594 lines
22 KiB
HTML
594 lines
22 KiB
HTML
<HTML>
|
|
<HEAD>
|
|
<TITLE>cDc #360</TITLE>
|
|
</HEAD>
|
|
<BODY BGCOLOR="#FFFFFF">
|
|
|
|
<PRE>
|
|
|
|
_
|
|
| \
|
|
| \
|
|
| | \
|
|
__ | |\ \ __
|
|
_____________ _/_/ | | \ \ _/_/ _____________
|
|
| ___________ _/_/ | | \ \ _/_/ ___________ |
|
|
| | _/_/_____ | | > > _/_/_____ | |
|
|
| | /________/ | | / / /________/ | |
|
|
| | | | / / | |
|
|
| | | |/ / | |
|
|
| | | | / | |
|
|
| | | / | |
|
|
| | |_/ | |
|
|
| | | |
|
|
| | c o m m u n i c a t i o n s | |
|
|
| |________________________________________________________________| |
|
|
|____________________________________________________________________|
|
|
|
|
...presents... The Journalist's Cookbook
|
|
Version 1.0
|
|
by Reid Fleming
|
|
7/15/1998-#360
|
|
|
|
__///////\ -cDc- CULT OF THE DEAD COW -cDc- /\\\\\\\__
|
|
\\\\\\\/ Everything You Need Since 1986 \///////
|
|
___ _ _ ___ _ _ ___ _ _ ___ _ _ ___
|
|
|___heal_the_sick___raise_the_dead___cleanse_the_lepers___cast_out_demons___|
|
|
|
|
[<B>Editor's note</B>: This is a living document. It will be updated from time
|
|
to time, and its version number incremented to reflect major and minor
|
|
changes.]
|
|
|
|
|
|
Eventually it happens to everybody. The producer asks you to put
|
|
together a segment on computer crime or the hacker subculture. Sounds easy
|
|
enough. You already have a couple ideas. And luckily you have that
|
|
friend-of-a-friend who knows that hacker who went to jail.
|
|
|
|
But once you start actually writing, you realize that your script is
|
|
sounding as trite as anything you've ever seen. No matter how much you
|
|
try to jazz it up, it looks like every other hacker spot you've seen.
|
|
Pretty soon you're downright desperate for ideas.
|
|
|
|
Here's a suggestion: don't agonize over what will end up being just
|
|
another derivative news piece anyway. Instead, let this document help
|
|
you produce yet another mediocre story about computer hackers.
|
|
|
|
|
|
TABLE OF CONTENTS
|
|
<A HREF="#TITLE">
|
|
TITLE</A><A HREF="#TOPIC">
|
|
TOPIC</A><A HREF="#IMPENDING THREATS">
|
|
IMPENDING THREATS</A><A HREF="#STATISTICS">
|
|
STATISTICS</A><A HREF="#THE LEAD">
|
|
THE LEAD</A><A HREF="#MOVIE CLIPS">
|
|
MOVIE CLIPS</A><A HREF="#ABOUT DEFINITIONS">
|
|
DEFINITIONS</A><A HREF="#MONEY SHOTS">
|
|
MONEY SHOTS</A><A HREF="#ANIMATIONS">
|
|
ANIMATIONS</A><A HREF="#INTERVIEWS">
|
|
INTERVIEWS</A><A HREF="#ABOUT SHOOTING YOUR SUBJECTS">
|
|
SHOOTING YOUR SUBJECTS</A>
|
|
<A HREF="#computer hackers">Computer Hackers</A>
|
|
<A HREF="#SETTINGS HACKER">Settings</A>
|
|
<A HREF="#INSERTS HACKER">Inserts</A>
|
|
<A HREF="#law enforcement officials">Law Enforcement Officials</A>
|
|
<A HREF="#SETTINGS FEDS">Settings</A>
|
|
<A HREF="#INSERTS FEDS">Inserts</A>
|
|
<A HREF="#security experts">Security Experts</A>
|
|
<A HREF="#SETTINGS SECURITY">Settings</A>
|
|
<A HREF="#INSERTS SECURITY">Inserts</A><A HREF="#THE CLOSING">
|
|
The Closing</A>
|
|
<A HREF="#APPENDIX A">
|
|
Appendix A</A>: Statistics<A HREF="#APPENDIX B">
|
|
Appendix B</A>: Interview Subjects<A HREF="#APPENDIX C">
|
|
Appendix C</A>: Vernhackular
|
|
|
|
<HR NOSHADE>
|
|
<A NAME="TITLE"></A><B>TITLE</B>
|
|
|
|
Start by selecting the working title of your piece. In many news
|
|
organizations, the title isn't even chosen by the producer of the piece,
|
|
so it's often a waste of time to come up with something good, just to
|
|
have it retitled at the last minute. And even if you DO get to choose
|
|
your own title, it doesn't matter. Nobody remembers them.
