Wednesday, May 30, 2007
Microsoft word and microsoft excel
now, as for excel, i don't have quite as much experiance in this, although it was stuff pretty damn simple when following instructions, how could one make an error? personally i dont have a need for it, but it would be pretty damn handy for writing up rosters, working out calculations, wages etc? maybe we should swap this over to access and give making a database a go? something a little more challenging perhaps? overall, the group of office software is a handy and powerful tool for almost anything you can think of. maybe we should do work on powerpoint? i mean, if we are going back to basics, powerpoint is a tool most uni students will use, moreso than excel? and maybe not everyone knows how to use it? just a thought....
anyway, till next time, bye bye
Course Overview
well thats my 2 cents, i hope everyone else enjoyed this course and got as much as they could out of it.
pavel.
Thursday, May 10, 2007
essay
“Information sharing is a powerful, positive good, and it is the ethical duty of a hacker to share their expertise by writing free software and facilitating access to information and to computer resources wherever possible.” (Himanen 2001: 3)
In today’s day and age, the term hacker is thrown around all too lightly, The public views hackers as social outcasts, who break into computers and destroy them by exposing sensitive information, exploiting someone or spreading virii everywhere, and who can blame them? They are usually uninformed and misled into believing this via the countless many media streams, but it is nothing more than a misconception. The true definition for these people is known to the digital underground as a ‘cracker’. Every hacker’s ultimate goal is knowledge. Any possible means may be used to obtain that, including illegal ones; on the other hand, a cracker breaks into a computer system for the sheer joy of destruction and confusion. This essay will look at the origin of ‘the hack’, make clear the true hacker ethic, hackers within the work force and their benefits to society. Then it will distinguish what a ‘cracker’ is, and what they do, and finally the laws and punishments associated with computer crime.
After a group of MIT programmers from the 1960’s adopted the word ‘hack’ as a synonym for their work, came the second wave of hackers in the early 1980’s. What characterised this group was that they desperately wanted computers and computer systems designed to be useful and accessible to citizens. Now in the late 80’s, the meaning of the word hacker changed once again, the to computer underground, ‘to hack’ meant to break into a computer system, and a ‘hacker’ was the person who did this. In a book titled Hackers: heroes of the computer revolution (Levy 1984: 52) the hacker ethic is but down into 5 points.
‘All information must be free.’
‘Mistrust authority – Promote decentralisation.’
‘Hackers should be judged by their hacking, not by criteria such as degrees, age, race, or position.’
‘You can create art and beauty on a computer.’
‘Computers can change your life for the better.’
Reading the ‘Hacker Manifesto’ written in 1986 by a hacker named ‘the mentor’, who was part of the elite hacking group ‘the legion of doom’, presents a view which is similar to this, a story of the curious explorer, pursuing knowledge and intellectual challenge. The hacker ethic would state that unauthorised access to a www server would be acceptable as long as no damage is done. Now in 1991, 3 members of the legion of doom founded a company known as Comsec Data Security, a Houston based consulting firm. The firm quickly built a client list made up of several Fortune 500 companies, but just as quickly as they rose to power, the company went out of business due to media hysteria and blackballing by rival companies, exploiting the fact they were former hackers. The computer industry has a long, respected tradition of hiring so-called teams of professional hackers to attack a computer system to determine how secure it is. The idea is that only by waging a full-scale siege on a system with an authorized break-in can its true level of vulnerability be determined, so that backdoors and weaknesses are rectified.
