Wednesday, August 09, 2006

Ignorance Kills

I was googling around looking for something interesting and come across an article called "Is You Son a Computer Hacker?" by Reginald Gibbons. I thaught i would look interesting so i went and started reading... after a couple minuites i was very, very upset because the article was total BS!! After a little bit of thinking i thaught it might be a joke but i found that it was not...i was frustrated by his ignorance in writting about something he had apsolutly no clue about. I will give you an overview of the article with my thaughts on each part.

How to determine if your kid is a Hacker Acording to Reginald Gibbons

1. Has your son asked you to change ISPs?
Gibbons: "If your child is becoming a hacker, one of his first steps will be to request a change to a more hacker friendly provider."

Me: This is tottal BS...changing to a different ISP is not a sign of becoming a hacker...especialy if you are switching from slow AOL...

2. Are you finding programs on your computer that you don't remember installing?
Gibbons: "Your son will probably try to install some hacker software." ... "Popular hacker software includes 'Comet Cursor', 'Bonzi Buddy' and 'Flash'."

Me: [[Comet Cursor: A program which allows websites to change your mouse cursor when you are on their website to get the full effect of the webpage]]. It is by no means a hacker program AT ALL. You would have to be a complete idiot to think so!! [[Bonzi Buddy: A web enhancing program packaged with various other programs]]...this is just a little app that is packed with spyware/malware/adware that helps you browse the internet...hackers have apsolutly no uses for this program...what are they going to do with it? ask the monkey what to do next? At the end of Gibbons list is 'Flash'...when i say this is was just shocked that somebody could be soo ignorant...Flash has no uses for hackers at all!! All it does is enhance the experiance of internet users.

3. Has your child asked for new hardware?
Gibbons: "Computer hackers are often limited by conventional computer hardware. They may request 'faster' video cards, and larger hard drives, or even more memory. " ... "If your son has requested a new 'processor' from a company called 'AMD', this is genuine cause for alarm. AMD is a third-world based company who make inferior, "knock-off" copies of American processor chips. They use child labor extensively in their third world sweatshops, and they deliberately disable the security features that American processor makers, such as Intel, use to prevent hacking. AMD chips are never sold in stores, and you will most likely be told that you have to order them from internet sites. Do not buy this chip! This is one request that you must refuse your son, if you are to have any hope of raising him well."

Me: First off as a geek i love getting new hardware...not because i am a hacker and am "limited by conventional harware" but because i enjoy getting the best performance from my machine. Gibbons mentions that hackers may request hardware like a faster videocard, a larger harddrive or more memory...A hacker would not prosper by having a faster videocard..it would not effect him at all...most hacking is done through a console unlike most hacker movie show (eg. Swordfish and the hacking GUI). Then he comes to saying that "AMD is a third-world based company who make inferior, "knock-off" copies of American processor chips." This is the one of the stupidest thing i think i have ever heard... [[AMD is the second largest microprocessor producer in the world]] and just because they leave thier processors more open so they can be overclocked easier does not mean they are more hacker friendly. [[Most computers you buy retail now have AMD chips in them, because they are less expensive, and much quicker, thus enhancing the computing experience]].

4. Does your child read hacking manuals?
Gibbons: "There are, unfortunately, many hacking manuals available in bookshops today. A few titles to be on the lookout for are: 'Snow Crash' and 'Cryptonomicon' by Neal Stephenson; 'Neuromancer' by William Gibson; 'Programming with Perl' by Timothy O'Reilly; 'Geeks' by Jon Katz; 'The Hacker Crackdown' by Bruce Sterling; 'Microserfs' by Douglas Coupland; 'Hackers' by Steven Levy; and 'The Cathedral and the Bazaar' by Eric S. Raymond." ... "If you find any of these hacking manuals in your child's possession, confiscate them immediately."

Me: Sure there are many hacker books on the market...it is an interesting topic. [[Oh man...Programming With Perl? Your son would not like to become a hacker, but rather a coder for a large computer software company or internet company. Thanks, dad, for crushing his dreams of one day becoming a multimillionaire.]]

5. How much time does your child spend using the computer each day?
Gibbons: "If your son spends more than thirty minutes each day on the computer, he may be using it to DOS other peoples sites." ... "This can take up to eight hours."