|
|
|
|
Regardless, it's easier to avoid writer's block once you have a title.
|
|
Here are some examples to get you thinking. (Of course, if you're really
|
|
short on time, just crib one without modification.)
|
|
|
|
- The Cyberwarriors
|
|
- At Your Digital Doorstep
|
|
- The Digitally Depraved
|
|
- Hacking The Planet
|
|
- How Secure Are You Really?
|
|
- Is Your Data Safe?
|
|
- Dialing for Mayhem
|
|
|
|
|
|
<A NAME="TOPIC"></A><B>TOPIC</B>
|
|
|
|
Now choose a topic corresponding to a recent computer crime. This can be
|
|
very easy. Just check out the AntiOnline web site for recent hacker
|
|
news. The site is written for the layperson with some understanding of
|
|
vernhackular. <<A HREF="http://www.antionline.com/">http://www.antionline.com/</A>>
|
|
|
|
If AntiOnline doesn't help, then this can be hard. Check the newspapers,
|
|
magazines, chat boards... ferret out some recent computer crimes. If you
|
|
can find a fresh event falling into one of these categories, write it
|
|
down (if you don't have time for that, then just pick one that sounds good):
|
|
|
|
- Banking systems/ATM network penetration
|
|
- Cryptography
|
|
- Cyber terrorism/electronic pearl harbor
|
|
- Hacktivism
|
|
- Identity theft
|
|
- Military or Fortune 100 systems penetration
|
|
- Online privacy
|
|
- Personal data theft
|
|
- Proliferation of Increasingly Sophisticated Hacking Tools
|
|
- International Hacker Gatherings
|
|
|
|
|
|
<A NAME="IMPENDING THREATS"></A><B>IMPENDING THREATS</B>
|
|
|
|
The phrase "electronic Pearl Harbor" has crept into the national
|
|
consciousness. It encompasses the commonly-cited worst case scenarios in
|
|
the computer hacking sphere. This set of impending cataclysms includes
|
|
the disruption or obliteration of any the following computer systems:
|
|
|
|
- Military sites protecting nuclear, biological, or chemical agents
|
|
- Air Traffic Control systems
|
|
- Communications satellites
|
|
- Interstate power grids
|
|
- 911 systems
|
|
- Metropolitan mass transit systems
|
|
- Hospital systems (patient record databases)
|
|
- National credit databases
|
|
- The Internet backbone itself
|
|
|
|
|
|
<A NAME="STATISTICS"></A><B>STATISTICS</B>
|
|
|
|
You know the deal with statistics: no one can verify them, so don't worry
|
|
about quoting your sources. They're just guesses anyway. Well, this
|
|
wisdom is ESPECIALLY true in the case of computer crime.
|
|
|
|
So grab a useful statistic from a print story, or use one of those
|
|
provided in <A HREF="#APPENDIX A">Appendix A</A>. In a pinch you can just make something up. No
|
|
one will have any idea.
