2008-03-04
Aim away message pranks
Hardware and Co - Free Community - Blog left It for the companies and for we common mortals ahhhh hour I have not understood to what you referred, eolo. All the customers record can publish messages and comments to you in this Blog. "If Gauss were alive today, he would be hacker" (Peter Sarnak). A common place exists, used above all from the average, for which the term hacker it comes associated the criminals informed to us (whose pi?ppropriata definition?er?racker). "Hack has only meant" - it supports Sour - "a That one extremely thin and deep of that it refuses ulterior explanations. It was implicit in the definition of "hack" the spirit of a creative and innocuous divertimento. ?a such spirit who s' inspired the gerundio of the term: "hacking". Of new, the modern equivalent in order to indicate the same ones attivit?otrebbe to be the derived oral shape from "goof" - "goofing" or "goofing off" (taking in turn someone, to amuse itself). Pi?vanti in years ' 50, the term "hack" acquist?na connotation pi?etta and rebel. To the MIT of 50 years ' vigeva an elevated level of competition and the attivit?i hacking emerged is like reaction is like extension of one such competitive culture. The meaning used from the same students was cos?he "tunnel hacking" divenne in order to indicate these incursions not authorized basements. In surface the telephone system of the campus offered analogous opportunit?Grazie to accidental experiments but it takes care of to you, the students learned to make amusing jokes. Drawing inspiration from the pi?radizionale "tunnel hacking", this new attivit?enne soon christened "phone hacking", in order then to become the odierno phreacking. The combination between creative divertimento and explorations without limits costituir?a base for the future mutations of the term hacking. A system constituted from a sophisticated assortment of rel? switches analogous to what he regulated the telephone system of the campus. Bruce Sterling author of the book Crackdown against hacker the new engineers responsible electrical workers for the construction and the maintenance of such system considered the spirit of similar attivit?nalogo to that one of the phone hacking. Adopting the term hacking, they began cos? to refine of ulteriorly the capacity. In thin way, the synonymous term hacking trasform?a of idle game, to a game in a position to improving the performances or the total efficiency of the railway system of the club. Famous like TX-0, it was be a matter of one of the first models of computers launch on the market. The immense one reame of the computer science programming would have carried to an ulterior etimologico change. It moreover meant to improve the efficiency and velocit?el the gi?sistente software that stretched to ingolfare the resources of the machine. Remaining faithful to its root, the term indicated also the realization of having programs the only scope to amuse or to entertain the customer. A classic example of this widening of the definition of hacker?pacewar, the first interactive video game. From the point of view of the software, per?rappresentava one incredible testimony of the innovations rendered possible from capacit?i the programming. Moreover it was completely free (and free). Towards the end of years ' 60, Spacewar divenne cos?l preferred pastime of how many worked to the mainframe in every part of the world. Instead the computers hacker they operated to the inside of a scientific discipline based on the collaboration and the open acknowledgment of the innovation. In second met?egli 70 years ' the term "hacker" had assumed the elite connotation. In general sense, computer hacker was anyone wrote the code software for the single taste to succeed to us. In specific sense, it indicated abilit?ella programming. To the par of the term "artist", the meant one contained of the tribali connotations. To define hacker a programmatore colleague constituted a sign of respect. Auto-descriversi as hacker it revealed an enormous personal confidence. In both cases, the genericit?niziale of the name computer hacker went diminishing of equal step to the greater spread of the computer. With the narrowing of the definition, attivit?i the computer hacking acquist?uove semantic connotations. In the book of the 1984 "Hackers", author Steven Levy, along research work and consultation, codific?ale ethics in five fundamental principles. Under many points of view, the principles list to you from Levy continue to define odierna the culture of the computer hacking. Nevertheless the image of one comunit?acker analogous to one medieval corporation?tata scalzata from the excessive populiste tendencies of the industry of the software. Thanks to this vicinity, the common programmatori took to take control the typical anarchical philosophies of the culture hacker of amble to you like that one of the MIT. However, in the course of a similar transfer of values and?erduto the originated to the MIT against every behavior malevolo, fraudulent tab?ulturale. Of other part, the creative sovversione of autorit?er the someone not?ltro that a problem of emergency for qualcun other. In the autumn the 2000 MIT Museum onor?uest' ancient tradition dedicating to the topic an appropriate extension, the Hall of Hacks. This comprised some going back photographies to years ' 20, included in which feint appears one car of the police. The plate of the machine was IHTFP, acronym from the various ones means and much diffusing to you to the MIT. However in 1990, the Museum resumed the same acronym like point of departure for one publication on the history of the hacking. Under the title it "Institute for Hacks Tomfoolery and Pranks" (Institute for jokes