THE TOTAL INFORMATION TECHNOLOGY...

 

 
 

 

HOMESnapshotsGizmoTheHardEdgeTech TrendsWeb Words

Tips 'N TricksI-TriviaMind BogglersPrice Watch

 
 
 
 

 

 
latest news
 
Poachers encroach on tech-talent turf
Google-Microsoft spat underscores legal risks that make employee poaching a tricky business. Maybe that's why it's not on the rise.
Thu Jul 28 04:00:00 PDT 2005
Intel to borrow from laptops for server chips
New Xeon chip for blade servers, due out in 2006, derives from the chipmaker's Pentium M family.
Wed Jul 27 21:00:00 PDT 2005
Revelation of Cisco flaw stirs up a storm
Networking giant and ISS ask a court to silence the security expert who described how attackers could take over Cisco routers.
Wed Jul 27 16:55:00 PDT 2005
eBay seeks patent ruling from Supreme Court
Online auction house seeks relief from injunctions it says could hamstring the tech industry.
Wed Jul 27 13:23:00 PDT 2005
Video game pirate headed to slammer
Maryland man gets jail time for selling modified Xboxes that store and play pirated video games.
Wed Jul 27 16:49:00 PDT 2005
Ex-Microsoftie a million-dollar man
Last year Microsoft paid Kai-Fu Lee, recently hired by Google to run its operations in China, more than $1 million, according to a court filing.
Wed Jul 27 12:50:00 PDT 2005
Researchers becoming the problem?
Commentary--Oracle's Mary Ann Davidson says myths have grown up around the role of security researchers who seek out software flaws.
Wed Jul 27 12:43:00 PDT 2005
NASA grounds shuttle fleet
NASA halts future shuttle flights after a large chunk of insulating foam broke off Discovery's external fuel tank during launch.
Wed Jul 27 17:10:00 PDT 2005
The unity of Unix
Paul Murphy: Whether you prefer Linux, BSD, or Solaris is immaterial when the choice is Unix or Windows. If you work with Red Hat the enemy isn't Sun; and if you work with OS X, the enemy isn't Linux. For any Unix, the enemy is Microsoft.
Wed Jul 27 06:55:00 PDT 2005
Can iRobot clean up on Wall Street?
Maker of machines for "dull, dirty or dangerous" jobs is hoping those capable bots can help it raise up to $115 million in an IPO.
Wed Jul 27 12:46:00 PDT 2005
Is municipal Wi-Fi a bad thing?
John Carroll: There are plenty of examples where well-meaning governments end up shackling citizens with choices made on their behalf. Fans of municipal Wi-Fi systems take note.
Qualcomm co-founder: No tax dollars for Wi-Fi
Cities hook up in broadband battles
Wed Jul 27 10:54:00 PDT 2005
Bill launched to overhaul broadband rules
Politicians say it's time to update the 1996 Telecommunications Act and other laws to deregulate broadband and wireless links.
Wed Jul 27 13:35:00 PDT 2005
Google hit with job discrimination lawsuit
Former sales executive alleges her career at the search company was derailed while she was pregnant with quadruplets.
Wed Jul 27 12:31:00 PDT 2005
Handheld market still tanking, study says
Shipments fell to 1.7 million units in the second quarter--a drop of more than 20 percent compared with last year, IDC says.
Wed Jul 27 08:36:00 PDT 2005
Siebel's software license sales drop
Company posts second-quarter net loss as license sales fall 17 percent due to delays in some government deals.
Wed Jul 27 08:47:00 PDT 2005
Insecurity at Black Hat
Security industry event to focus on exploiting holes in antivirus, database and device driver software to break into computers.
Wed Jul 27 04:00:00 PDT 2005
iDefense ups the bidding for bugs
One day after a rival announces it will pay for details on security bugs, iDefense says it will double its payouts.
Tue Jul 26 23:25:00 PDT 2005
XM, Napster in joint online music venture
New service will let subscribers bookmark tunes using new XM-compatible MP3 players and buy them online later.
Wed Jul 27 05:28:00 PDT 2005
Sun posts profit but will cut jobs
Earnings slip compared with last year, but the company beat expectations. "I thought the numbers were good," one analyst says.
Wed Jul 27 04:35:00 PDT 2005
Firefox downloaded 75 million times
The open-source Mozilla Foundation project expands staff and tricks out its mobile browser amid download milestones.
Tue Jul 26 18:17:00 PDT 2005
Is Gizmo Project a Skype-killer?
Russell Shaw: Skype may have the lead, concedes Gizmo's Michael Robertson, but how do the softphone rivals compare on calling rates, user interface and memory usage?
Five favorite Skype enhancers
Skype: A new, friendly communications monopoly?
Reader: 'Gizmo, much more open and more features'
Wed Jul 27 05:10:00 PDT 2005
AOL dials up Web search for mobile phones
New service will allow users to search for Web content, find local merchant information and do shopping comparisons.
Tue Jul 26 21:01:00 PDT 2005