|
|
|
|
|
|
<A NAME="THE LEAD"></A><B>THE LEAD</B>
|
|
|
|
If you don't have time to write your own, try this sure-fire intro.
|
|
|
|
"[CYBER TERRORISM]. With the recent [SHUTDOWN OF THE PUBLIC LIBRARY
|
|
SYSTEM], it's been on everybody's mind. We've all heard stories of
|
|
computer hackers [DISRUPTING AIR TRAFFIC CONTROL COMPUTERS] and
|
|
[DISABLING 911 SYSTEMS], but just how big a problem is this? According
|
|
to statistics, [20 MILLION HACKS ARE PERPETRATED EACH YEAR]. With odds
|
|
like that, it makes you wonder: how safe are we really?"
|
|
|
|
|
|
<A NAME="MOVIE CLIPS"></A><B>MOVIE CLIPS</B>
|
|
|
|
Consider the use of a movie clip to hook your audience right away. At
|
|
least some of these films are familiar to most of your audience, even the
|
|
ones who don't have computers.
|
|
|
|
Grab a suitable sequence from one of the following flicks and open your
|
|
story with it.
|
|
|
|
- <A HREF="http://us.imdb.com/Title?GoldenEye+(1995)">Goldeneye</A>
|
|
- <A HREF="http://us.imdb.com/Title?Hackers">Hackers</A>
|
|
- <A HREF="http://us.imdb.com/Title?Lawnmower+Man,+The+(1992)">Lawnmower Man</A>
|
|
- <A HREF="http://us.imdb.com/Title?Net,+The+(1995)">The Net</A>
|
|
- <A HREF="http://us.imdb.com/Title?Terminator+2">Terminator 2</A>
|
|
- <A HREF="http://us.imdb.com/Title?Real+Genius">Real Genius</A>
|
|
- <A HREF="http://us.imdb.com/Title?Sneakers">Sneakers</A>
|
|
- <A HREF="http://us.imdb.com/Title?Speed+2">Speed 2</A>
|
|
- <A HREF="http://us.imdb.com/Title?Superman+III+(1983)">Superman III</A>
|
|
- <A HREF="http://us.imdb.com/Title?Wargames">Wargames</A>
|
|
- <A HREF="http://us.imdb.com/Title?Armchair+Hacker,+The">The Armchair Hacker</A>
|
|
- <A HREF="http://us.imdb.com/Title?Tron+(1982)">Tron</A>
|
|
|
|
|
|
<A NAME="ABOUT DEFINITIONS"></A><B>ABOUT DEFINITIONS</B>
|
|
|
|
Explain the technical jargon to your audience as each term arises. Your
|
|
intro may require the use of one or more terms, but resist the urge to
|
|
explain everything at once. It's boring, and it won't work anyway.
|
|
|
|
Ask your interview subjects to explain any jargon they use. While
|
|
they're at it, ask them to explain the jargon used by anyone you
|
|
interviewed previously. Someone else may be better at explaining
|
|
something than the person who actually used the term.
|
|
|
|
If an explanation differs substantially from that offered in <A HREF="#APPENDIX C">Appendix C</A>,
|
|
use the one offered by your source. Things change so rapidly on the
|
|
Internet that words are often redefined.
|
|
|
|
|
|
<A NAME="MONEY SHOTS"></A><B>MONEY SHOTS</B>
|
|
|
|
These are the clips of hackers sharing the fruits of their labor. Your
|
|
story should have at least one of these.
|
|
|
|
- Hacked web sites (FBI, CIA, DOJ, NASA, etc.)
|
|
- Purloined data scrolling across monitor
|
|
- Screenful of cracked passwords
|
|
|
|
|
|
<A NAME="ANIMATIONS"></A><B>ANIMATIONS</B>
|
|
|
|
If you need them, here are some tried-and-true ideas for CG elements.
