Friday, January 21, 2011

Fairer side of hacker









She in odd world


The experience of women at the entry levels of the hacking scene, mostly in online chat groups, is one of relentless sexual harassment. It is a hard battle for women to be respected in a culture dominated by teenage boys for women hackers, there’s a different kind of glass ceiling to break. Hacking has traditionally been a man’s world. But women are quietly breaking into the hacker subculture, a loose group of computer enthusiasts who meet in online chat rooms and at real-life conventions.

Not surprisingly, as in other male-dominated spheres, these women are often harassed and mocked by certain insiders — though here it is by teenage boys, who make up most of the “entry levels” of hackerdom.
The chat rooms where beginning hackers often learn technical tricks are stocked with “little hacking boys from hell … how awfully rude they are, and how intelligent they are,” according to a hacker who goes by the handle Natasha Grigori and heads antichildporn.org, an organization of hackers who track down child pornographers on the Net.

R-E-S-P-E-C-T
But the few female hackers don’t network with each other — in fact, some of their greatest trouble comes from other women, called “scene whores” — hacker groupies who use sex to get ahead. Fortunately, the few women who break through to the “elite” ranks of hacking find that at the top, what matters is your technical skills, not your gender.
“If you can match their [male hackers’] skill level and better it, they’ll give you every ounce of respect. … It’s when a female comes in and tries to play on her being feminine, that doesn’t get you anything,” says Blueberry, a 32-year-old woman from Brisbane, Australia, who founded condemned.org, another anti-child porn organization.
ABCNEWS.com spoke to more than a dozen female hackers from the United States, Australia and New Zealand for this two-part series. Last week’s piece (see related story, right) looked at who the female hackers are; this week, we examine the challenges they face.
A note about names: Like most hackers, these women choose to go by online handles. Real names will be specifically marked as such.

Hackers vs. Scene Whores
Courtnee, a 20-year-old hacker from the Pacific Northwest, says the prevalence of “hacker groupies” makes it more difficult for true female hackers to get respect. (www.twistedlens.com)
there are plenty of women at hacker conventions — they’re just not all hackers. Some are girlfriends, some wives. But the female hacker’s nemesis is the “scene whore.” These latex-clad hacker groupies haunt conventions and offer teenage boys cyber sex in chat rooms to boost their own self-esteem, female hackers say.

“The average woman, in today’s society, could remain unnoticed,” says Blaise, a 29-year-old woman from New Zealand. “Looking at an average woman in a computer society that consists of mainly antisocial men, she will be the center of attention. It’s those girls that give every woman a reputation...and that are what you have to prove yourself against before you gain any respect.” And the prevalence of scene whores has shattered any female solidarity that might exist among the hacker community, as groupies fight over the most highly skilled men and real female hackers fight the boys’ assumption that all women in the scene are groupies.
“When I first started in the scene, this one person said, you know, you can be my cyberwhore and you’ll be elite through association,” says Blueberry, who says she rejected the advance.
Dark Tangent, head of Defcon and a prominent male hacker, remembers a “scene whore” having videotaped sex with a male hacker in an elevator at the convention’s Las Vegas hotel. He warns of “evil groupies” who condition poorly adjusted male hackers to think of women as sex toys.
Natasha says she regularly has to throw women out of the IRC chat room that she hosts because they disrupt the tech talk by offering cybersex to her teenage charges.
“It’s really bad as far as the women ripping each other to shreds. This whole cybersex thing really bothers me,” Natasha says.
“A_kitten,” a 34-year-old woman from California whose Web site features sexy photos of herself, has been described as everything from a “scene whore” to a “cult leader” by terrified male hackers unwilling to give names to a reporter for fear of her “legion of groupie script kiddies” who used to crash sites on her command.
She doesn’t deny using her femininity to get her way in a male-dominated society.
“People just assume that since I am a girl and I have that power that I must be abusing it,” she says. “I think some guys are intimidated or offended by the natural power that women possess.”
But “St.” Jude Milhon, a prominent hacker from Berkeley, Calif., doesn’t see using feminine wiles as part of the spirit of hacking. “It wouldn’t be sporting. Simply be present, honest, reasonably competent, female, and everyone’s aghast.”
Fighting to Be Heard But it’s a hard battle for women to be respected in a culture dominated by teenage boys. The experience of women at the “entry levels” of the hacking scene, mostly in online chat groups, is one of relentless sexual harassment.
British sociologist Paul Taylor, author of Hackers: Crime in the Digital Sublime, terms this the “Wild, Wired West,” a rough-and-tumble social environment determined by the attitudes of insecure teenage boys trying to impress each other with “typed testosterone.”
“It’s almost like some Lord of the Flies-type environment,” he says, referring to William Golding’s novel about a group of teenage boys who descend into feral savagery when cut off from civilization.
The anonymity of online interaction also fuels sexual harassment, making it more difficult to enforce social rules and freeing the most maladjusted young men to take out their sexual frustrations on people with feminine handles, Taylor says.
“The first time I posted, I posted with a woman’s nickname. I was ripped to shreds: ‘You’re a woman, get off here, we’re not going to help you,’” Natasha says. When RosieX, founder of the Australian cyberfeminist magazine GeekGirl, got into the online bulletin board scene in 1990, she found women so intimidated by that attitude that they pretended to be male to avoid harassment.
“I was frustrated, because I wanted to learn skills and all the boys wanted to do was f---,” she says.
Even a_kitten, who takes pride in her power over those boys, sneers at them.
“For every 50 jerks on IRC, I stumble upon one nice guy that I can talk to,” she says.