goliardate crowds and), the review offers adapting reassumed of those attivit?"L' action of hack differs from one common goliardata perch?ichiede careful planning, organization and fineness, beyond founding on one good dose of wit and inventiveness. The norm not written wants that every hack it is amusing, not destructive and it does not bring damage. Indeed, sometimes the same ones hacker help in the manufatti work of dismantling of the own ones ". Desire to confine the culture of the computer hacking to the inside of the same ethical borders appears deserving but impossible work. In spite of the great part of the hacking computer science it inhales the same spirit of elegance and semplicit?il same medium of the software offers an inferior level of reversibilit?Smontare one machine of simple the?pera police in comparison to the dismantling of an idea, above all when?rmai reached the hour for the affirmation of such idea. Once dark element of the student jargon, the word "hacker"?ivenuta one ball from billiards linguistica, subject to political pushes and shadings ethics. Perhaps?uesto the reason for which to cos?anti hacker and journalists it appeals to to make of use. Nobody pu?uttavia indovinare which sar?a next side that the ball trover? to hit. Wanting to specify all the several one ambles to you in which it comes used the term "hacker", can be evidenced these means to you:. Someone that succeeds to become part in a system or one net in order to help the owners to take conscience of an emergency problem. Also white sayings "hat hacker" or "sneacker". Many of these persons are employed in companies of computer science emergency and work in complete legalit?Gli the others fall back in the previous definition. Someone that, through the experience or for tried happened to you to you, modification an existing software in such way to render available one new function. Pi?he one competition, the exchange between various programmatori of modifications on relati to you the software?isto like a collaboration occasion. Often it comes used in order to indicate who uses exploit created from other programmatori and hacker. "h4x0r" (it pronounces "achs-or")?no script kiddie in a videoludico context, as an example someone that uses "cheat" (codes) in order to modify the conditions of the video game to its advantage. A "newbie" (niubbo)?na person to the first hostile armi.personaggi and organizations that pursue plans not properly deserving of plauso. Who makes hacking comes called Hacker. ?i?n' approval that derives from the outside rather than a name of which us fregia independently. The hacking to pu?ssere seen like a pure instrument and such, to second of who it uses it and of the reason for which it uses it, to pu?ssumere positive or negative valences. The who practical computer science intrusione simply copying the techniques found and developed from other persons taking advantage of exploit gi?ronti, comes called lamer. And unfortunately of lamer the net?iena, and always unfortunately many of they make LARGE cottages, believing of being deglo hacker. I would want also to remember some hacker famous that have made of the Net a place where to amuse itself. Ward Cunningham - ideatore of the concept of wiki Tsutomu Shimomura - opposing of famous cracker the Kevin Mitnick, than riusc? to make to arrest Richard Stallman - programmatore (author, between the others, of Emacs and GCC), ideatore of the concept of free Software and copyleft Ken Thompson and Dennis Ritchie - authors of the operating system Unix Linus Torvalds - author of the Kernel Linux Larry Wall - author of the Perl Steve Wozniak - cofondatore of Apple Computer Jamie Zawinski - less famous Netscape Navigator, not useful and silently active XEmacs and Mozilla and, but for this. That he does not love the emoticons, and in fact this along text of?rivo. All the necessary members software to the computers do not armor to you are in commerce. Here what?a to expect there with the arrival of Seen Windows. Rome - In order to take advantage of the funzionalit?fferte from the Fritz Chip (TPM), or those offering from the architecture LaGrande di Intel?ecessario of the software. Pi?n detail, the following elements are necessary: - the driver necessary in order to pilot the Fritz Chip and the rest of the architecture of Trusted Computing. - a kernel in a position to starting the applications that use funzionalit?el the Trusted Computing and to manage them. - the applications in a position to taking advantage of the architecture Trusted Computing. Of all this with of members software, all are not available: - some producers of BIOS have gi?esso in production of the compatible products with the Trusted Computing (, pi?sattamente compatible with the single Fritz Chip). - they are available, near the relati to you producers, the driver for the Fritz Chip.12) are gi?nclusi of default the driver for the Fritz Chip Atmel, IBM and Infineon). This?estinata situation to change radically in 2008, with the arrival on the market of Microsoft NGSCB (Next-Generation Secure Computing Base). NGSCB?' architecture software necessary in order to pilot the below architecture hardware "LaGrande" of Intel (and, presumablly, also "Garrison" of AMD). To how much it seems, NGSCB arriver?ul market like member of the Service Pack 2 of Seen Windows, previewed exactly for 2008. NGSCB?n plan much ambitious, started from Microsoft and Intel in the 1999, and orginariamente famous one like Palladium. Microsoft has justified the change of name having made appeal to a presumed conflict of trademark with an other company but practically nobody?isposto to believe to this version. The following NGSCB?omposto of elements: Driver: the driver necessary in order