|
|
|
|
- Packets served across the Internet
|
|
- Satellite hacking
|
|
- Virus infecting files
|
|
- Files being deleted
|
|
- Calls being traced
|
|
|
|
|
|
<A NAME="INTERVIEWS"></A><B>INTERVIEWS</B>
|
|
|
|
There are just three categories of subjects worthy of on-camera
|
|
interviews: computer hackers, law enforcement officials, and security
|
|
experts.
|
|
|
|
Whenever you interview any of these subjects, you must determine their
|
|
credentials. By this we mean the following:
|
|
|
|
* number of years in their respective roles
|
|
* famous exploits
|
|
* membership in appropriate organizations
|
|
* authorship of any books or articles on the topic
|
|
* relevant jail time
|
|
* whether the subject has been featured in any previous interviews
|
|
|
|
|
|
<A NAME="ABOUT SHOOTING YOUR SUBJECTS"></A><B>ABOUT SHOOTING YOUR SUBJECTS</B>
|
|
|
|
Just four simple rules, all of which you should already know.
|
|
|
|
Rule number one: always shoot the subject working at a computer. This is
|
|
absolutely crucial, never omit it.
|
|
|
|
Rule number two: conduct the interview in the subject's habitat, but away
|
|
from the computer.
|
|
|
|
Rule number three: get lots of closeups. Room decorations, computer
|
|
systems, keyboards, bookshelves, anything visually appealing. You will
|
|
need these for cutaways.
|
|
|
|
Rule number four: get full coverage on the subject. This can mean more
|
|
than closeups and reverse shots. Shoot ECUs of prominent jewelry,
|
|
t-shirt logos, badges, holsters, ID tags, whatever. More cutaway material.
|
|
|
|
|
|
<A NAME="computer hackers"></A>computer hackers
|
|
----------------
|
|
|
|
<A NAME="SETTINGS HACKER"></A>SETTINGS
|
|
|
|
- hacker in his habitat
|
|
- anti-Microsoft propaganda (posters, bumper stickers, etc.)
|
|
- pro-UNIX propaganda
|
|
- 2600 magazine
|
|
- Phrack
|
|
|
|
- anonymous hacker in nondescript hotel room
|
|
- features obliterated
|
|
- silhouette against scary backlight
|
|
- mosaic face
|
|
|
|
- hacker conventions
|
|
- Defcon
|
|
- Hohocon
|
|
- HOPE
|
|
- Summercon
|
|
|
|
- dumpster
|
|
|
|
- bank of payphones
|
|
|
|
|
|
<A NAME="INSERTS HACKER"></A>INSERTS
|
|
|
|
- offbeat grooming & wardrobe
|
|
- unusual hairdos
|
|
- body piercings
|
|
- tattoos
|
|
- 2600 t-shirt
|
|
- leather jacket
|
|
|
|
- equipment
|
|
- computers, plural
|
|
- keyboards
|
|
- CRTs
|
|
- misc. gadgetry
|
|
|
|
- software tools
|
|
- L0phtCrack
|
|
- Satan
|
|
- Back Orifice
|
|
|
|
- internet chat rooms
|
|
- #hack
|
|
- #cDc
|
|
|
|
|
|
<A NAME="law enforcement officials"></A>law enforcement officials
|
|
-------------------------
|
|
|
|
FBI agents, Secret Service agents, local police officers, anyone from the
|
|
Department of Justice, local district attorneys, etc.
|
|
|
|
|
|
<A NAME="SETTINGS FEDS"></A>SETTINGS
|
|
|
|
- server room
|
|
- cubicle
|
|
|
|
<A NAME="INSERTS FEDS"></A>INSERTS
|
|
|
|
- building entrance
|
|
- nametag
|
|
- badge
|
|
- gun
|
|
- bookshelves
|
|
|
|
|
|
<A NAME="security experts"></A>security experts
|
|
----------------
|
|
|
|
These come in two flavors: computer security consultants, and computer
|
|
privacy advocates.
|
|
|
|
Security consultants (usually themselves former hackers or law
|
|
enforcement) are paid consultants who sell their insight into the
|
|
methodology and ideology of the typical hacker. Usually self-employed.