Me: Most teens don't spend thier time on the computer using Dos to gain control of other peoples computer...they spend their time playing games and don't harm anything. By the way Dos'ing is more commonly known as 'flooding'. [[DOS'ing usually doesn't take 8 hours, although I can see that on AOL...It'd take 8 hours just to send out that many signals to one system, and more than likely it wouldn't be effective. ]]

6. Does your son use Quake?
Gibbons: "Quake is an online virtual reality used by hackers. t is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms. Many hackers develop anti-social tendencies due to the use of this virtual world, and it may cause erratic behaviour at home and at school."

Me: Quake is a GAME not a virtual reality used by hackers to train. Train in the use of variouse firearms? It is just a game...a first person shooter...the guns are not real!!

7. Is your son becoming argumentative and surly in his social behaviour?
Gibbons: "As a child enters the electronic world of hacking, he may become disaffected with the real world. He may lose the ability to control his actions, or judge the rightness or wrongness of a course of behaviour. This will manifest itself soonest in the way he treats others. Those whom he disagrees with will be met with scorn, bitterness, and even foul language. He may utter threats of violence of a real or electronic nature."

Me: Just because a child is interested in computers doesn't mean he will become disconnected with the "real world". Hackers are people too, and they function like all other people...just becuase they are hackers doesn't mean they fit the hacker stereo type... Also note that adolence could be effecting thier behavior.

8. Is your son obsessed with "Lunix"?
Gibbons: "BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called 'xenix', which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the "mp3" program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone.

Your son may try to install 'lunix' on your hard drive. If he is careful, you may not notice its presence, however, lunix is a capricious beast, and if handled incorrectly, your son may damage your computer, and even break it completely by deleting Windows, at which point you will have to have your computer repaired by a professional."

Me: When i read this section i was enraged...Lunix is a usinx based operating system for the commador 64...if your kid is still using one of those you should consider upgrading. First off linux is not an illegal operating system!! Lunix is different from every other example Gibbons gave... the rest use the linux kernel where Lunix has it's own. The linux kernel developed by Linyos Torovoltos is not based on xenix but is inspired by Minix. I have no clue where Gibbons comes up with his facts but i have yet to find one that is true. I have no clue what gibbons was doing when he wrote this article but this section is TOTTAL BS and makes no sence what so ever. [[Break into their stereos? In case you didn't notice when you were setting up your system, you didn't hook your stereo up to your computer...or wait, did you? God knows what happened when you set that thing up. MP3 files are compressed CD Audio files, and are used widely in the daily range of activities. And what's this bullsh*t about not noticing if Linux is installed? IT'S A TOTALLY DIFFERENT OPERATING SYSTEM THAT REPLACES WINDOWS!!! It's impossible not to notice it. It'd be clear as day when your dumb ass couldn't figure out why the f*ck your system had completely changed. And Linux is very easily removed by inserting your Compaq Recovery CD. And just for your info, when you send your computer back to the manufacturer, they're going to just restore it using the recovery CD, and laugh all day because of how idiotic you are.]]

9. Has your son radically changed his appearance?
Gibbons: "If your son has undergone a sudden change in his style of dress, you may have a hacker on your hands. Hackers tend to dress in bright, day-glo colors. They may wear baggy pants, bright colored shirts and spiky hair dyed in bright colors to match their clothes. They may take to carrying "glow-sticks" and some wear pacifiers around their necks. (I have no idea why they do this) There are many such hackers in schools today, and your son may have started to associate with them. If you notice that your son's group of friends includes people dressed like this, it is time to think about a severe curfew, to protect him from dangerous influences."

Me: In the section above Gibbons mentions that the creator of the linux kernel, Linyos Torovoltos is a computer hacker...to the left is a picture of him. Does he meet the description of a hacker acording to Gibbons? No because hes is NOT a hacker. [[I believer you're referring to the ever-growing group of stylists known as "ravers". They go to parties known as raves, and usually are on some form of sedative or the like. Special-K, i.e. Ketamine is highly popular, because it is easy to find and cheap to purchase. It is cat tranquilizer in small doses, and horse tranquilizer in large doses. Nextly, E, or extasy, is the next most popular drug. It is ingested in the form of a pill, and cause people to "roll" at raves, because of the intense lightshows. If your son was wearing raver clothing, more than likely you shouldn't worry about him being a hacker, but rather being under the influence of some drug or another. Nice detective work, Sherlock.]]

