Recent Entries in Hacking

A computer hacker who allowed himself to be publicly identified only as ''Mudhen'' once boasted at a Las Vegas conference that he could disable a Chinese satellite with nothing but his laptop computer and a cellphone.

The others took him at his word, because Mudhen worked at the Puzzle Palace -- the nickname of the U.S. National Security Agency facility at Fort Meade, Md., which houses the world's most powerful and sophisticated electronic eavesdropping and anti-terrorism systems.

It was these systems, plus an army of cryptographers, chaos theorists, mathematicians and computer scientists, that may have pulled in the first piece of evidence that led Canadian authorities to arrest an Ottawa man on terrorism charges last week.

A group of original pirate radio DJs are to celebrate the 40th anniversary of offshore pirate radio by broadcasting live from a ship once more.

Pirate BBC Essex will start transmitting off the Essex coast from the lightship LV18 on Saturday, 40 years after pirate station Radio Caroline first took to the airwaves.

A Chinese man jailed for hacking into cable television and broadcasting footage of the banned Falun Gong spiritual movement has died in prison, according to the group's website. The group said that Liu Chengjun had suffered "cruel torture" and that eyewitnesses described blood stains all over his body. Liu was serving 19 years in prison in the northern province of Jilin for his part in the 2002 protest. He was one of 15 Falun Gong members who illegally broadcast around 40 minutes of pro-Falun Gong material on a cable TV station in Changchun, capital of Jilin. The Falun Gong website said that he died on 26 December in a civilian hospital. It said that his body had been cremated on the same day without an autopsy.

The Hong Kong-based Information Centre for Human Rights and Democracy said in a statement that Liu had been severely beaten after his detention in March 2002, and had also been ill. Falun Gong was banned by the Chinese government in 1999, after thousands of the group's followers demonstrated in Beijing demanding recognition for their faith. Their beliefs blend the ideas of the founder, Li Hongzhi, with traditional Chinese exercises and the Taoist and Buddhist faiths. Li Hongzhi is wanted by the Chinese authorities, but is currently living in the United States.

Famed hacker and master social engineer Kevin Mitnick has been commissioned to write a new book following the success of his first text The Art of Deception. The new book, tentatively titled The Art of Intrusion will tell the stories of real hacks, with the names of attackers obscured to protect them from the authorities and their victims. Mitnick has called on retired hackers to come forward with their stories, offering a $500 (�283) prize for the best story that makes it into the book, and a $200 payment for all stories that make the final draft. "I'm going to tell the true stories of some of the untold most salacious hacks in cyberspace. The sexy, the ingenious, the innovative and the clever," he told ZDNet Australia by phone from the US "The stories are not going to be the same attack vector or the same class of vulnerability. I'm looking for stories that will include a variety of attack methods exploiting physical, operational, network host, and personnel security vulnerabilities."

Conceding his notoriety is at least in part responsible for his "reversal of fortune" -- he claimed he was worried that the initial conditions of his release would make it difficult for him to find a job -- Mitnick says his well-known name is useful in getting his foot in the door. "My demand in the speaking arena -- my name value or my branding -- is really a product of the sensationalism that was attached to the 'Kevin Mitnick' case... if that never happened I might be a fantastic author, a fantastic consultant, and a world renowned security professional, but by name I might not be known," Mitnick argued. "I do attribute the trials and tribulations that I experienced in the past to why my name is so well known, and... this notoriety -- it does drive some business.",39020330,39118685,00.htm

In North Korea's mountainous Hyungsan region, a military academy specializing in electronic warfare has been churning out 100 cybersoldiers every year for nearly two decades.

Graduates of the elite hacking program at Mirim College are skilled in everything from writing computer viruses to penetrating network defenses and programming weapon guidance systems.,1283,59043,00.html

  Korn meets KoRn

Always satisfying when Punk and Programming come together.


The states of Massachusetts and Texas are preparing to consider bills that apparently are intended to extend the national Digital Millennium Copyright Act. (TX bill; MA bill) The bills are obviously related to each other somehow, since they are textually similar.

Here is one example of the far-reaching harmful effects of these bills. Both bills would flatly ban the possession, sale, or use of technologies that "conceal from a communication service provider ... the existence or place of origin or destination of any communication". Your ISP is a communication service provider, so anything that concealed the origin or destination of any communication from your ISP would be illegal -- with no exceptions.

If you send or receive your email via an encrypted connection, you're in violation, because the "To" and "From" lines of the emails are concealed from your ISP by encryption. (The encryption conceals the destinations of outgoing messages, and the sources of incoming messages.)

Worse yet, Network Address Translation (NAT), a technology widely used for enterprise security, operates by translating the "from" and "to" fields of Internet packets, thereby concealing the source or destination of each packet, and hence violating these bills. Most security "firewalls" use NAT, so if you use a firewall, you're in violation.

If you have a home DSL router, or if you use the "Internet Connection Sharing" feature of your favorite operating system product, you're in violation because these connection sharing technologies use NAT. Most operating system products (including every version of Windows introduced in the last five years, and virtually all versions of Linux) would also apparently be banned, because they support connection sharing via NAT.

And this is just one example of the problems with these bills. Yikes.

Once again, hackers are taking the blame for a denial of service attack which almost anyone with the desire and decent net connectivity could have accomplished.

The difference in this case is that hackers are being drawn into the military conflict between the United States and Iraq. The site in question belongs to Al-Jazeera, an Arabic news organization based in Qatar. And according to this Washington Post story, "many Americans" were angered by that network's rebroadcast of Iraqi television's video of captured and killed American soldiers. By making the leap that hackers were responsible for the massive attack which started Tuesday morning, hackers are mistakenly viewed as some kind of cybersoldier dedicated to carrying out American military policy.