|
|
|
|
Computer privacy advocates are private individuals who speak out publicly
|
|
regarding threats to personal liberty in cyberspace. Favorite topics
|
|
include: export restrictions on certain cryptographic materials, the
|
|
validity of various data encryption schemes, and the potential
|
|
vulnerability of critical information systems.
|
|
|
|
|
|
<A NAME="SETTINGS SECURITY"></A>SETTINGS
|
|
|
|
- server room
|
|
- telephone equipment room
|
|
- cubicle
|
|
|
|
<A NAME="INSERTS SECURITY"></A>INSERTS
|
|
|
|
- storefront / sign
|
|
- bookshelves
|
|
|
|
|
|
|
|
<A NAME="THE CLOSING"></A><B>THE CLOSING</B>
|
|
|
|
Nothing special here. Just a few sentences that re-emphasize the topic.
|
|
Remember that no matter the precise issue, the general message should be
|
|
to fear the relentless and unstoppable legion of computer hackers.
|
|
|
|
Perhaps you could close with an epigram. In which case, you should crack
|
|
open <A HREF="http://www.columbia.edu/acis/bartleby/bartlett/">Bartlett's Quotations</A>. Try one of these topics: COMPUTER, DANGER,
|
|
MENACE, PERIL, RISK, THREAT, TREACHERY, VULNERABLE.
|
|
|
|
<HR NOSHADE>
|
|
<A NAME="APPENDIX A"></A><B>APPENDIX A</B> - STATISTICS
|
|
|
|
<<A HREF="http://cnn.com/TECH/computing/9804/06/computer.security/">http://cnn.com/TECH/computing/9804/06/computer.security/</A>>
|
|
Nearly 80 percent of U.S. businesses have been victims of computer crimes.
|
|
58 percent of Fortune 1000 companies have experienced computer
|
|
break-ins. 18 percent of that group suffered more than $1 million in losses.
|
|
|
|
|
|
<<A HREF="http://www.defcon.org/TEXT/5/larrylange-eetimes-winn.html">http://www.defcon.org/TEXT/5/larrylange-eetimes-winn.html</A>>
|
|
According to the FBI, 122 countries across the world currently have
|
|
online hacking capabilities.
|
|
|
|
We know that in the neighborhood of 20 million hacks a year are occurring
|
|
worldwide.
|
|
|
|
|
|
<<A HREF="http://www.technopolitics.com/scripts/tp06-06-97.html">http://www.technopolitics.com/scripts/tp06-06-97.html</A>>
|
|
The average cyberheist nets $250,000 with a less than one
|
|
percent rate of conviction.
|
|
|
|
Only 17 percent of the major corporations and financial institutions that
|
|
have been intruded actually report it.
|
|
|
|
75 percent of the Fortune 500 companies have been successfully penetrated.
|
|
The average loss that they concede is about $100,000.
|
|
|
|
The FBI estimates that the total losses from these electronic rip offs
|
|
range from a rock bottom figure of $500 million a year up to $10 billion.
|
|
|
|
<A HREF="http://www.cultdeadcow.com/news/medialist.htm">
|
|
cDc Media List</A>
|
|
_Rocky Mountain News_, August 18, 1996, "Air Force battles computer hackers",
|
|
pg 42A. Hundreds of thousands of times a year, the Cyberwarrior
|
|
[the U.S. Air Force Information Warfare Center] defends the nation's secrets
|
|
from the members of the Legion of Doom and the CULT of the DEAD COW in a
|
|
battlefield that spans the globe.
|
|
|
|
<HR>
|
|
<A NAME="APPENDIX B"></A><B>APPENDIX B</B> - INTERVIEW SUBJECTS
|
|
|
|
Try these organizations' web sites for up-to-date contact info.