 

 

 

 

 

 

 

 

articles & issues

TOPIC of the day: HACKING

 

Computer Hacking

Written by David M. Stone, University Laboratory High School, Urbana, IL


Introduction

Unlike most computer crime / misuse areas which are clear cut in terms of actions and legalities (e.g. softwarepiracy), computer hacking is more difficult to define. Computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software. The impact of computer hacking varies from simply being simply invasive and annoying to illegal. There is an aura of mystery that surrounds hacking,and a prestige that accompanies being part of a relatively "elite" group of individuals who possess technological savvy and are willing to take the risks required to become a true "hacker". An interesting alternative view of how hackers positively impact areas such as software development and hacker ideology is presented in Technology and Pleasure: Considering Hacking Constructive.

Even attempting to define the term "hacker" is difficult. Perhaps the premiere WWW resource in introducing individuals to hacking is the The New Hacker's Dictionary (http://www.logophilia.com/jargon/jargon_toc.html), a resource which encompasses everything from hacker slang, jargon, hacker folklore, writing style and speech to general appearance, dress, education and personality characteristics. According to TheNew Hacker's Dictionary, a hacker can be defined as:

  1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
  2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.
  3. A person capable of appreciating hack value.
  4. A person who is good at programming quickly.
  5. An expert at a particular program, or one who frequently does work using it or on it.
  6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example.
  7. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.
  8. [deprecated] A malicious meddler who tries to discover sensitive information by poking around. Hence 'password hacker', 'network hacker'. The correct term for this sense is cracker.

Even within hacker society, the definitions range from societally very positive (dare I say characteristic of gifted and talented individuals) to criminal. In his book, "Fighting Computer Crime: A New Framework for Protecting Information" (1998), Donn B. Parker lists two basic principles hacker live by:

  1. The belief that information sharing is a powerful good and that it is the ethical duty of hackers to share their expertise by writing free software and facilitating access to information and to computing resources whenever possible.
  2. The belief that system cracking for fun and exploitation is ethically OK as long as the cracker commits no theft, vandalism or breach of confidentiality.

Parker differentiates between benign and malicious hackers based on whether damage is performed, though in reality all hacking involves intrusion and a disregard for the efforts, works and property of others.


Issues

A number of issues arise in considering hacking from the educator perspective. First, we need to consider the fact that the public perception of hackers is mixed, and that "hacking" and "being considered a hacker" can be quite appealing to students who are going through developmental periods in which they are defining themselves, as well as challenging authority and rules. There is often a Robin Hood mentality to early actions, though it is unclear exactly who "the poor" are, and how they are "beingcompensated". Second, the anonymity of actions which hackers perform against others often enhances the severity of actions. For example, an adolescent who would never consider picking someone's pocket or physically damaging someone else's property or home, might be quite willing to steal people's credit card numbers or destroy poorly protected business or government files, since files and credit card numbers are not tangible entities, and the damage is done anonymously.

The media often presents these individuals in a glamorous light. Adolescents may fantasize about their degree of technological skills and, lacking the social skills required to be accepted well by others, move online in search of those who profess to have technological skills the students desire. A simple search using the term "hacker" with any search engine results in hundreds of links to illegal serial numbers, ways to downloadand pirate commercial software, etc. Showing this information off to others may result in the students being considered a "hacker" by their less technologically savvy friends, further reinforcing antisocial behavior. In some cases, individuals move on to programming and destruction of other individuals programs through the writing of computer viruses and Trojan horses, programs which include computer instructions to execute a hacker's attack. If individuals can successfully enter computers via a network, they may be able to impersonate an individual with high level security clearance access to files, modifying or deleting them or introducing computer viruses or Trojan horses. As hackers become more sophisticated,they may begin using sniffers to steal large amounts of confidential information, become involved in burglary of technical manuals, larceny or espionage.


Ways to Minimize Potential for Hacking

There are a number of ways for schools to minimize potential for hacking.

  1. Schools need to clearly establish acceptable use policies and delineate appropriate and inappropriate actions to both students and staff.
  2. Students and staff need to instructed regarding hacking, the mentality associated with it, the consequences of various hacking actions and possible consequences of interacting and forming online relationships with anonymous individuals who claim to be proficient in invading others' privacy.
  3. The use of filters may be considered in reducing access to unauthorized software serial numbers and hacking-related materials, newsgroups, chatrooms and hacking organizations.
  4. Teachers need to be aware of student activities in the computer labs and pay special attention to things they hear in terms of hacking behavior.