One thing which you very rarely see the media publish is that not only do hackers help companies, but other forms of ‘ethical hacking’ such as working with various forms of justice departments to help put criminals behind bars, one example of this is an article published in the U.K newspaper the Telegraph (Bamber 1999) where hackers working in conjunction with the police, helped infiltrate a internet paedophilia community and in only 60 hours, found evidence that helped police make 19 arrests, on counts such as rape, incest, indecent assault and possession and distribution of indecent images of children. Even the U.S department of justice has looked to recruit hackers in order to conduct penetration tests on its networks (Furnell, Dowland & Sanders 1999)
On the other side of the so easily mistaken line, are ‘crackers’, whose skill levels vary on a large scale. The Chantler study (Chantler 1996) classes hackers into several factions. At the bottom end of the scale you have ‘Lamers’, people who use programs such as BO2K or ‘back orifice.’(BO2K 1999) Written by the hacking group Cult of the Dead Cow it enables any user with half a brain to control another computer from a remote location. Originally intended for ethical use, for system administrators wishing to remotely monitor systems within their network, but eventually found its way into the hands of those who would use it to maliciously attack users by entering another users system to steal passwords, delete files and also spread pre-written virii for kicks. Moving up your scale you have users who have a better understanding, who exploit weaknesses in websites in order to rearrange them, either as a joke, or for more serious issues usually politically related. One such group is the Chilean “Byond Hackers Team”, who has claimed to have more than 8000 hacks to their name, famous for hacking the NASA website, as well as government sites in their own country, the US, Israel and many other South American states(Kornakov 2006). Finally, right at the top of the scale are the crackers who hack into financial institutions and corporations for personal gain, usually in the form of money. A computer industry survey in 1998 calculated that 550 of Americas corporations, government agencies, and universities had lost more than $100million to computer related financial fraud, copyright theft, and data sabotage (Taylor 1999: 71)
Australia’s federal law on hacking has many penalties. in section 76C’ A person who intentionally and without authority or lawful excuse :(a) destroys, erases or alters data stored in, or inserts data into a Commonwealth computer;(b) interferes with, or interrupts or obstructs the lawful use of, a Commonwealth computer;(c) destroys, erases, alters or adds data stored on behalf of the Commonwealth in a computer that is not a Commonwealth computer.
All of which are possible by using programs as simple to use as the back orifice tool, the penalty for this is 10 year imprisonment! (Extract from Federal Law on Hacking 2003)
In the U.S, courts are also getting harsher with their penalties, most maximum prison sentences handed down for computer crime range from one year to 10 years. Hackers whose exploits result in injury or death -- if they disable emergency response networks or destroy electronic medical records, for example -- face 20 years to life in prison. Hackers will face up to a 25% increase in their sentences if they hijack e-mail accounts or steal personal data -- including financial and medical records and digital photographs. Convicted virus and worm authors face a 50 percent increase.
Sentences also will increase by 50 percent for hackers who share stolen personal data with anyone. The sentences will double if the information is posted on the Internet. (Krebs 2003). Perhaps the most famous hacker throughout the late 70’s to the early 90’s was Kevin Mitnick, who has been in and out of jail and in the tabloids throughout that time frame, described as a ‘brilliant and elusive cyber-thief’. (Meriwether 1995)
The media and the government will always look down upon hackers AND crackers, and make mistakes about which is which. The simple fact is a hacker builds things, a cracker breaks them. Nevertheless within their culture lies an attitude towards solving fascinating problems. Challenging ones mind is the highest form of mental stimulation, and if not for hackers and the computer enthusiasts from the 70’s and 80’s, we may not have come this far with technology. Much of our computing technology that we take for granted today, like the internet and what it has become, e-mail, word processing.. Almost everything would not be what it is today without their efforts and as long as there is technology, there will be people wishing to know more about it, inevitably, hackers will hack on.
Bibliography
Bamber, David (1999) ‘Police hackers catch Internet paedophiles’ http://www.telegraph.co.uk/htmlContent.jhtml?html=/archive/1999/08/15/nhack15.html (accessed 28 April 2007)
‘BO2K’ http://www.BO2K.com (accessed 26 April 2007)
Caroline, A (2004) ‘Political hacktivism: tool of the underdog or scourge of cyberspace?’ Aslib Proceedings: New Information Perspectives 56(4) 212-221
Chantler, N (1996) Profile of a computer hacker Infowar Florida
‘Extract from Federal Law on Hacking’ http://www.uwa.edu.au/it/rules/fedhacking (accessed 26 April 2007)
Foltz, B (2004) ‘Cyberterrorism, computer crime, and reality’ Information management and computer security 12(2) 154-166
Furnell, S.M, Chiliarchaki, P and Dowland, P.S (2001) ‘Security analysers: administrator assistants or hacker helpers?’ Information management and computer security 9(2) 93-101
Furnell, S.M, Dowland, S.M, and Sanders, P.W (1999) ‘Dissecting the ‘Hacker Manifesto’’ Information management and computer security 7(2) 69-75
Himanen, Pekka (2001) The hacker ethic and the spirit of the information age Secker & Warburg London
Kornakov, Konstantin (2006) ‘Major hacking crew taken down in South America’ http://www.viruslist.com/en/news?id=%20206082634 (accessed 29 April 2007)
Krebs, Brian (2003) ‘Hackers to Face Tougher Sentences’ http://www.washingtonpost.com/ac2wp-dynA35261-2003Oct2language=printer
(accessed 29 April 2007)
Levy, S (1984) hackers: heroes of the computer revolution Bantam Doubleday Dell New York
Meriwether, Dan (1995) ‘Kevin Mitnick’ http://www.takedown.com/bio/mitnick.html (accessed 28 April 2007)
Smith, A.D and Rupp, W.T (2002) ‘Issues in cybersecurity: understanding the potential risks associated with hackers/crackers.’ Information management and computer security 9(2) 178-183
Taylor, P (1999) Hackers: crime in the digital sublime Routledge New York
Wednesday, April 25, 2007
3d chat environments
honestly i don't mind either option, the 3d environment is like a game, and is pretty fun, whilst Msn etc.... is good for just talking, and the ability to share files, makes it very handy.