10. Is your son struggling academically?
Gibbons: "

If your son is failing courses in school, or performing poorly on sports teams, he may be involved in a hacking group, such as the infamous "Otaku" hacker association. Excessive time spent on the computer, communicating with his fellow hackers may cause temporary damage to the eyes and brain, from the electromagnetic radiation. This will cause his marks to slip dramatically, particularly in difficult subjects such as Math, and Chemistry. In extreme cases, over-exposure to computer radiation can cause schizophrenia, meningitis and other psychological diseases. Also, the reduction in exercise may cause him to lose muscle mass, and even to start gaining weight. For the sake of your child's mental and physical health, you must put a stop to his hacking, and limit his computer time drastically.
I encourage all parents to read through this guide carefully. Your child's future may depend upon it. Hacking is an illegal and dangerous activity, that may land your child in prison, and tear your family apart. It cannot be taken too seriously."

Me: Computers help chiI was googling around looking for something interesting and come across an article called "Is You Son a Computer Hacker?" by Reginald Gibbons. I thaught i would look interesting so i went and started reading... after a couple minuites i was very, very upset because the article was total BS!! After a little bit of thinking i thaught it might be a joke but i found that it was not...i was frustrated by his ignorance in writting about something he had apsolutly no clue about. I will give you an overview of the article with my thaughts on each part.

How to determine if your kid is a Hacker Acording to Reginald Gibbons

1. Has your son asked you to change ISPs?
Gibbons: "If your child is becoming a hacker, one of his first steps will be to request a change to a more hacker friendly provider."

Me: This is tottal BS...changing to a different ISP is not a sign of becoming a hacker...especialy if you are switching from slow AOL...

2. Are you finding programs on your computer that you don't remember installing?
Gibbons: "Your son will probably try to install some hacker software." ... "Popular hacker software includes 'Comet Cursor', 'Bonzi Buddy' and 'Flash'."

Me: . It is by no means a hacker program AT ALL. You would have to be a complete idiot to think so!! ...this is just a little app that is packed with spyware/malware/adware that helps you browse the internet...hackers have apsolutly no uses for this program...what are they going to do with it? ask the monkey what to do next? At the end of Gibbons list is 'Flash'...when i say this is was just shocked that somebody could be soo ignorant...Flash has no uses for hackers at all!! All it does is enhance the experiance of internet users.

3. Has your child asked for new hardware?
Gibbons: "Computer hackers are often limited by conventional computer hardware. They may request 'faster' video cards, and larger hard drives, or even more memory. " ... "If your son has requested a new 'processor' from a company called 'AMD', this is genuine cause for alarm. AMD is a third-world based company who make inferior, "knock-off" copies of American processor chips. They use child labor extensively in their third world sweatshops, and they deliberately disable the security features that American processor makers, such as Intel, use to prevent hacking. AMD chips are never sold in stores, and you will most likely be told that you have to order them from internet sites. Do not buy this chip! This is one request that you must refuse your son, if you are to have any hope of raising him well."

Me: First off as a geek i love getting new hardware...not because i am a hacker and am "limited by conventional harware" but because i enjoy getting the best performance from my machine. Gibbons mentions that hackers may request hardware like a faster videocard, a larger harddrive or more memory...A hacker would not prosper by having a faster videocard..it would not effect him at all...most hacking is done through a console unlike most hacker movie show (eg. Swordfish and the hacking GUI). Then he comes to saying that "AMD is a third-world based company who make inferior, "knock-off" copies of American processor chips." This is the one of the stupidest thing i think i have ever heard... and just because they leave thier processors more open so they can be overclocked esiar does not mean they are more hacker friendly.

