2600 Magazine: The Hacker Quarterly - MacPC - Spring 2015 (2600 Magazibe Book 32) by

2600 Magazine: The Hacker Quarterly - MacPC - Spring 2015 (2600 Magazibe Book 32) by

Language: eng
Format: mobi
Publisher: 2600 Enterprises
Published: 2015-04-05T00:00:00+00:00


I am a hacker

I have a hacker’s mind

I cannot help but problem solve,

amongst the daily grind.

I am a hacker

I see through hacker’s eyes

I find the underlying truths,

amongst assumptions and lies.

I am a hacker

I hone my hacker’s skills

I take a thing, re-purpose it,

and bend it to my will.

I am a hacker

This is my hacker’s creed

I search for understanding,

wherever it may lead.

StevieBohY

Not bad at all. Some of us feel this would work well musically as a black metal track, but that’s just an opinion. However, while you succeeded in getting printed in our pages, this was sent to the letters department and we don’t offer anything to writers other than the pride that comes with being published here. Articles are a different story, but then they’re also significantly longer than letters. The letters section is the place to bring up any topic of interest, respond to other letters, tear apart or praise an article that was recently printed, or ramble on for no discernible purpose. And poetry can fit in there as well. In this age of 140 character communication, we hope to see more people take advantage of this forum of expression and immortality. Our address is [email protected].

Dear 2600 :

Please post a link to your GPG key, with the fingerprint, on Twitter. I’m interested in submitting an article for publication... but would prefer a secure channel.

Joe

Our key is on our website in the submissions section. As we feared, we’ve already gotten several messages that somehow either mangled the key, used the wrong one, or are attempting to encrypt using an incompatible version of the encryption software. Please be certain you’re familiar with the software and are using the proper key before using this for default communications. If you want to send us a test message first, we will respond if the message is decrypted successfully, although this requires manual intervention which may take some time, depending on our workload.

Dear 2600 :

I found the letter from Justin L. Marino in your Winter 2014-2015 edition disheartening to read. Here is a man who clearly wants to make good in his life, and educate himself and others, but is being stopped from doing so because the prison is scared its own computer security is not up to scratch.

Him being incarcerated got me thinking about the old cliches of smuggling tools in cakes into prisons. Perhaps the modern day version of this would be to have the text of The Basics of Hacking and Penetration Testing embedded in a modified copy of an innocuous book that would clear the prison censors.

With all of the self-publishing possibilities on the web these days, someone could easily scan portions of a proscribed book and another less controversial (in the eyes of the authorities) book, then merge them, and voila - modern-day saw-blade in a sponge cake.

This, of course, would no doubt be illegal, but perhaps budding authors out there might write a cyber security detective novel that gives full details about how the characters go about their business.

Rob

That’s an ingenious and dangerous idea.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.