50 lines
2.2 KiB
Plaintext
50 lines
2.2 KiB
Plaintext
WATCH OUT FOR THEM CRACKERS!
|
||
|
||
Used to be a Cracker was someone from the South. Nowdays, a Cracker is
|
||
someone who haunts BBSs and loads in buggy programs which zap unsuspecting
|
||
downloaders' operating systems.
|
||
|
||
Times change.
|
||
|
||
We have dealt with a few nasty Crackers and have developed a few very simple
|
||
ways of handling them and the results of their 'Arf Arf' programs.
|
||
|
||
* After your computer has blown up, take it back to Crazy Lou's Emporium and
|
||
tell them it self-destructed. Those salesmen are merely rerouted car salesmen
|
||
-- they'll never know. Just be sure you sent in your warranty information.
|
||
|
||
* Feint Download. Download only to a capture buffer so you can scrutinize the
|
||
program before sinking it into your three thousand dollars' worth of PC.
|
||
|
||
* Start a Shooting War. Do your own buggy programs, even if all they do is
|
||
show Brownian motion onscreen. Describe them in lofty, hi-tech terms so the
|
||
Crackers themselves will want to try them out.
|
||
|
||
* Embed sections of text from "You Guessed It" in any programs you download
|
||
before testing them. The inane chatter will act like a roach bomb.
|
||
|
||
* Before you download anything, ask around. Don't ask the obvious questions,
|
||
just subtle ones like, "Is there a message at the end?"
|
||
|
||
* Get back up on the BBS after having your computer fixed and tell all. That,
|
||
of course, won't stop Crackers but it'll make you feel better.
|
||
|
||
There's no question this new hobby among Crackers is just the beginning of a
|
||
reign of compu-terror, but there's another side to the issue.
|
||
|
||
A friend of mine is an accomplished programmer who does work for small
|
||
clients. He always embeds necessary controls in his work so that, if the client
|
||
fails to pap0iim on time, he can destroy the program with just a few quick taps
|
||
on the keyboard.
|
||
|
||
Major software vendors have taken less blatant steps to protect their
|
||
proprietary rights, as you no doubt know.
|
||
|
||
The question is, how do you thwart compu-terrorists but protect your own
|
||
rights?
|
||
|
||
One suggestion is to deflect them. Let's get compu-terrorists on our side!
|
||
|
||
Anyone know a key phone number in, say, the Soviet Union, Libya or South
|
||
Africa?
|
||
|