/2014 5:41
On 12 March 2014 14:56, William Herrin b...@herrin.us wrote:
.. Who knows, U.S. authorities may already
be investigating the same user which would make your job so much
easier.
lurker mode offAlso, if you just want a deterrent. Having a cop
visit the home of the cracker just making questions
Hi,
I found that finding them on IRC, or wherever it is that they
congregate, and simply talking to them until they incriminate themselves
tends to work best. I also found that firewalls, IDS, security audits,
antivirus, antimalware etc work almost not at all. The reason for this
is pretty
Ha!
³Easy², in my personal experience (having once upon a time caught a hacker
in .ro, but it took six months of work to seal the deal with handcuffs).
--
Josh Sholes
On 3/12/14, 12:37 PM, Andrew D Kirch trel...@trelane.net wrote:
Hi,
I found that finding them on IRC, or wherever it is
On Wed, Mar 12, 2014 at 04:16:13PM +, Warren Bailey wrote:
I heard cheese works really well for catching crackers.
That's racist.
Since when do crackers have a stated ethnicity? Isn¹t racism based on
race, and not flour content in a baked snack? LOL
We accept crackers of all types here.. Flour, rice, wheat, grain, etc.
On 3/12/14, 10:14 AM, Eugen Leitl eu...@leitl.org wrote:
On Wed, Mar 12, 2014 at 04:16:13PM +,
On Wed, Mar 12, 2014 at 1:21 PM, Warren Bailey
wbai...@satelliteintelligencegroup.com wrote:
Since when do crackers have a stated ethnicity? Isn¹t racism based on
race, and not flour content in a baked snack? LOL
http://en.wikipedia.org/wiki/Cracker_%28pejorative%29
--
William D. Herrin
Being caucasian myself, I am inherently aware of the terminology
“cracker. How a joke relating to catching crackers with “cheese” was
translated into a racial slur is completely beyond my comprehension. In my
country, we eat cheese with crackers .. So it would be safe to assume the
entirety of my
And if they were the intended application of the term, I would think that
“cheese” would not the the appropriate choice to catch them. However,
cheese and crackers would seem to be more a snack, which is at least how
I interpreted that original comment.
Perhaps I need to drink more…
Scott
There's an almost, I don't know the right word, jealous reaction to
someone asking for help like this sometimes where people speculate on
the legal success etc generally concluding failure.
There are many good reasons to try to track a criminal.
For one thing, often this is not their only
On Wed, Mar 12, 2014 at 2:01 PM, Warren Bailey
wbai...@satelliteintelligencegroup.com wrote:
Being caucasian myself, I am inherently aware of the terminology
cracker. How a joke relating to catching crackers with cheese was
translated into a racial slur is completely beyond my comprehension.
So like.. Nerds have a sense of humor all the sudden?? Did I miss a
slashdot post or something?
;)
(and I used nerd lovingly..)
On 3/12/14, 12:48 PM, William Herrin b...@herrin.us wrote:
On Wed, Mar 12, 2014 at 2:01 PM, Warren Bailey
wbai...@satelliteintelligencegroup.com wrote:
Being
On 3/12/14, 2:05 PM, Scott Morris s...@emanon.com wrote:
Perhaps I need to drink moreŠ
If you¹re on this list, that¹s practically a given regardless of
circumstances.
‹Josh
On Wed, Mar 12, 2014 at 3:50 PM, Warren Bailey
wbai...@satelliteintelligencegroup.com wrote:
So like.. Nerds have a sense of humor all the sudden?? Did I miss a
slashdot post or something?
Geeks, man. Geeks. Nerds have pocket protectors.
-Bill
--
William D. Herrin
I just thought it was Nerds didn't have social lives (not likely to be
drinking)
They fail the blood alcohol test on sign up to the list here.
Regards
Alexander
Alexander Neilson
Neilson Productions Ltd
alexan...@neilson.net.nz
021 329 681
On 13/03/2014, at 8:57 am, William Herrin
On Mar 11, 2014 3:09 AM, Dobbins, Roland rdobb...@arbor.net wrote:
On Mar 11, 2014, at 2:00 PM, Markus unive...@truemetal.org wrote:
Any advice?
Start with CERT-BUND, maybe?
That is the correct answer, if you want something less settle (and possibly
illegal), there were discussions on
On Tue, Mar 11, 2014 at 2:00 AM, Markus unive...@truemetal.org wrote:
Hi,
Your goal should be to keep together and preserve all the
evidence/documentation you have: make sure you have and can verify the
authenticity and chain of custody for all relevant materials that you say
evidence attacks
Hi,
I'm an ISP in Germany and a cracker (not a hacker :) ) has targeted a
customers of mine in the last days. The cracker was successful and
caused financial damage / was successful with data theft. I set a trap
and finally caught his real IP address - a Comcast user in the US (100%
not a
On Mar 11, 2014, at 2:00 PM, Markus unive...@truemetal.org wrote:
Any advice?
Start with CERT-BUND, maybe?
Although it's questionable whether or not it's possible to remotely absolutely
ascertain whether the attacking machine in question was being operated by
miscreants unbeknownst to its
42 matches
Mail list logo