From: “David Downey” <digital_matrix@hotmail.com>
To: alan@ctrl-alt-del.com
Message Hash: 65c238ea164af4652299e4d543a9b31eadb00992fff0021ce411778c6162ab92
Message ID: <199706190656.XAA27541@f34.hotmail.com>
Reply To: N/A
UTC Datetime: 1997-06-19 07:15:11 UTC
Raw Date: Thu, 19 Jun 1997 15:15:11 +0800
From: "David Downey" <digital_matrix@hotmail.com>
Date: Thu, 19 Jun 1997 15:15:11 +0800
To: alan@ctrl-alt-del.com
Subject: Re: INFORMATION
Message-ID: <199706190656.XAA27541@f34.hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain
----Original Message Follows----
>From owner-cypherpunks@cyberpass.net Wed Jun 18 23:17:57 1997
Received: (from majordom@localhost) by sirius.infonex.com (8.8.5/8.7.3)
id WAA08563 for cypherpunks-outgoing; Wed, 18 Jun 1997 22:25:11 -0700
(PDT)
Received: (from cpunks@localhost) by sirius.infonex.com (8.8.5/8.7.3) id
WAA08541 for cypherpunks@infonex.com; Wed, 18 Jun 1997 22:25:04 -0700
(PDT)
Received: from rigel.cyberpass.net (root@rigel.infonex.com
[206.170.114.3]) by sirius.infonex.com (8.8.5/8.7.3) with ESMTP id
WAA08529 for <cpunks@sirius.infonex.com>; Wed, 18 Jun 1997 22:24:58
-0700 (PDT)
Received: from toad.com (toad.com [140.174.2.1]) by rigel.cyberpass.net
(8.8.5/8.7.3) with ESMTP id WAA29918 for <cypherpunks@cyberpass.net>;
Wed, 18 Jun 1997 22:23:23 -0700 (PDT)
Received: (from majordom@localhost) by toad.com (8.7.5/8.7.3) id
VAA09031 for cypherpunks-unedited-outgoing; Wed, 18 Jun 1997 21:30:18
-0700 (PDT)
Received: from kim.teleport.com (kim.teleport.com [192.108.254.26]) by
toad.com (8.7.5/8.7.3) with ESMTP id VAA09026 for
<cypherpunks@toad.com>; Wed, 18 Jun 1997 21:30:14 -0700 (PDT)
Received: from kluge (ip-pdx38-11.teleport.com [204.202.160.13]) by
kim.teleport.com (8.8.5/8.7.3) with SMTP id WAA07841; Wed, 18 Jun 1997
22:17:29 -0700 (PDT)
Message-Id: <3.0.2.32.19970618221325.01cf2b00@mail.teleport.com>
X-Sender: alano@mail.teleport.com
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.2 b4 (32)
Date: Wed, 18 Jun 1997 22:13:25 -0700
To: twinsvideo@infosel.net.mx
From: Alan Olsen <alan@ctrl-alt-del.com>
Subject: Re: INFORMATION
Cc: cypherpunks@toad.com
In-Reply-To: <Chameleon.970618185549.twinsvideo@infosel.infosel.net.mx>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: owner-cypherpunks@cyberpass.net
Precedence: bulk
Reply-To: Alan Olsen <alan@ctrl-alt-del.com>
X-List: cypherpunks@cyberpass.net
X-Loop: cypherpunks@cyberpass.net
At 06:46 PM 6/18/97 PDT, twinsvideo@infosel.net.mx wrote:
>
>donn't think that i'm lame or somthin' but i realy need information on
how
to hack so, could you please tell me how to hack
>and what do i need in order to hack.
I suggest really strong turkish cigarettes. Smoke them constantly and
soon
you will be hacking before you know it.
>don't worry i won't get into trouble.
Depends on the age of tobacco purchace in your state. You might have to
get into High School before trying the above method.
>please hurry it's urgent.
That is what they all say...
===================================================================
Hacking is something that you learn on your own. While there are a few
folks that will show you the ropes, you have to learn on your own.
Knowledge is precious, and even more so when you gain it through your
own bllod sweat and tears. I hope you really mean hacking, and NOT
cracking. There are many of us in the hacking community that are ticked
off because the media and the government have lumped us hackers in with
the Crackers. Crackers are folks that enter systems for no other reason
that malicous damage of systems and vital infromation. These folks are
usually punk kids out to romp around Cyberspace doing damage for kicks.
There are professional crackers but are usually hired by governments and
major corporations for either "NAtional Security" reasons or plain old
Corporate espianage. Hackers on the other hand, are folks that believe
in the free exchange and flow of information, and yearn for knowledge.
While they occationally do break into systems, it is usually only for
the challenge of doing so and NOT with the intent of causing damage.
Most hackers that enter systems, will usually clean up after themselves
after merely looking around the system for awhile just to see what is
there with no intent to cause harm, only making modifications to logs
and passwd files to clear traces of their entry. They NEVER damage files
intentionally and that is a MAJOR no no with most folks in the real
hacking community. Some hackers even go so far as to tell they System
Administrators of the systems they enter that they did so, and how they
did it so the Admins may plug the holes. Unfortunately, the government
and the media have placed us within the same catagories as the
Darksiders. I, for one, do hope you are a hacker and not trying to
become a cracker.
---------------------------------------------------------
Get Your *Web-Based* Free Email at http://www.hotmail.com
---------------------------------------------------------
Return to June 1997
Return to ““David Downey” <digital_matrix@hotmail.com>”
1997-06-19 (Thu, 19 Jun 1997 15:15:11 +0800) - Re: INFORMATION - “David Downey” <digital_matrix@hotmail.com>