Non-Sexist Elite
But the sexual gantlet seems to fade with experience. Defcon’s Dark Tangent says top-rank hackers generally stay away from the IRC channels, waiting to see whose thirst for knowledge is great enough to survive the savage atmosphere. To them, skill is all that matters, not the body it comes in.
“When you interact with people such as the L0pht, or the cDc or the most experienced members of the hacker culture, gender is a non-issue. It’s what you know that matters, and less who you are,” says Javaman, a Philadelphia-area hacker. “There is sexism at the lowest levels, but among the more skilled people, the more able people, it really is a non-issue.”
And at conventions, hackers seem to love nothing more than a woman who can fix a network breakdown. Though they’re tormented online, for some reason the rare women in hacking are treasured in person, female hackers say.
“Girls are victimized only in the bodiless state … in the flesh, they’re objects of wonder and fascination,” says Milhon.

Hacker Hangouts
There’s much debate among hackers as to what exactly is the hacker “scene.” There are plenty of hackers who aren’t part of the scene, and plenty of people - such as “scene whores,” girlfriends and just hangers-on - who aren’t hackers but who also hang out with them. Here are some places hackers congregate:

IRC chat rooms:
Hackers largely eschew AOL chat and Instant Messenger for this older form of chat. Rooms like “#hackphreak” are full of “script kiddies,” aggressive teenage boys who form the bottom of the hacker food chain. More experienced hacker groups have invitation-only rooms to which they invite promising techies. Scene whores are common here, and female hackers often have to fight off the foul-mouthed boys.
2600 meetings: A step above the IRC bunch, this in-person, scheduled meetings (named after a hackers’ magazine) let young hackers around the country socialize with their nearby peers.
Conventions: At annual meetings like Defcon in Las Vegas and HOPE in New York, thousands of male and female hackers get together to discuss computer security. Top hacking groups give lectures, people trade lots of software and script kiddies try to “prove their skills” to their elders.

Private clubs: This is where the top minds trade information. On Web pages, through e-mail and in person, groups of experienced hackers push their machines to the limit in the search for advanced technical knowledge.