Pssst! Hey, buddy, wanna look at the latest, greatest Internet porn for free? Pictures, videos, erotic stories and live sex chats . it.s all yours for nothing.

This is a pretty good article, despite the timeliness of it (1999).

OSLO.Norwegian teenager Jon Lech Johansen pleaded innocent yesterday to breaking data security laws in the first day of a widely watched trial over a program that unlocks the security codes of DVDs.

Johansen was 15 when he wrote and distributed for free on the Internet a program that unlocks copy-protected DVDs, giving Hollywood nightmares and making him a folk hero among hackers.

Johansen, now 19, expressed confidence heading into the trial, saying "We are right" and that most people believe that, except "the economic crime police and the film industry."

If you run a warehouse, you can spot pilfering by the number of empty boxes, or perhaps by noticing that employees are walking out with TV sets on their way home. But how do you spot abuse when yours is a knowledge warehouse? Brian Martin explores the controversial subject of electronically monitoring employee behavior.

Each day a significant portion of our working society spends the day trapped in a cubicle or office. They toil away over corporate owned computers trying to further the goals of their employers. Whether they work in a startup or corporate environment, employees are working up to sixteen hours a day on their computer, while their breaks and lunches often get melded into work time. As a result, breaks are spent checking personal e-mail, stock prices, online news, comic strips, and more. As a general rule, companies do not mind a little casual Internet usage that is not work-related, provided it does not violate company rules or interfere with assigned duties.

But what happens when an employee abuses the privilege or begins to consume too much work time using the Internet for personal reasons -- spending weeks looking for (or even performing) another job, or lost among MUDs and MOOs, or posting or viewing questionable material on the Web, such as hate speech or pornography? Some managers feel that employee monitoring displays a lack of trust and is not 'nice.' What they must consider is that while it is not friendly, neither is being patted down before concerts or searched at airports. Yet we tolerate these things in order to enjoy a safer atmosphere that benefits everyone in the long run.

JERUSALEM (AP) -- Israeli police, aided by the FBI, arrested an Israeli suspected of hacking into computers of a U.S.-based electronics company and stealing personal information, including the credit card numbers of some 80,000 customers, according to court document released Sunday.

Turn off all ActiveX support (download & scripting) in your browser on the Internet security zone and see if it fundamentally degrades your Internet experience.

Check out this page for a handy doc on Exploring and Exploiting Code Download.

Nearly seven months after the European Parliament adopted a report that recognised the existence of Echelon, an international spy system designed to listen in on private and commercial communications, experts say that little has been accomplished towards dealing with the issue.

Privacy experts would like to see limits placed on systems like Echelon, or at least for such spy networks to be made accountable -- a need which has only been strengthened by the terrorist attacks of 11 September and the advent of the international "war on terror". But taking action is made difficult partly by the public's acclimatisation to a world where everyone, including the government, can be assumed to be listening in, say observers.

Palo Alto, Calif. . If you ever used Yahoo! mail to ask a potential employer to "evaluate" your resum�, you might have been judged as having a grasp of the English language that is insufficient for the job.

Yahoo! Inc. confirmed on Wednesday that its e-mail software has automatically changed certain words . including evaluate . in a bid to prevent hackers from spreading viruses.

  PowerLabs RailGun Project

Ever wanted to make a Railgun? "The primary objective of this project is to successfully design and construct a linear electromagnetic accelerator which will utilize a high magnitude electrical impulse to propel a metallic armature down two parallel conducting rails utilizing the Lorenz Force resulting from the pulse."

A friend sent me this link. Apparently it's useful for those who wish to build railguns or something: "There are any number of reasons you might want to do this, foremost being that you don't want to pay for them. This page describes how to dismantle what seem to be the two most common disposable cameras: the Kodak Max and the Fujifilm."

  Microsoft's Hacker Heaven

Smarty-pants Bill Gates has a new security problem on his hands. A new flaw was discovered in Microsoft Internet Explorer, which could give nimble-of-finger hackers access to personal computers.

About Me

About the Blogger

I suppose if you've been reading my site for any length of time, you're probably curious to know who I am, and why I think people will read my blog. Online, I'm known as Zuckervati, mostly because it's easy...
» More ...

Mailing List Signup

What? There's a mailing list?

Sign up for the Mailing List

Follow Me on Twitter

Recent Entries

Tag Cloud

politik / film / video / skeptic / cewl / techno / humour / haxors / nosh / can-con / gaming / religion / weird / sex / funny / eco / music / stupid / photos / cocktails / George Bush / blogosphere / flickr / travel / evolution / politics / creationism / creationist / mobile / awful / photography / Star Wars / awesome / geek / bartending / coffee / drinking / mixology / alcohol / liquor / bartender / cocktail recipe / cats / food / Savoy Cocktail Book / science / Lovecraft / books / parody / Cthulhu / articles / TV / pets / John McCain / Movable Type / promos / cartoons / sci-fi / Canada / Radio Zuckervati / cool / Roger Ebert / system / atheism / comics / reviews / technology / writing / zombies / anime / anonymous / MMO / Star Trek / television / Alinea / animation / Batman / Futurama / Halloween / horror

Twitter Stream

D H McKee's bookshelf: to-read

Sunset and Sawdust
tagged: to-read
The Thicket
tagged: to-read
tagged: to-read