|
|
|
|
|
|
HACKERS
|
|
|
|
- 2600 Magazine
|
|
<<A HREF="http://www.2600.com/">http://www.2600.com/</A>>
|
|
|
|
- Chaos Computer Club
|
|
<<A HREF="http://www.ccc.de/">http://www.ccc.de/</A>>
|
|
|
|
- Cult of the Dead Cow
|
|
<<A HREF="http://www.cultdeadcow.com/">http://www.cultdeadcow.com/</A>>
|
|
|
|
- L0pht Heavy Industries
|
|
<<A HREF="http://www.l0pht.com/">http://www.l0pht.com/</A>>
|
|
|
|
- <A HREF="http://www.newhackcity.net/">New Hack City</A>
|
|
<<A HREF="http://www.newhackcity.net/">http://www.newhackcity.net/</A>>
|
|
|
|
- Phrack
|
|
<<A HREF="http://www.phrack.com/">http://www.phrack.com/</A>>
|
|
|
|
- r00t
|
|
<<A HREF="http://www.r00t.org/">http://www.r00t.org/</A>>
|
|
|
|
|
|
LAW ENFORCEMENT
|
|
|
|
- Federal Bureau of Investigation
|
|
<<A HREF="http://www.fbi.gov/">http://www.fbi.gov/</A>>
|
|
|
|
- Secret Service
|
|
<<A HREF="http://www.treas.gov/usss/">http://www.treas.gov/usss/</A>>
|
|
|
|
- San Jose Police Department
|
|
<<A HREF="http://www.sjpd.org/">http://www.sjpd.org/</A>>
|
|
|
|
|
|
SECURITY EXPERTS
|
|
|
|
- Cypherpunks
|
|
<<A HREF="ftp://ftp.csua.berkeley.edu/pub/cypherpunks/Home.html">ftp://ftp.csua.berkeley.edu/pub/cypherpunks/Home.html</A>>
|
|
|
|
- Electronic Frontier Foundation
|
|
<<A HREF="http://www.eff.org/">http://www.eff.org/</A>>
|
|
|
|
- Bruce Schneier
|
|
<<A HREF="http://www.counterpane.com/">http://www.counterpane.com/</A>>
|
|
|
|
- Tsutomu Shimomura (<A HREF="mailto:tsutomu@sdsc.edu">tsutomu@sdsc.edu</A>)
|
|
<<A HREF="http://www.takedown.com/">http://www.takedown.com/</A>>
|
|
|
|
- Cliff Stoll (<A HREF="mailto:stoll@ocf.berkeley.edu">stoll@ocf.berkeley.edu</A>)
|
|
<<A HREF="http://www.ocf.berkeley.edu/~stoll/">http://www.ocf.berkeley.edu/~stoll/</A>>
|
|
|
|
<HR>
|
|
<A NAME="APPENDIX C"></A><B>APPENDIX C</B> - VERNHACKULAR
|
|
|
|
These are some of the more common vocabulary items.
