[Full-Disclosure] Re: what's to come chapter 1.

From: gobbles@hush.com
Date: 09/18/02

From: gobbles@hush.com (gobbles@hush.com)
Date: Wed, 18 Sep 2002 10:07:10 -0700

Never said I did this. Hacking not illegal. Tresspass is.

then comment

>Hacking into other peoples networks is illegal and you will get
> caught
>sooner or later and go to jail.
>-----Original Message-----
>From: full-disclosure-admin@lists.netsys.com
>[mailto:full-disclosure-admin@lists.netsys.com] On Behalf Of
>Sent: Wednesday, September 18, 2002 11:11 AM
>To: R.A.P.E.-Traq@topica.com; zan@stargeek.com
>Cc: full-disclosure@lists.netsys.com
>Subject: [Full-Disclosure] Re: what's to come chapter 1.
>>another daily dose of zan, the previous mailing was the pro-lo
>>gue: this
>>is chapter 1: History and beyond.
>More ramble.
>> FUD abounded in the security industry, "i can break a
>>y network
>>in the world" was the call from dilluded sello
>>ts (to
>>congress). millionares were made out of whitehats, preying on
>>his fear
>>and gathering thier tools from the "scene"
>I can can't you? Network insecure not FUD - reality. Jealous
>that some
>cashed in? I am.
>> the whitehats have bred a new culture of hackers to b
>>live that
>>the real hack ethic is one of "information free
>>om" and
>>while yes this is true, this does not translate into "give us
>>our codez"
>Information should be free. Hacking is information. Hacking n
>>-Until The Crystal Cracked-
>> dot-boom; everything came crashing down, thoose eyeba
>Unless you sell-out dot-bomb effect nothing
>> the hackers began to wake up, look around themselves
>>nd see
>>the cesspool of greed, treachery and lies that surroun
>>ed them
>>and corrupted thier ideals, no longer would they be animals of
>look around themselves see missed boat-missed opportunity.
>>-Cheat death again-
>> d34dh1tl3r <-RIP
>Good riddance
>Get your free encrypted email at https://www.hushmail.com
>Full-Disclosure - We believe in it.
>Charter: http://lists.netsys.com/full-disclosure-charter.html

Get your free encrypted email at https://www.hushmail.com

Relevant Pages

  • Re: Network Exploitation Tools
    ... Computer Network Defence Ltd ... > ours RPT (Rapid Penetration Test) and we believe it does cover most ... > Ethical Hacking at the InfoSec Institute. ... > learn to write exploits and attack security infrastructure. ...
  • Pen Test vs. Health Check
    ... hacking not solving the underlying issue of an insecure network. ... I personally don't like the term ethical hacking when referring to a Pen ... course will make a security tester. ... IMHO a more efficient and thorough method to conduct a security test is the ...
  • Re: Tool to find hidden web proxy server
    ... you could likely find it by sniffing the network. ... > Ethical Hacking at the InfoSec Institute. ... Check out our Advanced Hacking course, ... > learn to write exploits and attack security infrastructure. ...
  • Re: WIFI---is it LEGAL to use an open signal?
    ... the first steps toward outlawing wireless network piggybacking, ... as hacking into wireless LANs. ... from a wireless network. ... is on owner to protect his network. ...
  • Hackers are here. Where are you???
    ... Hackers are on move stop them before they enter your network. ... hacking and its counter measures. ... One time Certification fee. ...