Many schools have taken intiative in having teachers work with technology-oriented students who exhibit many of the characteristics which may eventually lead to hacking-type behaviors. Recent web-based activities and competitions, including ThinkQuest, Web to the Edge and ExploraVision, are outstanding opportunities for these and other technologically oriented students to utilize their interests, energies and abilities in a postive way.


Annotated Web Sites

The New Hacker's Dictionary (http://www.logophilia.com/jargon/jargon_toc.html)
A resource which introduces the reader to everything from hacker slang, jargon, hacker folklore, writing style and speech style to general appearance, dress, education and personality characteristics. If you are going to examine a single resource regarding hacking, this should be it!

Technology and Pleasure: Considering Hacking Constructive (http://firstmonday.org/issues/issue4_2/gisle/)
Fascinating VERY ALTERNATIVE discussion of history of the hacker community and hacker ideology.

ConcerningHackers Who Break into Computer Systems (http://www-swiss.ai.mit.edu/6095/articles/denning_defense_hackers.txt)
Interesting discussion of hackers, hacker ethics and how hacking relates to issues and practices of an information society.

Active Matrix's Hideaway (http://www.hideaway.net/)
Written by a "true hacker", one who seeks knowledge rather than robbery and destruction, this alternative site presents a view of hacking as an art and science.

Hacking Documents (http://www.houghton.demon.co.uk/hacking/document/index.htm)
This is the source many use for initial ventures into hacking. It consists of 1) The Guide to Mostly Harmless Hacking, 2) Beginner's Documents, and 3) Other Various Documents. There is also a link called Hacking Archives. Quite user friendly, it becomes clear how kids could easily be lured into this site and its activities.

Defcon 7 (http://www.thecodex.com)
Voted one of the top hackers sites by PC Magazine (is it any wonder our kids have little difficulty finding these sites?), this site consists of hundreds of links which walk individuals step-by-step through the myriad of different hackers activities.

AstaLaVista H/C Search Engine(http://astalavista.box.sk)
Here's something new - a search engine designed for hackers. Includes links to all types of software, serial numbers, sniffers, etc.


What is a Hacker?

Brian Harvey
University of California, Berkeley

In one sense it's silly to argue about the ``true'' meaning of a word. A word means whatever people use it to mean. I am not the Academie Française; I can't force Newsweek to use the word ``hacker'' according to my official definition.

Still, understanding the etymological history of the word ``hacker'' may help in understanding the current social situation.

The concept of hacking entered the computer culture at the Massachusetts Institute of Technology in the 1960s. Popular opinion at MIT posited that there are two kinds of students, tools and hackers. A ``tool'' is someone who attends class regularly, is always to be found in the library when no class is meeting, and gets straight As. A ``hacker'' is the opposite: someone who never goes to class, who in fact sleeps all day, and who spends the night pursuing recreational activities rather than studying. There was thought to be no middle ground.

What does this have to do with computers? Originally, nothing. But there are standards for success as a hacker, just as grades form a standard for success as a tool. The true hacker can't just sit around all night; he must pursue some hobby with dedication and flair. It can be telephones, or railroads (model, real, or both), or science fiction fandom, or ham radio, or broadcast radio. It can be more than one of these. Or it can be computers. [In 1986, the word ``hacker'' is generally used among MIT students to refer not to computer hackers but to building hackers, people who explore roofs and tunnels where they're not supposed to be.]

A ``computer hacker,'' then, is someone who lives and breathes computers, who knows all about computers, who can get a computer to do anything. Equally important, though, is the hacker's attitude. Computer programming must be a hobby, something done for fun, not out of a sense of duty or for the money. (It's okay to make money, but that can't be the reason for hacking.)

A hacker is an aesthete.

There are specialties within computer hacking. An algorithm hacker knows all about the best algorithm for any problem. A system hacker knows about designing and maintaining operating systems. And a ``password hacker'' knows how to find out someone else's password. That's what Newsweek should be calling them.

Someone who sets out to crack the security of a system for financial gain is not a hacker at all. It's not that a hacker can't be a thief, but a hacker can't be a professional thief. A hacker must be fundamentally an amateur, even though hackers can get paid for their expertise. A password hacker whose primary interest is in learning how the system works doesn't therefore necessarily refrain from stealing information or services, but someone whose primary interest is in stealing isn't a hacker. It's a matter of emphasis.

