2011 October 10, 23:02:01 by pipedija
Hack Chart / Coordinate System Data
Pipedija duoda visą kontentą kaip ir randa - be jokių ten išankstinių ar dar belenkokių leidimų, nemokamai ir su teise belenkaip iškraipyti beigi platinti, kaip tik į galvą šaus. Ale gi bet jau, jei publikuojat originalų turinį išu čionais, tai bent linką į mumei įdėkit, nes jei gailėsit, tai žadinom jus palaikysim, nes mes tai visur linkus dedam!
Hack Chart / Coordinate System Data
Hacktivity 2010, the largest computer hackers’ conference in eastern Europe, kicked off Saturday, with some 1,000 participants expected to attend the two-day event, according to organisers.
The conference was to bring together officials and computer experts from Hungary and abroad in an informal setting, combining lectures and discussions on serious issues such as Internet security, with lighter fare and games.
Bruce Scheier, a world-renowned cyber security expert, opened the congress with a keynote speech.
Other well-known participants and lecturers included Alexander Kornbrust of Oracle, Robert Lipovsky form the ESET computer security company’s laboratory in Bratislava, and US hacker Mitch Altman, who was organising a hardware workshop.
Meanwhile, in the leisure zone, participants could test their ability to break into systems and take control of foreign computers in a variety of games, from “Hack the Vendor,” to “Capture the Flag.”
More information about the event is available on the following Internet site: http://hacktivity.hu/
In recent months there has been considerable discussion about the WikiLeaks phenomenon, and understandably so, given the volume and sensitivity of the documents the website has released. What this discussion has revealed, however, is that the media and government agencies believe there is a single protagonist to be concerned with—something of a James Bond villain, if you will—when in fact the protagonist is something altogether different: an informal network of revolutionary individuals bound by a shared ethic and culture.
According to conventional wisdom, the alleged protagonist is, of course, WikiLeaks founder Julian Assange, and the discussion of him has ranged from Raffi Khatchadourian’s June portrait in The New Yorker, which makes Assange sound like a master spy in a John le Carré novel, to Tunku Varadarajan’s epic ad hominem bloviation in The Daily Beast: “With his bloodless, sallow face, his lank hair drained of all color, his languorous, very un-Australian limbs, and his aura of blinding pallor that appears to admit no nuance, Assange looks every inch the amoral, uber-nerd villain.”
Some have called for putting Assange “out of business” (even if we must violate international law to do it), while others, ranging from Daniel Ellsberg to Assange himself, think he is (in Ellsberg’s words) “in some danger.” I don’t doubt that Assange is in danger, but even if he is put out of business by arrest, assassination or character impeachment with charges of sexual misconduct, it would not stanch the flow of secret documents into the public domain. To think otherwise is an error that reflects a colossal misunderstanding of the nature of WikiLeaks and the subculture from which it emerged.
WikiLeaks is not the one-off creation of a solitary genius; it is the product of decades of collaborative work by people engaged in applying computer hacking to political causes, in particular, to the principle that information-hoarding is evil—and, as Stewart Brand said in 1984, “Information wants to be free.” Today there is a broad spectrum of people engaged in this cause, so that were Assange to be eliminated today, WikiLeaks would doubtless continue, and even if WikiLeaks were somehow to be eliminated, new sites would emerge to replace it.
Let’s begin by considering whether it is possible to take WikiLeaks offline, as called for in the Washington Post by former Bush speechwriter Marc Thiessen, who added that “taking [Assange] off the streets is not enough; we must also recover the documents he unlawfully possesses and disable the system he has built to illegally disseminate classified information.”
Consider the demand that we “recover the documents.” Even the documents that have not been made public by WikiLeaks are widely distributed all over the Internet. WikiLeaks has released an encrypted 1.4 gigabyte file called “insurance.aes256.” If something happens to Assange, the password to the encrypted file will be released (presumably via a single Twitter tweet). What’s in the file? We don’t know, but at 1.4 gigabytes, it is nineteen times the size of the Afghan war log that was recently distributed to major newspapers. Legendary hacker Kevin Poulsen speculates that the file “is doubtless in the hands of thousands, if not tens of thousands, of netizens already.”
It’s also a bit difficult to “disable the system,” since WikiLeaks did not need to create a new network; the group simply relied on existing electronic communications networks (e.g., the Internet) and the fact that there are tens of thousands of like-minded people all over the world. Where did all those like-minded people come from? Are they all under the spell of Assange? To the contrary, they were active long before Assange sat down to hack his first computer.
It has long been an ethical principle of hackers that ideas and information are not to be hoarded but are to be shared.In 1984, when Assange turned 13, Steven Levy described this attitude in his book Hackers. After interviewing a number of hackers, he distilled a “hacker ethic,” which included, among others, the following two maxims: (1) all information should be free; (2) mistrust authority and promote decentralization.
These sentiments were poetically expressed by a hacker named The Mentor, in an essay titled “The Conscience of a Hacker.” It was written shortly after his arrest, and appeared in the important hacker publication Phrack in 1986.
We explore…and you call us criminals. We seek after knowledge…and you call us criminals. We exist without skin color, without nationality, without religious bias…and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it’s for our own good, yet we’re the criminals. Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can’t stop us all.
National Hack The Government Day
Programer’s Day is 256th day of the year. 256 - the number obtained by the 2 packs of 8-th degree. This number of values can be made in one byte. A byte is a binary number consisting of 8 bits. Bit - the smallest unit of information content on the computer.
Hacker Space Vilnius
A foreign spy agency carried out the most serious “cyber attack” on the US military’s networks when a tainted flash drive was inserted into a laptop in the Middle East, according to a senior Pentagon official.
The USB stick contained a malicious code that spread undetected and was able to transfer data about American operational plans to foreign networks.
The news of Intel acquisition of McAfee signals a change in how leaders in the technology infrastructure space see the role of security. The security model is moving from the client (PC’s, laptop’s etc) to a network-based model, where virtual desktops and mobile clients are secured in the cloud.
Programsiai - elektroninio dienyno saugumo spragos
Video rodomos edienynas.vilnius.lt svetainės saugumo teisių perėmimo galimybes sistemoje.
Šiuo metu pasaulyje stipriai populiarėja nepriklausomi inovacijų centrai. Viena iš jų formų - fizinėje erdvėje įsikūrusi bendruomenė „Hackerspace“.
„Hackerspace“ - dirbtuvių erdvė, nepriklausomas „techninės kūrybos“ klasteris. Čia dirbti ir savo projektų vystyti susirenka laisvi profesionalai ir mėgėjai. Į savo užsiėmimus jie žiūri kaip į malonumą. Jie sudaro bedruomenę, kuri ir valdo dirbtuves.
„Hackerspace“ savo nariams suteikia nevaržomą priėjimą prie visų organizacijos turimų techninių ir informacinių išteklių: tai gali būti specialūs kompiuteriai, įvairūs elektroniniai prietaisai, praktinė literatūra arba asmeninės konsultacijos.
„Hackerspace“ erdvėse jos bendruomenė renkasi įgyvendinti projektus, siekti naujų žinių ir realizuoti idėjas, kurios tradicinėse organizacijose nebūtų pripažįstamos.