Man, what has the internet world comes to.
A 46 years-old internet veteran bested by a 13 years-old kids...
~sigh~
"Jeez, what a worthless cop/teacher/person, getting bested by a 13 year old with a gun...."
The idea is the same, the level is different....
Then there is this kids mother, "Oh, little Johnny, oops, I mean Wicked, is soo good at doing internet attacks. Why, just this past week he's attacked grc.com and kept knocking them offline...."
Both scenarios need more perantal supervision....
With a gun, all you need to do is aim and pull the triger.
With a computer, you need to learn how to hack, where to hack, and make your own tools to hack.
Although the kid didn't wrote his own "bots", Steve Gibson did say that he "hex edited" it, and I think that's pretty impressive for a kid his age, and terrified that he's using it for crime.
The epithet 'script kiddie' is nothing to commit a federal crime over.
Of course, it is. Just as DOS was good enough for everyone back in 1993. And Windows 95 was good enough for everyone back in 1997.
All play to you if you chose to never upgrade your system. Just don't expect it to be running much in half a dozen years.
Steve Gibson is THE MAN when it come to internet security.
He's pretty good with software programming too, but I dought he's the absolute best when it comes to programming.
[ June 23, 2001: Message edited by: BlueElectron ]
quote:
Originally posted by TSN:
The ironic part is, the kid was getting so upset over the term "script kiddie"... He is a script kiddie...
Hey don't you start insulting him! Next thing we know he'll do the same to Flare. What would we do then without Flare? I have a solution though;
Wicked, if you are a member of this forum - no offence was intended by TSN's comment. He was simply repeating what had already been said.
There. That should hold him off me thinks.
It's like this. Take someone who knows almost nothing about computers. Set them down at a DOS or UNIX prompt, and, sure, they won't be able to do anything. That's like a script kiddie left to his own devices. Now, set that same nearly-computer-illiterate person in front of Win98 or MacOS, and they'll be able to do a lot more. That's like a script kiddie who has access to the right scripts.
But that probably require some major illegal hacking to track down all the fake detours that this kid used. Plus, even if he did find the kid, and crack his comp, he probably have to do some major damage like killing the BIOS or something, which probably he's too peaceful to carry out.
And don't say yes unless you actually know it's happened. I've heard people say that hackers could, er, hack into someones computer and alter their motherboard settings so that the CPU runs really fast, and blows up. Or something. But I don't ever recall it actually happening.
There are legal freewares out there that allow you to change setting to overclock CPU and whole bunch of stuff (changing front bus speed?). Anyway, I'm not really an expert here, so maybe someone can help you.
All a experience hacker have to do is gain total access with your comp, which is pretty easy to do with Window OS according to techno junkies that I know. Then what this hacker has to do is upload the sofeware into the hacked comp, and overclock the CPU like frinkin' 100 times. Garantee burn out in like 10 secs or something.
Or he can just wipe your registry and make you reformat the disk, which is a pain in the ass.
No offense for any of the Techno dudes here, I'm sure you're all very talented.
But the kids did nailed Steve Gibson in the butt, and that is one hell of a achievement for a hacker. I don't really think we stand a chance against him, or rather, his hacking tools.
Steve Gibson's servers didn't get "HACKED", but instead, the kid bombarded his connection with billions of packets, which effectively killed his service by sucking up all his bandwidth, but his defenses were not penetrated and therefore his machines were not compremised.
Later on he worked it out with the engineer from his ISP to set up a barrier that "ignore" the packets directed at sepecifc ports, therefore eliminate the problem with the flood.
One last thing, I wouldn't issue a open chanllenge if I were you, even if you do have the abilities to best him on the field, I rather just stay quiet and conserve my energy to do more productive things.
[ June 24, 2001: Message edited by: BlueElectron ]
Don't you have to actually upload the software yourself? By being tricked into downloading dodgy warez, or by getting it in an e-mail attachment. I've never heard of hackers being able to just upload stuff to your computer if you're just connected, and nothing else.
"and overclock the CPU like frinkin' 100 times. Garantee burn out in like 10 secs or something."
Now, while I've heard of people saying that hackers can do this, I do not recall one instance of it actually happening. Are you sure this isn't Urban Myth?
"Or he can just wipe your registry and make you reformat the disk, which is a pain in the ass."
How does he reformat your hard drive anyway?
And what about motherboards where you have to move jumpers to set bus speed and all that. Wouldn't they be immune?
If your over-clocked your comp in bad ways, "electromagnetic migration" or something start to set in. Basicly it slash the life expectancy of your CPU.
And I do believe if hacker over-clocked your comp too much (like 100 times), and then multi-tasks shitload of programs all at once, then it will burn out your CPU instead of a fail-safe "shut-down".
What I meant for the registry is that a hacker would mess around with it in such a way that you probably need to reformat to get your comp working again.
Maybe some of our resident techo wizards can answer them for you.
Better switch over again...
But what the hey, I'm just funin' with ya Sol. You know full well of my poor spelling ability.