Wednesday, January 19, 2011

ALL THE BEST FRIENDS, MAY YOU BE THE WINNER OF THIS COMPITITION

Basics to Become Hacker without getting caught



H e can easily tweak these according to his needs and become hacker. This is the way the term was used when Bill Gates was inventing Windows. Those who are often referred to as hackers today, should actually be called "crackers" - people who do not have unauthorized access, like a safe-cracker. If you doubt me, and want to know how to be a hacker then do a search on the term "professional hacker," and you will find many professional and legitimate computer training courses being offered. They are the ones learning the real hacker secrets. Everyone has heard of one individual or another that was caught while hacking computers that belonged to this or that organization. Because hacking into computers is highly illegal, it should be mentioned that this article will not mention any real specifics about the subject, and this author would rather gladly encourage you to become a real hacker - professionally. This article, will however, give a brief overview of criminal hackers, some of their methods, and a few things you can do to make your own computer safer from hack attacks. Here are those things you need to learn on how to become a hacker. It should go without saying that the first thing that is needed is to learn about computers. This means study. A lot of reading is involved along with just plain old-fashioned learning how to use a computer. Then, of course, there are the special aspects of computer study. The places where the tips are learned is often two-fold: a friend who has access to a computer, and a variety of places on the Web. But this is also an interesting thing - if a young person has the ability to learn, and wants to learn can use hacking tutorials- then why not take the time to learn the right things - things that can earn him a lot of money in the legit world? Is it possibly that it could be the friend he has that turns him away from the good? Search for tools on Hackers Websites and forums. Special hacker Web sites, where hackers congregate, exist on the Web - as does every other known group of people - whether legal or illegal. Some of these are known to be hacker chat rooms, hacker forum, and regular hacker sites.
It is in these Web sites, and possibly some of the people that he may meet, maybe only online, where he will learn the hacking basics, and learn how to hack. Some of the tools that a hacker may use are often varied and constantly changing. One such tool that was used last year allowed a hacker to gain control of the computers of those who simply mistyped the word Google - when trying to get the popular search engine. This automatically directed them to a special website that would give them such malware items as Trojan downloader’s, backdoors and spyware. Another tool would be the robot spider. These can be sent out and put on automatic and will look for ports of access into your computer. These spiders are running around all the time and some say that they may hit most computers that are online - up to 50 times a day. Other tools use email attachments. It is claimed that as much as 65% of all email is spam. And as much as 1 in about 30 emails contains a virus, or some form of malware. This is why having your own virus and spam protection is a must, as well as a good spyware remover. Someone is busy. Once someone has been hacking information on a computer they will often leave a Trojan file that will give them further access - often more than one file. Then they could use your computer to send out spam attacks - without you even knowing that it is taking place. Or, they could simply be hacking your personal information off of your computer. These are just a few of their tools.
One of the first things that someone would learn about hacking tutorials when studying to be a hacker is how to cover their tracks. Of course, some are better than others. A young hacker is less likely to know all the little things that an expert hacker might know. Besides, the young hacker may be trying to impress others - and get a little careless about covering his tracks. This is why younger hackers are often caught. An older hacker, on the other hand, will rarely leave any tracks. They know how to use their victim's computers as a tool for a launching place to get into another computer - leaving a phony IP address. The truth is, and it is a good thing, that computer programmers are getting better software, and hardware (firewalls) that are constantly doing a better job - both in keeping hackers out, and in recording IP addresses better for tracking purposes. There will always be hackers, and there will always be hackers in prison. The legislation is definitely turning against the hacker - with some hacking crimes becoming equal to terrorism, these days. Kevin Mitnick, a well-known hacker, had the Federal prosecutors accuse him of having caused $291 million in damages to corporate computers. A serious crime, and he remains in jail because of it - unable to touch anymore computers. Even by learning some of the wrong type of hacking basics through hacking tutorials, a young person could start down a wrong path. Hacking computers, though often glorified on TV, is still criminal.


source- hack alerts

Tuesday, January 18, 2011

BJP TO PROTECT HACKERS IF THEY PROBE IN EXPOSING CURRUPT POLITICIANS..

Mobile numbers, addresses on Facebook 'a security risk'


A security expert has warned that users should remove their home addresses and phone numbers from their Facebook accounts. Graham Cluley said the website now gives third parties access to that information. The website said in a blog post at the weekend that it would give developers of applications access to the contact information of users who install their apps. "These permissions must be explicitly granted to your application by the user via our standard permissions dialogs. Please note that these permissions only provide access to a user's address and mobile phone number, not their friend's addresses or mobile phone numbers," the Sydney Morning Herald quoted Facebook's Jeff Bowen as saying. However, Sophos security expert Cluley, has raised doubts over the move. "You have to ask yourself - is Facebook putting the safety of its 500+ million users as a top priority with this move?" he said."It won't take long for scammers to take advantage of this new facility, to use for their own criminal ends." Cluley advised that users should take personal info such as home addresses and mobile numbers off their pages. "You can imagine, for instance, that bad guys could set up a rogue app that collects mobile phone numbers and then uses that information for the purposes of SMS spamming or sells on the data to cold-calling companies," he said. (ANI) A security expert has warned that users should remove their home addresses and phone numbers from their Facebook accounts. Graham Cluley said the website now gives third parties access to that information. The website said in a blog post at the weekend that it would give developers of applications access to the contact information of users who install their apps. "These permissions must be explicitly granted to your application by the user via our standard permissions dialogs. Please note that these permissions only provide access to a user's address and mobile phone number, not their friend's addresses or mobile phone numbers," the Sydney Morning Herald quoted Facebook's Jeff Bowen as saying. However, Sophos security expert Cluley, has raised doubts over the move. "You have to ask yourself - is Facebook putting the safety of its 500+ million users as a top priority with this move?" he said. "It won't take long for scammers to take advantage of this new facility, to use for their own criminal ends." Cluley advised that users should take personal info such as home addresses and mobile numbers off their pages. "You can imagine, for instance, that bad guys could set up a rogue app that collects mobile phone numbers and then uses that information for the purposes of SMS spamming or sells on the data to cold-calling companies," he said.