[Full-Disclosure] Re: what's to come chapter 1.

From: gobbles@hush.com
Date: 09/18/02


From: gobbles@hush.com (gobbles@hush.com)
Date: Wed, 18 Sep 2002 10:07:10 -0700

Never said I did this. Hacking not illegal. Tresspass is.

comprehend
then comment

>Hacking into other peoples networks is illegal and you will get
> caught
>sooner or later and go to jail.
>
>
>-----Original Message-----
>From: full-disclosure-admin@lists.netsys.com
>[mailto:full-disclosure-admin@lists.netsys.com] On Behalf Of
>gobbles@hush.com
>Sent: Wednesday, September 18, 2002 11:11 AM
>To: R.A.P.E.-Traq@topica.com; zan@stargeek.com
>Cc: full-disclosure@lists.netsys.com
>Subject: [Full-Disclosure] Re: what's to come chapter 1.
>
>
>>another daily dose of zan, the previous mailing was the pro-lo
>u
>>gue: this
>>is chapter 1: History and beyond.
>
>More ramble.
>
>> FUD abounded in the security industry, "i can break a
>n
>>y network
>>in the world" was the call from dilluded sello
>u
>>ts (to
>>congress). millionares were made out of whitehats, preying on
>t
>>his fear
>>and gathering thier tools from the "scene"
>
>I can can't you? Network insecure not FUD - reality. Jealous
>that some
>cashed in? I am.
>
>> the whitehats have bred a new culture of hackers to b
>e
>>live that
>>the real hack ethic is one of "information free
>d
>>om" and
>>while yes this is true, this does not translate into "give us
>y
>>our codez"
>
>Information should be free. Hacking is information. Hacking n
>ot
>illegal.
>
>>-Until The Crystal Cracked-
>> dot-boom; everything came crashing down, thoose eyeba
>l
>>ls
>
>Unless you sell-out dot-bomb effect nothing
>
>> the hackers began to wake up, look around themselves
>a
>>nd see
>>the cesspool of greed, treachery and lies that surroun
>d
>>ed them
>>and corrupted thier ideals, no longer would they be animals of
>
>>pack.
>
>look around themselves see missed boat-missed opportunity.
>
>>-Cheat death again-
>> d34dh1tl3r <-RIP
>
>Good riddance
>
>
>
>
>
>Get your free encrypted email at https://www.hushmail.com
>_______________________________________________
>Full-Disclosure - We believe in it.
>Charter: http://lists.netsys.com/full-disclosure-charter.html
>
>

Get your free encrypted email at https://www.hushmail.com



Relevant Pages

  • Re: Network Exploitation Tools
    ... Computer Network Defence Ltd ... > ours RPT (Rapid Penetration Test) and we believe it does cover most ... > Ethical Hacking at the InfoSec Institute. ... > learn to write exploits and attack security infrastructure. ...
    (Pen-Test)
  • Pen Test vs. Health Check
    ... hacking not solving the underlying issue of an insecure network. ... I personally don't like the term ethical hacking when referring to a Pen ... course will make a security tester. ... IMHO a more efficient and thorough method to conduct a security test is the ...
    (Pen-Test)
  • Re: Tool to find hidden web proxy server
    ... you could likely find it by sniffing the network. ... > Ethical Hacking at the InfoSec Institute. ... Check out our Advanced Hacking course, ... > learn to write exploits and attack security infrastructure. ...
    (Pen-Test)
  • Hackers are here. Where are you???
    ... Hackers are on move stop them before they enter your network. ... hacking and its counter measures. ... One time Certification fee. ...
    (rec.arts.tv)
  • Hackers are here. Where are you???
    ... Hackers are on move stop them before they enter your network. ... hacking and its counter measures. ... One time Certification fee. ...
    (comp.sys.apple2)