|
|
|
|
|
|
ATTACK: a specific tactic designed to generate some kind of malfunction,
|
|
usually to grant or deny computer access -- syn. EXPLOIT
|
|
|
|
BACK DOOR: Leaving behind a hidden or nonobvious method to regain system
|
|
access during subsequent visits
|
|
|
|
BLACK HAT: a malicious hacker who defies the Hacker Ethic -- ant. WHITE HAT
|
|
|
|
CARDING: credit card fraud, typically for mailorder goods
|
|
|
|
CRACKER: contemptuous term for hacker, or abbrev. for password cracker
|
|
|
|
DENIAL OF SERVICE: an attack designed to prevent the productive use of a
|
|
computer system, by overworking the computer beyond its operational limits
|
|
|
|
DUMPSTER DIVING: looking through the garbage for discarded equipment,
|
|
useful information, or other materials -- syn. TRASHING
|
|
|
|
EXPLOIT: see attack
|
|
|
|
HACKER: a person skilled or expertised in methods of hacking computer
|
|
systems
|
|
|
|
HACKER ETHIC: an informal code of conduct designed to preserve the
|
|
integrity of a hacked computer system and its contents, the terms of
|
|
which generally prohibit the contamination or destruction of valuable
|
|
data or other resources
|
|
|
|
HACKING: the process of gaining unauthorized access to a computer system
|
|
|
|
HACKTIVISM: a term first coined by THE CULT OF THE DEAD COW to describe one
|
|
brand of activism practiced by the <A HREF="http://www.cultdeadcow.com/cDc_files/cDc-0356.html">HONG KONG BLONDES</A>; a policy of hacking,
|
|
phreaking, or creating technology to achieve a political or social goal
|
|
|
|
HANDLE: a hacker's chosen alias, or nom-de-hack
|
|
|
|
MAN IN THE MIDDLE: an attack wherein a malicious agent seeks to intercept
|
|
communications between two computers and rewrite certain message contents
|
|
|
|
OWNED: a computer whose security has been entirely neutralized by a hacker
|
|
|
|
PACKET SNIFFER: a computer program designed to reveal the contents of all
|
|
network traffic within earshot of the computer, not just the data bound
|
|
for that particular system
|
|
|
|
PASSWORD CRACKER: a computer program designed to extract the passwords of
|
|
a given system's user database, usually employing a method of brute force
|
|
or dictionary comparison
|
|
|
|
PHREAK: a person skilled or expertised in methods of phone phreaking
|
|
|
|
PHREAKING: manipulating the telephone system in order to reroute phone
|
|
calls, avoid billing, or otherwise defraud the phone company
|
|
|
|
SECURITY THROUGH OBSCURITY: the tactic of protecting something by keeping
|
|
secret all its details
|
|
|
|
SNIFFER: abbrev. for packet sniffer
|
|
|
|
SOCIAL ENGINEERING: any means of convincing someone to willingly furnish
|
|
information which is unavailable to the general public, usually by posing
|
|
as someone with a legitimate need
|
|
|
|
SPOOFING: making it appear that data originating from an untrusted
|
|
computer is actually coming from a trusted one
|
|
|
|
TRASHING: see dumpster diving
|
|
|
|
TROJAN HORSE: any piece of software intentionally infected with a virus,
|
|
and purposely provided to others
|
|
|
|
VIRUS: a small computer program devised to be undetectable and duplicate
|
|
itself
|
|
|
|
WAREZ: illegally-duplicated computer software products
|
|
|
|
WHITE HAT: a mediagenic hacker who adheres to the Hacker Ethic -- ant.
|
|
BLACK HAT
|
|
|
|
|
|
|
|
.-. _ _ .-.
|
|
/ \ .-. ((___)) .-. / \
|
|
/.ooM \ / \ .-. [ x x ] .-. / \ /.ooM \
|
|
-/-------\-------/-----\-----/---\--\ /--/---\-----/-----\-------/-------\-
|
|
/lucky 13\ / \ / `-(' ')-' \ / \ /lucky 13\
|
|
\ / `-' (U) `-' \ /
|
|
`-' the original e-zine `-' _
|
|
Oooo eastside westside / ) __
|
|
/)(\ ( \ WORLDWIDE / ( / \
|
|
\__/ ) / Copyright (c) 1998 cDc communications and the author. \ ) \)(/
|
|
(_/ CULT OF THE DEAD COW is a registered trademark of oooO
|
|
cDc communications, PO Box 53011, Lubbock, TX, 79453, USA. _
|
|
oooO All rights reserved. Edited by Omega __ ( \
|
|
/ ) /)(\ / \ ) \
|
|
\ ( \__/ Save yourself! Go outside! Do something! \)(/ ( /
|
|
\_) xXx BOW to the COW xXx Oooo
|
|
|
|
<A HREF="http://www.cultdeadcow.com">http://www.cultdeadcow.com</A>
|
|
|
|
|
|
|
|
|
|
|
|
</PRE>
|
|
|
|
<P> </P>
|
|
</BODY>
|
|
</HTML>
|