Ethics and Aesthetics

Throughout most of the history of the human race, right and wrong were relatively easy concepts. Each person was born into a particular social role, in a particular society, and what to do in any situation was part of the traditional meaning of the role. This social destiny was backed up by the authority of church or state.

This simple view of ethics was destroyed about 200 years ago, most notably by Immanuel Kant (1724-1804). Kant is in many ways the inventor of the 20th Century. He rejected the ethical force of tradition, and created the modern idea of autonomy. Along with this radical idea, he introduced the centrality of rational thought as both the glory and the obligation of human beings. There is a paradox in Kant: Each person makes free, autonomous choices, unfettered by outside authority, and yet each person is compelled by the demands of rationality to accept Kant's ethical principle, the Categorical Imperative. This principle is based on the idea that what is ethical for an individual must be generalizable to everyone.

Modern cognitive psychology is based on Kant's ideas. Central to the functioning of the mind, most people now believe, is information processing and rational argument. Even emotions, for many psychologists, are a kind of theorem based on reasoning from data. Kohlberg's theory of moral development interprets moral weakness as cognitive weakness, the inability to understand sophisticated moral reasoning, rather than as a failure of will. Disputed questions of ethics, like abortion, are debated as if they were questions of fact, subject to rational proof.

Since Kant, many philosophers have refined his work, and many others have disagreed with it. For our purpose, understanding what a hacker is, we must consider one of the latter, Sören Kierkegaard (1813-1855). A Christian who hated the established churches, Kierkegaard accepted Kant's radical idea of personal autonomy. But he rejected Kant's conclusion that a rational person is necessarily compelled to follow ethical principles. In the book Either-Or he presents a dialogue between two people. One of them accepts Kant's ethical point of view. The other takes an aesthetic point of view: what's important in life is immediate experience.

The choice between the ethical and the aesthetic is not the choice between good and evil, it is the choice whether or not to choose in terms of good and evil. At the heart of the aesthetic way of life, as Kierkegaard characterises it, is the attempt to lose the self in the immediacy of present experience. The paradigm of aesthetic expression is the romantic lover who is immersed in his own passion. By contrast the paradigm of the ethical is marriage, a state of commitment and obligation through time, in which the present is bound by the past and to the future. Each of the two ways of life is informed by different concepts, incompatible attitudes, rival premises. [MacIntyre, p. 39]

Kierkegaard's point is that no rational argument can convince us to follow the ethical path. That decision is a radically free choice. He is not, himself, neutral about it; he wants us to choose the ethical. But he wants us to understand that we do have a real choice to make. The basis of his own choice, of course, was Christian faith. That's why he sees a need for religious conviction even in the post-Kantian world. But the ethical choice can also be based on a secular humanist faith.

A lesson on the history of philosophy may seem out of place in a position paper by a computer scientist about a pragmatic problem. But Kierkegaard, who lived a century before the electronic computer, gave us the most profound understanding of what a hacker is. A hacker is an aesthete.

The life of a true hacker is episodic, rather than planned. Hackers create ``hacks.'' A hack can be anything from a practical joke to a brilliant new computer program. (VisiCalc was a great hack. Its imitators are not hacks.) But whatever it is, a good hack must be aesthetically perfect. If it's a joke, it must be a complete one. If you decide to turn someone's dorm room upside-down, it's not enough to epoxy the furniture to the ceiling. You must also epoxy the pieces of paper to the desk.

Steven Levy, in the book Hackers, talks at length about what he calls the ``hacker ethic.'' This phrase is very misleading. What he has discovered is the Hacker Aesthetic, the standards for art criticism of hacks. For example, when Richard Stallman says that information should be given out freely, his opinion is not based on a notion of property as theft, which (right or wrong) would be an ethical position. His argument is that keeping information secret is inefficient; it leads to unaesthetic duplication of effort.

The original hackers at MIT-AI were mostly undergraduates, in their late teens or early twenties. The aesthetic viewpoint is quite appropriate to people of that age. An epic tale of passionate love between 20-year-olds can be very moving. A tale of passionate love between 40-year-olds is more likely to be comic. To embrace the aesthetic life is not to embrace evil; hackers need not be enemies of society. They are young and immature, and should be protected for their own sake as well as ours.

In practical terms, the problem of providing moral education to hackers is the same as the problem of moral education in general. Real people are not wholly ethical or wholly aesthetic; they shift from one viewpoint to another. (They may not recognize the shifts. That's why Levy says ``ethic'' when talking about an aesthetic.) Some tasks in moral education are to raise the self-awareness of the young, to encourage their developing ethical viewpoint, and to point out gently and lovingly the situations in which their aesthetic impulses work against their ethical standards.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 
 
     
Hosted by www.Geocities.ws

1