Wednesday, April 18, 2007
Photo - Uni Life
Photo - high tech
dont know if anyone remembers this, but its a screenshot i took of the movie 'hackers' and how they portrayed a online database, and how they 'hacked' it. couldn't stop laughing personally. but im sure many people found it amazing and the effects where definitly 'high-tech' for its day lol. go C.G.I!
Photo - Summer
Photo - Games
Wednesday, April 4, 2007
week 6
the part which really caught my attention though was the virtual reality. the whole where do we draw the line between 'virtual' and 'reality' for now, true enough, there are no senses of touch or smell within a virtual world, but who's to say in the near future that won't be the case? true enough, interest in the public eye has seen virtual reality decline over the last few years, but i've no doubt that soon enough, it will rise again, it can have so many applications, military training, in fact....any training at all. i mean flight simulator is already a standerd for pilot training. there could be recreational uses also, what if you wanted to see what it was like to be on a beach in the bahamas, without having the time to fly there and take a holiday? virtual reality could give the user a quick escape. the main issue which surrounds this is that users may get addicted to their 'virtual' world, and not be quite so productive in the real world. though if we could figure out a way to take it in moderation, i think it would be great.
who knows, maybe in many years to come, we may be living in a world where being 'plugged in' like in the matrix, may be a completely normal thing to do lol
Wednesday, March 28, 2007
week 5 tute
looking through some of the online tutorials, it looks like there is some amazing stuff out there, some crazy stuff you can do with it. if it's anything like PSP there should be plenty of plug-ins out there that do some cool stuff also. I guess i just didnt like photoshop to begin with because it was a little more complicated at first, and PSP did most of the stuff i wanted, but after actually playing around with it, its not too difficult, and it's basically the industry standerd for graphic design etc.. so i might as well get to know it.
on the other hand, how can you distinguish whats real and isnt? being able to manipulate an image and basically do ANYTHING to it. sometime's it's hard to tell the difference with the digital editing being so good. poses an interesting question...
essay ideas
Start off with a brief history of the internet, and the hacker, and why they hack.
Manifesto. Ethics etc.
2 types of hackers, ones that hack for good purposes, and the others which hack and create malicious virus’s etc. they basically want to stop one MAJOR company having all the info, having all the programs ie; Microsoft. the want for more open source stuff
History of hacking? From the 80’s to now
Who was the first hacker?
What drives a person to hack?The thirst for knowledge, or the need for power, or are they sadists who like to destroy things?People who hack for profit?Jobs gained thru hacking, information security?
Hackers in today’s society, who are they? Are they your neighbours?
hacker culture
Some famous hackers
Consequences of hacking in different countries.
How hacking has evolved from the 80’s to now.
Wednesday, March 21, 2007
Week 4 tute
- The nation's largest pumpkin weighed in this weekend. It was all part of the 13th annual Giant Pumpkin Growers Championship in Rhode Island. Ron Wallace broke the record for the world's largest pumpkin, weighing in at 1,502 lbs. 1.
http://www.49abcnews.com/news/2006/oct/09/worlds_heaviest_pumpkin_weighed/ - Miami Olympic heated pool, 80 pacific ave, Miami, qld, 4220 http://www.geocities/collesseum/court/5449/from_Creator.htm
- A giraffe’s tongue is 18-20inches long. http://www.sandiegozoo.org/animalbytes/t-giraffe.html
- The area of metaphysics that studies the nature of existence or being as such http://dictionary.reference.com/search?q=ontology
- David Cronenberg's first film was Transfer made in 19661. http://www.empirezine.com/spotlight/cronenberg/cronenberg1.htm
- the hackers manifesto was written in 19861. http://www.technozen.com/manifesto.htm
- 555 is used as a prefix to avoid actual phone numbers being phoned after people watch a certain film.. http://www.omegarobot.com/article/555.html
- take a flight from crete to rhodes which is only a short distance away, once greek island to another. http://www.anemos.net/tour13.htm/
- Rock and roll music by the beatles http://www.onmc.iinet.net.au/
- Brisbane punk band, the Black Assassins 10. http://www.griffith.edu.au/school/art/staff/stockwell.htm
Now, what is a search engine? a search engine is a yellow pages in essence. its comprised of a coordinated set of programs that includes:
- a SPIDER that goes to every page or representative pages on every Web site that wants to be searchable and reads it, using hypertext links on each page to discover and read a site's other pages
- A program that creates a huge index
- A program that receives your search request, compares it to the entries in the index, and returns results to you
each search engine ranks differently, some exclude links if they detect spam etc etc, but most major search engines analyse how pages link to each other,they determine what a page is about and whether that page is deemed to be "important" and thus deserving of a ranking boost. My favorite has to be altavista.com, i've been using it for the last 10 years, i like the results i get, and the layout of the page.
