It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by MarkofCain
reply to post by Beast Of Gevaudan
you can kiss your internet goodbye if hackers didn't do their jobs.
i can't believe ppl who would call hackers a nuisance yet know nothing about the word itself
There is a community, a shared culture, of expert programmers and networking wizards that traces its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture originated the term ‘hacker’. Hackers built the Internet. Hackers made the Unix operating system what it is today. Hackers run Usenet. Hackers make the World Wide Web work. If you are part of this culture, if you have contributed to it and other people in it know who you are and call you a hacker, you're a hacker.
The hacker mind-set is not confined to this software-hacker culture. There are people who apply the hacker attitude to other things, like electronics or music — actually, you can find it at the highest levels of any science or art. Software hackers recognize these kindred spirits elsewhere and may call them ‘hackers’ too — and some claim that the hacker nature is really independent of the particular medium the hacker works in. But in the rest of this document we will focus on the skills and attitudes of software hackers, and the traditions of the shared culture that originated the term ‘hacker’.
There is another group of people who loudly call themselves hackers, but aren't. These are people (mainly adolescent males) who get a kick out of breaking into computers and phreaking the phone system. Real hackers call these people ‘crackers’ and want nothing to do with them. Real hackers mostly think crackers are lazy, irresponsible, and not very bright, and object that being able to break security doesn't make you a hacker any more than being able to hotwire cars makes you an automotive engineer. Unfortunately, many journalists and writers have been fooled into using the word ‘hacker’ to describe crackers; this irritates real hackers no end.
The basic difference is this: hackers build things, crackers break them.
The media has always latched on to stories of so-called `hackers' breaking into computer systems and wreaking havoc. This article is a sincere attempt to set the record straight as far as the terminology and process of `hacking' is concerned.
The hacker culture as it is known, actually started way back in the 1950's when computers were huge and bulky, and programming them meant connecting wires to electrodes. Although they didn't call themselves hackers then, that pretty much explains what a hacker is.
user12 auth.np.ac.playstation.net
user2 ya the displayed version u see via banner is not the real version
user12 unless they updated it in the last couple weeks
user12 I doubt that since its not trivial to change that
user12 its a bit more invasive than just setting it to Prod like they do on their other servers
user11 you know, watching this conversation makes me think about whether it was a good idea after all to buy a couple of games from psn using a visa card
user2 its just backported security patches
user11 i did remove all my info after downloading the games though
user12 that is just psn not the store
user12 they are running linux 2.6.9-2.6.24 on that box too
Now Dropbox's management is accused of trying to kill an intriguing open source project that turns the cloud storage service into a file sharing network.
Dropship makes use of an interesting feature of Dropbox uncovered by a hacker last month. Rather than waste storage space and bandwidth duplicating the same file uploaded by many users (for example, a popular PDF such as a tax form), the Dropbox server simply places a single copy in a public pool on the server and links to it from each Dropbox account--even if the file has a different name. All this is done invisibly, and for each user it appears as if the file is contained in their own personal Dropbox (even if it's stored in a private rather than public folder).
The system uses checksum hashes--a long series of hexadecimal characters--to identify the duplicated file. Hackers discovered that, by supplying the hash at the right moment during a phony file upload, they can magically make the duplicated file in question appear in their Dropbox folder.
In other words, files can be instantly shared between Dropbox cloud storage without the need to either download and upload them first.
Originally posted by thatonedude
reply to post by Beast Of Gevaudan
Before the anon debacle the majority of sony consumers were unaware of any possible breach.Sony kept things quiet and as long as the games are up no one cares.They lied to us demanding we put sensitive info over an un secure network knowing it was.It could be said anon helped expose this and that is a good thing.I liked sony and still do but they put US the consumer at risk to get back on top.This I can not overlook.
Police in Latin America and Europe have arrested 25 suspected members of the Anonymous hacking group, according to Interpol.
The authorities in Argentina, Chile, Colombia and Spain carried out the arrests and seized 250 items of IT equipment and mobile phones, Interpol says.
Those arrested are aged between 17 and 40.
www.bbc.co.uk...