4. Does your child read hacking manuals?
Gibbons: "There are, unfortunately, many hacking manuals available in bookshops today. A few titles to be on the lookout for are: 'Snow Crash' and 'Cryptonomicon' by Neal Stephenson; 'Neuromancer' by William Gibson; 'Programming with Perl' by Timothy O'Reilly; 'Geeks' by Jon Katz; 'The Hacker Crackdown' by Bruce Sterling; 'Microserfs' by Douglas Coupland; 'Hackers' by Steven Levy; and 'The Cathedral and the Bazaar' by Eric S. Raymond." ... "If you find any of these hacking manuals in your child's possession, confiscate them immediately."

Me: Sure there are many hacker books on the market...it is an interesting topic.

5. How much time does your child spend using the computer each day?
Gibbons: "If your son spends more than thirty minutes each day on the computer, he may be using it to DOS other peoples sites." ... "This can take up to eight hours."

Me: Most teens don't spend thier time on the computer using Dos to gain control of other peoples computer...they spend their time playing games and don't harm anything. By the way Dos'ing is more commonly known as 'flooding'.

6. Does your son use Quake?
Gibbons: "Quake is an online virtual reality used by hackers. t is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms. Many hackers develop anti-social tendencies due to the use of this virtual world, and it may cause erratic behaviour at home and at school."

Me: Quake is a GAME not a virtual reality used by hackers to train. Train in the use of variouse firearms? It is just a game...a first person shooter...the guns are not real!!

7. Is your son becoming argumentative and surly in his social behaviour?
Gibbons: "As a child enters the electronic world of hacking, he may become disaffected with the real world. He may lose the ability to control his actions, or judge the rightness or wrongness of a course of behaviour. This will manifest itself soonest in the way he treats others. Those whom he disagrees with will be met with scorn, bitterness, and even foul language. He may utter threats of violence of a real or electronic nature."

Me: Just because a child is interested in computers doesn't mean he will become disconnected with the "real world". Hackers are people too, and they function like all other people...just becuase they are hackers doesn't mean they fit the hacker stereo type... Also note that adolence could be effecting thier behavior.

8. Is your son obsessed with "Lunix"?
Gibbons: "BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called 'xenix', which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the "mp3" program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone.

Your son may try to install 'lunix' on your hard drive. If he is careful, you may not notice its presence, however, lunix is a capricious beast, and if handled incorrectly, your son may damage your computer, and even break it completely by deleting Windows, at which point you will have to have your computer repaired by a professional."

Me: When i read this section i was enraged...Lunix is a usinx based operating system for the commador 64...if your kid is still using one of those you should consider upgrading. First off linux is not an illegal operating system!! Lunix is different from every other example Gibbons gave... the rest use the linux kernel where Lunix has it's own. The linux kernel developed by Linyos Torovoltos is not based on xenix but is inspired by Minix. I have no clue where Gibbons comes up with his facts but i have yet to find one that is true. I have no clue what gibbons was doing when he wrote this article but this section is TOTTAL BS and makes no sence what so ever.

9. Has your son radically changed his appearance?
Gibbons: "If your son has undergone a sudden change in his style of dress, you may have a hacker on your hands. Hackers tend to dress in bright, day-glo colors. They may wear baggy pants, bright colored shirts and spiky hair dyed in bright colors to match their clothes. They may take to carrying "glow-sticks" and some wear pacifiers around their necks. (I have no idea why they do this) There are many such hackers in schools today, and your son may have started to associate with them. If you notice that your son's group of friends includes people dressed like this, it is time to think about a severe curfew, to protect him from dangerous influences."

Me: In the section above Gibbons mentions that the creator of the linux kernel, Linyos Torovoltos is a computer hacker...to the left is a picture of him. Does he meet the description of a hacker acording to Gibbons? No because hes is NOT a hacker.

10. Is your son struggling academically?
Gibbons: "

If your son is failing courses in school, or performing poorly on sports teams, he may be involved in a hacking group, such as the infamous "Otaku" hacker association. Excessive time spent on the computer, communicating with his fellow hackers may cause temporary damage to the eyes and brain, from the electromagnetic radiation. This will cause his marks to slip dramatically, particularly in difficult subjects such as Math, and Chemistry. In extreme cases, over-exposure to computer radiation can cause schizophrenia, meningitis and other psychological diseases. Also, the reduction in exercise may cause him to lose muscle mass, and even to start gaining weight. For the sake of your child's mental and physical health, you must put a stop to his hacking, and limit his computer time drastically.
I encourage all parents to read through this guide carefully. Your child's future may depend upon it. Hacking is an illegal and dangerous activity, that may land your child in prison, and tear your family apart. It cannot be taken too seriously."

