*DAMN R6
.:Navigation:| Home | Battle League | Forum | Mac Downloads | PC Downloads | Cocobolo Mods |:.

Welcome, Guest. Please login or register.
May 05, 2025, 01:27:12 pm

Login with username, password and session length
Search:     Advanced search
One Worldwide Gaming Community since 13th June 2000
132957 Posts in 8693 Topics by 2294 Members
Latest Member: xoclipse2020
* Home Help Search Login Register
 Ads
+  *DAMN R6 Forum
|-+  *DAMN R6 Community
| |-+  General Gossip (Moderators: Grifter, cookie, *DAMN Hazard, c| Lone-Wolf, BTs_GhostSniper)
| | |-+  Re: here we go again.....
Pages: 1 [2]   Go Down
Print
Author Topic: Re: here we go again.....  (Read 3640 times)
0 Members and 1 Guest are viewing this topic.
Grifter
Moderator
God bless the freaks
*****
Offline Offline

Gender: Male
Posts: 1376


Detroit, where the weak are killed and eaten


WWW
« Reply #20 on: August 06, 2001, 05:15:54 pm »

Romeo, most comercial programs that are used for hacking are legit network problem solving applications.  It's just known that these are the same programs used by many hackers to probe networks for weaknesses.  There are also a bunch of underground apps and scripts for doing pure hacking tasks like brute force attacks, demon dialers, etc.  None of these programs are illegal (is there *any* illegal program at all?).  It's just what you do with them.  And once again..... most HACKING is not illegal... it's a definate violation of your ISP ToS, but usually not illegal (MOST is a BIG word...  port scanning the local bank or FBI or IRS is not illegal, just stupid.... actually taking down their systems, breaking in, deleting files, etc... that's illegal).  Most laws have not caught up with the technology age yet.

Romulus, yes, there are comercial programs to remotly control other computers (dial in or network).  Timbuktoo was one of those, PC anywhere for wintel's is another.... a couple more that I know about.  This is not hacking, but remote network access/control programs.  Also, it is NOT illegal to hack into your own computer.. you are giving yourself permission to do it, after all.... this is how most hackers practice.  Load a copy of the program they are wanting to exploit, then attack it from another computer in their home.... once they figure out the vulnerabilities... they just then need apply them to the actual target of their adolecent wet dreams.....

« Last Edit: January 01, 1970, 01:00:00 am by 1029654000 » Logged

"...to the last, I grapple with thee; from Hell's heart, I stab at thee; for hate's sake, I spit my last breath at thee."
SiGmA_X
Forum Whore
****
Offline Offline

Gender: Male
Posts: 625


Take a look to the sky before you die


WWW
« Reply #21 on: August 06, 2001, 05:26:33 pm »

Ok. I sorta understand. My friend had a hacker in his computer. It was some sort of server that was placed through Napster... How does THAT work? Ill add more in a litle while...
« Last Edit: January 01, 1970, 01:00:00 am by 1029654000 » Logged

-SiGmA_X
Dual AMD XP1800+ (OC'd 1.8GHz with air), GeForce4Ti4400 (OC'd 300/600 with air), 2x60GB Seagate HDDs, 80GB IBM HDD, 1GB DDR333 PC-2700

Grifter, RIP

Pages: 1 [2]   Go Up
Print
Jump to:  



 Ads
Powered by SMF 1.1.7 | SMF © 2006-2007, Simple Machines LLC
Page created in 0.059 seconds with 19 queries.