Mailing lists.
http://www.jiscmail.ac.uk is a great site, which is linked to thousands of mailing lists, 2 of which are related to this subject are :
http://www.jiscmail.ac.uk/lists/EBAY-STUDIES.html: this is the discussion of a variety of eBay themes including identity, community, social capital, collecting in an e-society, consumption, consumer lifestyles, employment effects, website design, usability, the 'real' economy, the 'perfect market' and representations of eBay.
http://www.jiscmail.ac.uk/lists/EVOLUTIONARY-COMPUTING.html : EC covers all approaches to computing based on analogues of natural selection: eg genetic algorithms, genetic programming, evolutionary strategies and artificial life. Related fields include complex systems theory, chaos and cellular automata
as far as my essay topic goes, im leaning towards hackers, and hacker ethics....need to choose a more direct issue still.
Wednesday, March 14, 2007
Week 3 Tute
now the film was composed during the time of the cold war, and the threat of nuclear winter was imminent, this being the basis for this film. The 'star' of the film is selected at random to participate in experiments, this being completely immoral and unethical, but i guess at the time deemed necessary for survival. (who has the right to make these decisions?) these experimenters put their Guinea pigs through these excruciating experiments in the hope to gain valuable resources which they lack. weeks go by with the main character, in a haze of pain and disorientation, and gradually the film unfolds into him recognising more and more, until he realises his captors wish to kill him, where he escapes to the past with the help of those from the future. which still, ultimately, ends in his death, coming back to that memory from the beginning of the film on the jetty at Orly.
I guess one of the key concerns is that they are trying to find a solution via technology not yet developed, something so unthinkable such as time travel, to a problem which is imminent, being nuclear war.
This could relate to us in Australia, with the current ongoing water crisis, what kinds of new technology could we implement to solve this? something that may seem completely unfathomable now, but in 20 years may become standard procedure. The same goes for the 'War on terrorism' we could end up in a similar position as the characters in the film, governments are already taking precautionary measures such as photographing and fingerprinting you when you enter the U.S. whats next? They experiment on animals, and they microchip them. Are we next to be chipped, so they can track our each and every move? Just a tad unethical and immoral don't you think?
As a fan of 12 Monkeys, i had no idea it was based on this 40 year old film. i was shocked! and looking back on both films, you can see just how similar they are, but personally i find the original more effective. Raw, brutal images do well to represent the storyline, keep the suspense, and haunt you. If you didn't catch this movie, im sure you could download it, so go see it!
Wednesday, March 7, 2007
Tute 1 10-12
Now I've always been interested in computers, technology, the web, and basically anything geeky :P so naturally i picked New Communication Technology as one of my subjects. Just after reading the first few chapters you realise how much more there is behind it all. It's all too easy to just adapt to the new technology these days, and not fully understand it, and what the real issues behind the ideas of it are. There is SO much depth which, all along i realise is there, but don't really pay attention to, from things such as the economy, the ethics of it all, the history behind what is now basic, and what might be in store in the future. I think I'm really going to make the most of this course.
A few of the other courses I've chosen are marketing, psychology, and effective writing. Overall i want to major in digital video, and do some electives regarding the web, possibly some programming, and perhaps some which relate to popular music. After uni, I'd love to make....wait for it....documentaries. didn't see that one coming aye? a friend of mine just graduated with a bachelor of environmental science, and we love the outdoors, and I'd love to travel, see things that people have no clue about, and inform them via film. I figure, why not follow your dreams? you only live once, and you have to give it a shot, i sure as hell don't want to live the rest of my days rotting in a 10x10metre sweat box kitchen.
so there you have it, a basic overview of that which is me, my motives, and my basic interests. I'll be sure not to bore you quite so much next time and ramble on and on and on.
Pavel.