to pilot the Fritz Chip and the rest of the architecture of Trusted Computing. Nexus: a kernel of emergency for Windows Seen in a position to interacting with a BIOS Trusted Computing and the Fritz Chip. The Nexus is taken care of the launch and the management of the applications Trusted Computing (cio?egli NCA) NCA: Nexus Computing Agents, cio?e applications that take advantage of funzionalit?el the Trusted Computing. Pu?rattarsi of programs applied to you, like MS Word, or of members of the operating system, like the driver of the masterizzatore. The funzionalit?fferte from NGSCB and LaGrande they are much pi?mpie of those supplied from the single Fritz Chip. NGSCB makes very of devout? a lot worse than how much can make the single Fritz Chip. Nobody, to outside of Microsoft and Intel, potr?sare in order to create a compatible operating system with the future Seen Windows 2008. Nearly all funzionalit?i the NGSCB serve simply in order to render to the software funzionalit?ella below the LaGrande platform accessible. Consequently, there?na wide superimposition between the funzionalit?ese available from NGSCB and those yields available from LaGrande. The funzionalit?i?mportanti of this system to hardware/software are following: Protected Execution (supplied from Intel LaGrande, does not give the Fritz Chip). This funzionalit?ermette to execute a program with the guarantee that no other program can interfere with its operation. Curtained Memory (supplied from Intel LaGrande, does not give the Fritz Chip). This funzionalit?rotegge the data of a program in memory (in RAM) so that no other program can read them, copy or modify. Protected Input/Output (supplied from Intel LaGrande, does not give the Fritz Chip):. This funzionalit?iene seen from many observatories like a powerful instrument anticopy (DRM). Sealed Storage (Supplied from the Fritz Chip):. Many observatories consider it as an other funzionalit?tile nearly only to systems DRM. - coding and decifratura "to the flight" of documents and data traffics (communication channels). - digital document company them, digital messages and other objects them. Verification of the companies in order to establish that the message is intact and comes really from the declared sender. - certification of integrit?elle the configurations hardware and software of the PC (Attestation). - sure memorization of the keys of figure to the inside of the Fritz Chip. Attestation (Supplied from the Fritz Chip):. Curious, for the local customer (we), to carry out the same verifications to pu?ssere very pi?ifficile, or even impossible, without one appropriate smart card external. This funzionalit?iene seen from many observatories like one heavy violation of the privacy. Against this funzionalit?i they concentrate from always the critics pi?eroci to the Trusted Computing. Seth Schoen, of EFF, has proposed one solution to this called problem "Owner Override". This?tata solution ready refused from the interested ones, for voice of David Safford of IBM. Protected Launch (supplied from the BIOS and the Fritz Chip entirety):. This allows to prevent the starter of the system with driver, cards and/or arranges operated to you modified so as to to scavalcare one or pi?elle funzionalit?el Trusted Computing. Between funzionalit?i the NGSCB that do not derive directly from those of LaGrande they could it are to us the protection and management whitelist/blacklist anticopy of the operating system. Recently Microsoft has announced that on Seen Windows permetter?oltanto the use of driver certifys to you. Between these disliked programs they could it are to us many concurrent scomodi, like OpenOffice and Linux. The documentation of Intel LaGrande makes explicit reference to lists of programs and "reliable" thought members hardware. Some day it makes we have had way to visionare give one version close beta of Windows Explorer 7. What?.implementazione in the browser has hit us mainly of some funzionalit?ssenti in the previous version: on the Favorities Center, to right, the push-button Rss 2,0 rilever?a presence - on the situated one web- of a Feed Rss and proporr?i to hold to you dawned to you on that situated, automatically: in Tools (instruments) to pu?ontrollare (check) a situated one in order to see if?n situated swindle and, in affirmative case, for being able to signal same the situated one (report) to the Microsoft. And then possible to disattivare the automatic protection antiswindle if us anti-swindle of the Netcraft is entrusted to the service. Complex Nel. said that not?ale this version of Explorer. Only neo: Work 9, Netscape 8, FireFox 1,5 can expand the own functions thanks to of the Widgets (Extensions) while Explorer 7 remains cos?om.?Alla fine to have the PC and of the new version of Explorer not sar?estata trace. Vignette: Hacker against situated Pirati Danish informed us to the onslaught for protest the protest against the vignette on the Maometto prophet moves online. Beyond 900 situated web Danish ones they have been hit from hacker Muslims. The pirati ones informed Muslims to us have replaced the Home Page with inneggianti messages to the Islam. Foxdesktop: when Linux speaks Italian. In this case the innovation calls Foxdesktop completely, one distro liberations releasable, derived from Fedora Core di Red Hat, developed in Italy. If you want to try it, you can unload it to the following address:. While the pi?sigenti customers, know that of?i?tata announced one version professional to payment, than coster.: from some brought back day on the situated one on an warning message appears ch is being moved on an other serveur, therefore the link it could change from a moment to the other.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment