Wednesday, May 30, 2007

Microsoft word and microsoft excel

oops, almost forgot the blogs about word and excel. Basically, following the directions, it was pretty damn hard to make ANY mistakes or encounter ANY problems lol. granted, i didn't know the feature that we used in microsoft word, and sure it would be handy to use when applying for many jobs, or things along that line, the task was preeetty damn simple all in all. the software overall, is very usefull(word processors, i use openoffice.org) , i use it every day for uni work, writing things that im generally interested in. a Hell of a lot more power than the age old typewriter eh?
now, as for excel, i don't have quite as much experiance in this, although it was stuff pretty damn simple when following instructions, how could one make an error? personally i dont have a need for it, but it would be pretty damn handy for writing up rosters, working out calculations, wages etc? maybe we should swap this over to access and give making a database a go? something a little more challenging perhaps? overall, the group of office software is a handy and powerful tool for almost anything you can think of. maybe we should do work on powerpoint? i mean, if we are going back to basics, powerpoint is a tool most uni students will use, moreso than excel? and maybe not everyone knows how to use it? just a thought....
anyway, till next time, bye bye

Course Overview

well the end of the semester is upon us, and it has gone by much faster than anticipated. This course has definitly been one of the highlights for me, being into all that nerdy stuff and all. now i've been asked on what could have been improved in this course..... the only things i could think of was where the girls did that P.R lecture, maybe cut that right down, and turn it into a future careers lecture? a whole bunch of possible careers which are possible from this learning pathway? and also, maybe not do those 2 tutorial tasks on microsoft office....i mean, its all well and good, but its just so damn boring. maybe put them into just the one weeks task. also another thing we kinda came up with in the class was change the blog sizing, make it about 600 words each week, 200 words being devoted to the lecture, 200 to the task, and 200 on the textbook review. that way after 12 weeks, you pretty much know everything, and you've put it into your own words, a way for you to be able to bring it back into memory whenever needed.
well thats my 2 cents, i hope everyone else enjoyed this course and got as much as they could out of it.

pavel.

Thursday, May 10, 2007

essay

Hackers and Crackers: a common misconception

“Information sharing is a powerful, positive good, and it is the ethical duty of a hacker to share their expertise by writing free software and facilitating access to information and to computer resources wherever possible.” (Himanen 2001: 3)

In today’s day and age, the term hacker is thrown around all too lightly, The public views hackers as social outcasts, who break into computers and destroy them by exposing sensitive information, exploiting someone or spreading virii everywhere, and who can blame them? They are usually uninformed and misled into believing this via the countless many media streams, but it is nothing more than a misconception. The true definition for these people is known to the digital underground as a ‘cracker’. Every hacker’s ultimate goal is knowledge. Any possible means may be used to obtain that, including illegal ones; on the other hand, a cracker breaks into a computer system for the sheer joy of destruction and confusion. This essay will look at the origin of ‘the hack’, make clear the true hacker ethic, hackers within the work force and their benefits to society. Then it will distinguish what a ‘cracker’ is, and what they do, and finally the laws and punishments associated with computer crime.

After a group of MIT programmers from the 1960’s adopted the word ‘hack’ as a synonym for their work, came the second wave of hackers in the early 1980’s. What characterised this group was that they desperately wanted computers and computer systems designed to be useful and accessible to citizens. Now in the late 80’s, the meaning of the word hacker changed once again, the to computer underground, ‘to hack’ meant to break into a computer system, and a ‘hacker’ was the person who did this. In a book titled Hackers: heroes of the computer revolution (Levy 1984: 52) the hacker ethic is but down into 5 points.

‘All information must be free.’
‘Mistrust authority – Promote decentralisation.’
‘Hackers should be judged by their hacking, not by criteria such as degrees, age, race, or position.’
‘You can create art and beauty on a computer.’
‘Computers can change your life for the better.’

Reading the ‘Hacker Manifesto’ written in 1986 by a hacker named ‘the mentor’, who was part of the elite hacking group ‘the legion of doom’, presents a view which is similar to this, a story of the curious explorer, pursuing knowledge and intellectual challenge. The hacker ethic would state that unauthorised access to a www server would be acceptable as long as no damage is done. Now in 1991, 3 members of the legion of doom founded a company known as Comsec Data Security, a Houston based consulting firm. The firm quickly built a client list made up of several Fortune 500 companies, but just as quickly as they rose to power, the company went out of business due to media hysteria and blackballing by rival companies, exploiting the fact they were former hackers. The computer industry has a long, respected tradition of hiring so-called teams of professional hackers to attack a computer system to determine how secure it is. The idea is that only by waging a full-scale siege on a system with an authorized break-in can its true level of vulnerability be determined, so that backdoors and weaknesses are rectified.

One thing which you very rarely see the media publish is that not only do hackers help companies, but other forms of ‘ethical hacking’ such as working with various forms of justice departments to help put criminals behind bars, one example of this is an article published in the U.K newspaper the Telegraph (Bamber 1999) where hackers working in conjunction with the police, helped infiltrate a internet paedophilia community and in only 60 hours, found evidence that helped police make 19 arrests, on counts such as rape, incest, indecent assault and possession and distribution of indecent images of children. Even the U.S department of justice has looked to recruit hackers in order to conduct penetration tests on its networks (Furnell, Dowland & Sanders 1999)

On the other side of the so easily mistaken line, are ‘crackers’, whose skill levels vary on a large scale. The Chantler study (Chantler 1996) classes hackers into several factions. At the bottom end of the scale you have ‘Lamers’, people who use programs such as BO2K or ‘back orifice.’(BO2K 1999) Written by the hacking group Cult of the Dead Cow it enables any user with half a brain to control another computer from a remote location. Originally intended for ethical use, for system administrators wishing to remotely monitor systems within their network, but eventually found its way into the hands of those who would use it to maliciously attack users by entering another users system to steal passwords, delete files and also spread pre-written virii for kicks. Moving up your scale you have users who have a better understanding, who exploit weaknesses in websites in order to rearrange them, either as a joke, or for more serious issues usually politically related. One such group is the Chilean “Byond Hackers Team”, who has claimed to have more than 8000 hacks to their name, famous for hacking the NASA website, as well as government sites in their own country, the US, Israel and many other South American states(Kornakov 2006). Finally, right at the top of the scale are the crackers who hack into financial institutions and corporations for personal gain, usually in the form of money. A computer industry survey in 1998 calculated that 550 of Americas corporations, government agencies, and universities had lost more than $100million to computer related financial fraud, copyright theft, and data sabotage (Taylor 1999: 71)

Australia’s federal law on hacking has many penalties. in section 76C’ A person who intentionally and without authority or lawful excuse :(a) destroys, erases or alters data stored in, or inserts data into a Commonwealth computer;(b) interferes with, or interrupts or obstructs the lawful use of, a Commonwealth computer;(c) destroys, erases, alters or adds data stored on behalf of the Commonwealth in a computer that is not a Commonwealth computer.
All of which are possible by using programs as simple to use as the back orifice tool, the penalty for this is 10 year imprisonment! (Extract from Federal Law on Hacking 2003)
In the U.S, courts are also getting harsher with their penalties, most maximum prison sentences handed down for computer crime range from one year to 10 years. Hackers whose exploits result in injury or death -- if they disable emergency response networks or destroy electronic medical records, for example -- face 20 years to life in prison. Hackers will face up to a 25% increase in their sentences if they hijack e-mail accounts or steal personal data -- including financial and medical records and digital photographs. Convicted virus and worm authors face a 50 percent increase.
Sentences also will increase by 50 percent for hackers who share stolen personal data with anyone. The sentences will double if the information is posted on the Internet. (Krebs 2003). Perhaps the most famous hacker throughout the late 70’s to the early 90’s was Kevin Mitnick, who has been in and out of jail and in the tabloids throughout that time frame, described as a ‘brilliant and elusive cyber-thief’. (Meriwether 1995)

The media and the government will always look down upon hackers AND crackers, and make mistakes about which is which. The simple fact is a hacker builds things, a cracker breaks them. Nevertheless within their culture lies an attitude towards solving fascinating problems. Challenging ones mind is the highest form of mental stimulation, and if not for hackers and the computer enthusiasts from the 70’s and 80’s, we may not have come this far with technology. Much of our computing technology that we take for granted today, like the internet and what it has become, e-mail, word processing.. Almost everything would not be what it is today without their efforts and as long as there is technology, there will be people wishing to know more about it, inevitably, hackers will hack on.
































Bibliography

Bamber, David (1999) ‘Police hackers catch Internet paedophiles’ http://www.telegraph.co.uk/htmlContent.jhtml?html=/archive/1999/08/15/nhack15.html (accessed 28 April 2007)

‘BO2K’ http://www.BO2K.com (accessed 26 April 2007)

Caroline, A (2004) ‘Political hacktivism: tool of the underdog or scourge of cyberspace?’ Aslib Proceedings: New Information Perspectives 56(4) 212-221

Chantler, N (1996) Profile of a computer hacker Infowar Florida

‘Extract from Federal Law on Hacking’ http://www.uwa.edu.au/it/rules/fedhacking (accessed 26 April 2007)

Foltz, B (2004) ‘Cyberterrorism, computer crime, and reality’ Information management and computer security 12(2) 154-166

Furnell, S.M, Chiliarchaki, P and Dowland, P.S (2001) ‘Security analysers: administrator assistants or hacker helpers?’ Information management and computer security 9(2) 93-101

Furnell, S.M, Dowland, S.M, and Sanders, P.W (1999) ‘Dissecting the ‘Hacker Manifesto’’ Information management and computer security 7(2) 69-75

Himanen, Pekka (2001) The hacker ethic and the spirit of the information age Secker & Warburg London

Kornakov, Konstantin (2006) ‘Major hacking crew taken down in South America’ http://www.viruslist.com/en/news?id=%20206082634 (accessed 29 April 2007)

Krebs, Brian (2003) ‘Hackers to Face Tougher Sentences’ http://www.washingtonpost.com/ac2wp-dynA35261-2003Oct2language=printer
(accessed 29 April 2007)

Levy, S (1984) hackers: heroes of the computer revolution Bantam Doubleday Dell New York

Meriwether, Dan (1995) ‘Kevin Mitnick’ http://www.takedown.com/bio/mitnick.html (accessed 28 April 2007)

Smith, A.D and Rupp, W.T (2002) ‘Issues in cybersecurity: understanding the potential risks associated with hackers/crackers.’ Information management and computer security 9(2) 178-183

Taylor, P (1999) Hackers: crime in the digital sublime Routledge New York

Wednesday, April 25, 2007

3d chat environments

3d chat environments, they've been around for a pretty long time now, i remember seeing one almost 8 years ago, i think it might have been active worlds, but try running that on DIAL UP! and IM, that's been around for just as long, back when ICQ was popular, and also mIRC, which was also a was to set up basic servers for file sharing through ftp://ftp...but/ moving right along, back to the topic. i guess the major difference between the 2 are the users interface, instead of just a screen with text you have a virtual environment in which you can interact with, as well as being able to interact with the other users, i believe this makes the chat experience just that little bit more life like, allowing the user to get completely immersed in the virtual world. this also represents a very basic version of MMO's like world of warcraft or ultima online. It is much too easy to get addicted to these, if you have played wow for example, you know what i mean. You can pretty much do anything you can think of thats possible in the real world, shop, learn skills, cook, fish, hunt, leatherworking, pretty much everything, as well as things that are impossible, such as flyig etc...which definitly appeals to a lot of people out there, complete with ananomity. but with many IM programs out there now days, they allow for an almost real world chat, allowing for webcam plugins, mic etc... or if you prefer, just text based. straight to the point, just for chatting, allowing you to skip between that and say....writing a blog, or doing something else, it doesnt require as much attention.

honestly i don't mind either option, the 3d environment is like a game, and is pretty fun, whilst Msn etc.... is good for just talking, and the ability to share files, makes it very handy.

Wednesday, April 18, 2007

Photo - Celebrity

Everybodys good friend, Mr George W Bush.

Photo - Uni Life

to me, this is uni life, without this glorious beverage, all hope would be lost, and i would need more than 4 hours sleep a night. sweet sweet coffee

Photo - high tech

dont know if anyone remembers this, but its a screenshot i took of the movie 'hackers' and how they portrayed a online database, and how they 'hacked' it. couldn't stop laughing personally. but im sure many people found it amazing and the effects where definitly 'high-tech' for its day lol. go C.G.I!

Photo - Summer

chose this one as it reminds me of the seemingly never ending beaches on moreton island
on which i spent a lot of my summers as a kid.

Photo - Australian

i think this one is pretty self explanatory, whats more australian than VB or xxxx?

Photo - Games

well i chose this particular image for the games topic as it brings back memories of the old 386, back when the 2d shooters were taking off with wolfenstien 3d, only the oldies in the course will know what im talking about..haha. rock on

Wednesday, April 4, 2007

week 6

in todays lecture we had a real quick rundown on a few topics, the history of the internet, and vitual reality and the screen age. now i already knew that it all began with ARPANET. and i knew the basics with ports, firewalls, etc... but funny enough, that little cartoon really helped piece it together, and it did it so simply.

the part which really caught my attention though was the virtual reality. the whole where do we draw the line between 'virtual' and 'reality' for now, true enough, there are no senses of touch or smell within a virtual world, but who's to say in the near future that won't be the case? true enough, interest in the public eye has seen virtual reality decline over the last few years, but i've no doubt that soon enough, it will rise again, it can have so many applications, military training, in fact....any training at all. i mean flight simulator is already a standerd for pilot training. there could be recreational uses also, what if you wanted to see what it was like to be on a beach in the bahamas, without having the time to fly there and take a holiday? virtual reality could give the user a quick escape. the main issue which surrounds this is that users may get addicted to their 'virtual' world, and not be quite so productive in the real world. though if we could figure out a way to take it in moderation, i think it would be great.

who knows, maybe in many years to come, we may be living in a world where being 'plugged in' like in the matrix, may be a completely normal thing to do lol

Wednesday, March 28, 2007

week 5 tute

ahh, well this week was the intro to photoshop, tho i'd never used photoshop before, i have briefly used paint shop pro, which is pretty similar, but has a few things i really like about it, tho now, going through one of the most basic tutorials on photoshop, i find it has some pretty handy features also, for example, the magnetic lasso is great, it makes selecting things within the image SO much easier than in PSP. im still having a little bit of trouble blending layers together in an image, say if i copy something from one image, and want to paste it onto another and blend it in so it looks natural, but i'm sure it'll come to me. All the basics are the same, zooming etc, selecting objects, moving them, editing colours and contrasts, and some of the different selection tools, and brush tools.

looking through some of the online tutorials, it looks like there is some amazing stuff out there, some crazy stuff you can do with it. if it's anything like PSP there should be plenty of plug-ins out there that do some cool stuff also. I guess i just didnt like photoshop to begin with because it was a little more complicated at first, and PSP did most of the stuff i wanted, but after actually playing around with it, its not too difficult, and it's basically the industry standerd for graphic design etc.. so i might as well get to know it.

on the other hand, how can you distinguish whats real and isnt? being able to manipulate an image and basically do ANYTHING to it. sometime's it's hard to tell the difference with the digital editing being so good. poses an interesting question...

essay ideas

Start off with a brief history of the internet, and the hacker, and why they hack.

Manifesto. Ethics etc.

2 types of hackers, ones that hack for good purposes, and the others which hack and create malicious virus’s etc. they basically want to stop one MAJOR company having all the info, having all the programs ie; Microsoft. the want for more open source stuff

History of hacking? From the 80’s to now

Who was the first hacker?

What drives a person to hack?The thirst for knowledge, or the need for power, or are they sadists who like to destroy things?People who hack for profit?Jobs gained thru hacking, information security?

Hackers in today’s society, who are they? Are they your neighbours?

hacker culture

Some famous hackers

Consequences of hacking in different countries.


How hacking has evolved from the 80’s to now.

Wednesday, March 21, 2007

Week 4 tute

ok, first up we'll start with ye olde scavenger hunt


  1. The nation's largest pumpkin weighed in this weekend. It was all part of the 13th annual Giant Pumpkin Growers Championship in Rhode Island. Ron Wallace broke the record for the world's largest pumpkin, weighing in at 1,502 lbs. 1.
    http://www.49abcnews.com/news/2006/oct/09/worlds_heaviest_pumpkin_weighed/
  2. Miami Olympic heated pool, 80 pacific ave, Miami, qld, 4220 http://www.geocities/collesseum/court/5449/from_Creator.htm
  3. A giraffe’s tongue is 18-20inches long. http://www.sandiegozoo.org/animalbytes/t-giraffe.html
  4. The area of metaphysics that studies the nature of existence or being as such http://dictionary.reference.com/search?q=ontology
  5. David Cronenberg's first film was Transfer made in 19661. http://www.empirezine.com/spotlight/cronenberg/cronenberg1.htm
  6. the hackers manifesto was written in 19861. http://www.technozen.com/manifesto.htm
  7. 555 is used as a prefix to avoid actual phone numbers being phoned after people watch a certain film.. http://www.omegarobot.com/article/555.html
  8. take a flight from crete to rhodes which is only a short distance away, once greek island to another. http://www.anemos.net/tour13.htm/
  9. Rock and roll music by the beatles http://www.onmc.iinet.net.au/
  10. Brisbane punk band, the Black Assassins 10. http://www.griffith.edu.au/school/art/staff/stockwell.htm

Now, what is a search engine? a search engine is a yellow pages in essence. its comprised of a coordinated set of programs that includes:

  • a SPIDER that goes to every page or representative pages on every Web site that wants to be searchable and reads it, using hypertext links on each page to discover and read a site's other pages
  • A program that creates a huge index
  • A program that receives your search request, compares it to the entries in the index, and returns results to you

each search engine ranks differently, some exclude links if they detect spam etc etc, but most major search engines analyse how pages link to each other,they determine what a page is about and whether that page is deemed to be "important" and thus deserving of a ranking boost. My favorite has to be altavista.com, i've been using it for the last 10 years, i like the results i get, and the layout of the page.

Mailing lists.

http://www.jiscmail.ac.uk is a great site, which is linked to thousands of mailing lists, 2 of which are related to this subject are :

http://www.jiscmail.ac.uk/lists/EBAY-STUDIES.html: this is the discussion of a variety of eBay themes including identity, community, social capital, collecting in an e-society, consumption, consumer lifestyles, employment effects, website design, usability, the 'real' economy, the 'perfect market' and representations of eBay.

http://www.jiscmail.ac.uk/lists/EVOLUTIONARY-COMPUTING.html : EC covers all approaches to computing based on analogues of natural selection: eg genetic algorithms, genetic programming, evolutionary strategies and artificial life. Related fields include complex systems theory, chaos and cellular automata

as far as my essay topic goes, im leaning towards hackers, and hacker ethics....need to choose a more direct issue still.

Wednesday, March 14, 2007

Week 3 Tute

welcome back faithful reader, this week I'll be addressing the issues which were raised within the french new wave film 'La Jetee.' This film, made in the 1962 was a style of new wave film was radically different from the Hollywood blockbusters of that era, they began to use lightweight equipment, first used by documentary filmmakers. The film used a totally different style of film to which i had seen, utilising a still photo montage with voice overs.

now the film was composed during the time of the cold war, and the threat of nuclear winter was imminent, this being the basis for this film. The 'star' of the film is selected at random to participate in experiments, this being completely immoral and unethical, but i guess at the time deemed necessary for survival. (who has the right to make these decisions?) these experimenters put their Guinea pigs through these excruciating experiments in the hope to gain valuable resources which they lack. weeks go by with the main character, in a haze of pain and disorientation, and gradually the film unfolds into him recognising more and more, until he realises his captors wish to kill him, where he escapes to the past with the help of those from the future. which still, ultimately, ends in his death, coming back to that memory from the beginning of the film on the jetty at Orly.

I guess one of the key concerns is that they are trying to find a solution via technology not yet developed, something so unthinkable such as time travel, to a problem which is imminent, being nuclear war.

This could relate to us in Australia, with the current ongoing water crisis, what kinds of new technology could we implement to solve this? something that may seem completely unfathomable now, but in 20 years may become standard procedure. The same goes for the 'War on terrorism' we could end up in a similar position as the characters in the film, governments are already taking precautionary measures such as photographing and fingerprinting you when you enter the U.S. whats next? They experiment on animals, and they microchip them. Are we next to be chipped, so they can track our each and every move? Just a tad unethical and immoral don't you think?

As a fan of 12 Monkeys, i had no idea it was based on this 40 year old film. i was shocked! and looking back on both films, you can see just how similar they are, but personally i find the original more effective. Raw, brutal images do well to represent the storyline, keep the suspense, and haunt you. If you didn't catch this movie, im sure you could download it, so go see it!


Wednesday, March 7, 2007

Tute 1 10-12

Hello out there in Internet land, my name is Pavel. I've been a Chef for the past 5 years working in a restaurant in surfers paradise, needless to say, that life is rather mundane, the same thing day in day out, the same people, no new challenges whatsoever. Now as each year passed i pushed the idea of going to uni aside more and more, until it became so daunting that i was downright afraid of going. I reached a point in my life where i needed to advance myself, give myself new challenges, further my learning, etc etc. So i took the plunge and finally enrolled myself in bachelor of arts under the mature age entry option, and now that I'm actually here, it's nothing like what i expected, it's MUCH MUCH better. The people are all so friendly and helpful, and the lectures and tutes are actually ( lo and behold ) ENJOYABLE ha ha. Sure it's a big workload doing 4 subjects and still working 40 hours a week (who needs sleep eh?) but i think overall it's going to be worth it. Well worth it.

Now I've always been interested in computers, technology, the web, and basically anything geeky :P so naturally i picked New Communication Technology as one of my subjects. Just after reading the first few chapters you realise how much more there is behind it all. It's all too easy to just adapt to the new technology these days, and not fully understand it, and what the real issues behind the ideas of it are. There is SO much depth which, all along i realise is there, but don't really pay attention to, from things such as the economy, the ethics of it all, the history behind what is now basic, and what might be in store in the future. I think I'm really going to make the most of this course.

A few of the other courses I've chosen are marketing, psychology, and effective writing. Overall i want to major in digital video, and do some electives regarding the web, possibly some programming, and perhaps some which relate to popular music. After uni, I'd love to make....wait for it....documentaries. didn't see that one coming aye? a friend of mine just graduated with a bachelor of environmental science, and we love the outdoors, and I'd love to travel, see things that people have no clue about, and inform them via film. I figure, why not follow your dreams? you only live once, and you have to give it a shot, i sure as hell don't want to live the rest of my days rotting in a 10x10metre sweat box kitchen.

so there you have it, a basic overview of that which is me, my motives, and my basic interests. I'll be sure not to bore you quite so much next time and ramble on and on and on.

Pavel.