Me: Computers help childern learn...i am done commenting on Gibbons total disregard to the truth and the facts. [[Well since you bought a new computer, emissions standards have virtually eliminated all radiation by computers, disproving your brain and eye damage theory. Most hackers are very intelligent, and excel in such subjects as math and foreign languages. And for everyone's knowledge, meningitis is NOT A PSYCHOLOGICAL DISEASE!!! IT'S BACTERIAL!!!]]

Note: text enclosed by [[]] is quoted from here

Conclusion:
Answering Gibbons questions:

1. Yes...i have changed my ISP a couple times [i wanted a faster conection].
2. I have flash on my linux laptop (the other programs do not work on linux i believe)
3. Yes i have asked for new hardware for variose computers in my house.
4. Yes i read hacking manuals because they are interesting (The unofficial guide to ethical hacking)
5. I spend many many hours a day on my computer. A lot more than 30 minuites a day...if i had the restriction i would die.
6. I have never played Quake but i have played quake 4 and 3...
7. No...just because i am a geek doesn't mean i do not have a life
8. Yes i love linux :)
9. Sometimes for fun :)
10. I only struggle accademicly when i don't work

So...acording to Gibbons i am a hacker. (Note that Gibbons is using the term 'Hacker' in a foul way. As in breaking the law.) I am not denying that i am a hacker...i will leave it up to you to decide (see this [note the bottom text])
Note: the term hacker takes on many meanings. Some of which are:
1. One who is proficient at using or programming a computer; a computer buff.
2. One who uses programming skills to gain illegal access to a computer network or file
ldern learn...i am done commenting on Gibbons total disregard to the truth and the facts.

Note: text enclosed by [[]] is quoted from here

Conclusion:
Answering Gibbons questions:

1. Yes...i have changed my ISP a couple times [i wanted a faster conection].
2. I have flash on my linux laptop (the other programs do not work on linux i believe)
3. Yes i have asked for new hardware for variose computers in my house.
4. Yes i read hacking manuals because they are interesting (The unofficial guide to ethical hacking)
5. I spend many many hours a day on my computer. A lot more than 30 minuites a day...if i had the restriction i would die.
6. I have never played Quake but i have played quake 4 and 3...
7. No...just because i am a geek doesn't mean i do not have a life
8. Yes i love linux :)
9. Sometimes for fun :)
10. I only struggle accademicly when i don't work

So...acording to Gibbons i am a hacker. (Note that Gibbons is using the term 'Hacker' in a foul way. As in breaking the law.) I am not denying that i am a hacker...i will leave it up to you to decide (see this [note the bottom text])
Note: the term hacker takes on many meanings. Some of which are:
1. One who is proficient at using or programming a computer; a computer buff.
2. One who uses programming skills to gain illegal access to a computer network or file

4 comments:

Anonymous said...

Congratulation to being hacker ;)

This is an old article (from 2001) in interesting category "Internet Idiocy"
http://www.adequacy.org/stories/2001.12.2.42056.2147.html
It seems that it really upset you :))


Have you read the comments to this article? It's worth to. You'll enjoy it.

Anonymous said...

Wahahahaha! That's a good one. :-D

By the way, have you ever read Snow Crash? I can recommend it, really brilliant. Add it to your "Hacker library". ;-) Then you know what inspired Google Earth and The Second Life etc...

PS: Your posting is somehow duplicated, can you fix that?

Collin said...

Thanks for the comment lukas and seapegasus. I did read some of the comments on the article and they where quite funny :) At first the article upset me a little because i thaught people actualy would believe him...after reading the comments i just thaught it was a good laugh :) I have never heard of Snow Crash before i read this article..i will give it a read.

btw i fixed the double posting issue early this morning

Anonymous said...

shame on that guy! just to stereotype hackers is all too wrong -- how much more to pin down innocent teenagers as hackers!

i prefer reading Dan Verton's confessions of teenage hackers. at least that one's based on facts and evidences.