Results 1 to 27 of 27

Thread: Is Your Son a Computer Hacker? (2001)

  1. #1

    Is Your Son a Computer Hacker? (2001)

    http://www.adequacy.org/stories/2001...2056.2147.html

    Author: T Reginald Gibbons
    Topic: Internet Idiocy
    Posted: Dec 02, 2001


    As an enlightened, modern parent, I try to be as involved as possible in the lives of my six children. I encourage them to join team sports. I attend their teen parties with them to ensure no drinking or alcohol is on the premises. I keep a fatherly eye on the CDs they listen to and the shows they watch, the company they keep and the books they read. You could say I'm a model parent. My children have never failed to make me proud, and I can say without the slightest embellishment that I have the finest family in the USA.
    Two years ago, my wife Carol and I decided that our children's education would not be complete without some grounding in modern computers. To this end, we bought our children a brand new Compaq to learn with. The kids had a lot of fun using the handful of application programs we'd bought, such as Adobe's Photoshop and Microsoft's Word, and my wife and I were pleased that our gift was received so well. Our son Peter was most entranced by the device, and became quite a pro at surfing the net. When Peter began to spend whole days on the machine, I became concerned, but Carol advised me to calm down, and that it was only a passing phase. I was content to bow to her experience as a mother, until our youngest daughter, Cindy, charged into the living room one night to blurt out: "Peter is a computer hacker!"

    As you can imagine, I was amazed. A computer hacker in my own house! I began to monitor my son's habits, to make certain that Cindy wasn't just telling stories, as she is prone to doing at times.

    After a few days of investigation, and some research into computer hacking, I confronted Peter with the evidence. I'm afraid to say, this was the only time I have ever been truly disappointed in one of my children. We raised them to be honest and to have integrity, and Peter betrayed the principles we tried to encourage in him, when he refused point blank to admit to his activities. His denials continued for hours, and in the end, I was left with no choice but to ban him from using the computer until he is old enough to be responsible for his actions.

    After going through this ordeal with my own family, I was left pondering how I could best help others in similar situations. I'd gained a lot of knowledge over those few days regarding hackers. It's only right that I provide that information to other parents, in the hope that they will be able to tell if their children are being drawn into the world of hacking. Perhaps other parents will be able to steer their sons back onto the straight and narrow before extreme measures need to be employed.

    To this end, I have decided to publish the top ten signs that your son is a hacker. I advise any parents to read this list carefully and if their son matches the profile, they should take action. A smart parent will first try to reason with their son, before resorting to groundings, or even spanking. I pride myself that I have never had to spank a child, and I hope this guide will help other parents to put a halt to their son's misbehaviour before a spanking becomes necessary.

    1. Has your son asked you to change ISPs?

    Most American families use trusted and responsible Internet Service Providers, such as AOL. These providers have a strict "No Hacking" policy, and take careful measures to ensure that your internet experience is enjoyable, educational and above all legal. If your child is becoming a hacker, one of his first steps will be to request a change to a more hacker friendly provider.

    I would advise all parents to refuse this request. One of the reasons your son is interested in switching providers is to get away from AOL's child safety filter. This filter is vital to any parent who wants his son to enjoy the internet without the endangering him through exposure to "adult" content. It is best to stick with the protection AOL provides, rather than using a home-based solution. If your son is becoming a hacker, he will be able to circumvent any home-based measures with surprising ease, using information gleaned from various hacker sites.

    2. Are you finding programs on your computer that you don't remember installing?

    Your son will probably try to install some hacker software. He may attempt to conceal the presence of the software in some way, but you can usually find any new programs by reading through the programs listed under "Install/Remove Programs" in your control panel. Popular hacker software includes "Comet Cursor", "Bonzi Buddy" and "Flash".

    The best option is to confront your son with the evidence, and force him to remove the offending programs. He will probably try to install the software again, but you will be able to tell that this is happening, if your machine offers to "download" one of the hacker applications. If this happens, it is time to give your son a stern talking to, and possibly consider punishing him with a grounding.

    3. Has your child asked for new hardware?

    Computer hackers are often limited by conventional computer hardware. They may request "faster" video cards, and larger hard drives, or even more memory. If your son starts requesting these devices, it is possible that he has a legitimate need. You can best ensure that you are buying legal, trustworthy hardware by only buying replacement parts from your computer's manufacturer.

    If your son has requested a new "processor" from a company called "AMD", this is genuine cause for alarm. AMD is a third-world based company who make inferior, "knock-off" copies of American processor chips. They use child labor extensively in their third world sweatshops, and they deliberately disable the security features that American processor makers, such as Intel, use to prevent hacking. AMD chips are never sold in stores, and you will most likely be told that you have to order them from internet sites. Do not buy this chip! This is one request that you must refuse your son, if you are to have any hope of raising him well.

    4. Does your child read hacking manuals?

    If you pay close attention to your son's reading habits, as I do, you will be able to determine a great deal about his opinions and hobbies. Children are at their most impressionable in the teenage years. Any father who has had a seventeen year old daughter attempt to sneak out on a date wearing make up and perfume is well aware of the effect that improper influences can have on inexperienced minds.

    There are, unfortunately, many hacking manuals available in bookshops today. A few titles to be on the lookout for are: "Snow Crash" and "Cryptonomicon" by Neal Stephenson; "Neuromancer" by William Gibson; "Programming with Perl" by Timothy O'Reilly; "Geeks" by Jon Katz; "The Hacker Crackdown" by Bruce Sterling; "Microserfs" by Douglas Coupland; "Hackers" by Steven Levy; and "The Cathedral and the Bazaar" by Eric S. Raymond.

    If you find any of these hacking manuals in your child's possession, confiscate them immediately. You should also petition local booksellers to remove these titles from their shelves. You may meet with some resistance at first, but even booksellers have to bow to community pressure.

    5. How much time does your child spend using the computer each day?

    If your son spends more than thirty minutes each day on the computer, he may be using it to DOS other peoples sites. DOSing involves gaining access to the "command prompt" on other people's machines, and using it to tie up vital internet services. This can take up to eight hours. If your son is doing this, he is breaking the law, and you should stop him immediately. The safest policy is to limit your children's access to the computer to a maximum of forty-five minutes each day.

    6. Does your son use Quake?

    Quake is an online virtual reality used by hackers. It is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms. Many hackers develop anti-social tendencies due to the use of this virtual world, and it may cause erratic behaviour at home and at school.

    If your son is using Quake, you should make hime understand that this is not acceptable to you. You should ensure all the firearms in your house are carefully locked away, and have trigger locks installed. You should also bring your concerns to the attention of his school.

    7. Is your son becoming argumentative and surly in his social behaviour?

    As a child enters the electronic world of hacking, he may become disaffected with the real world. He may lose the ability to control his actions, or judge the rightness or wrongness of a course of behaviour. This will manifest itself soonest in the way he treats others. Those whom he disagrees with will be met with scorn, bitterness, and even foul language. He may utter threats of violence of a real or electronic nature.

    Even when confronted, your son will probably find it difficult to talk about this problem to you. He will probably claim that there is no problem, and that you are imagining things. He may tell you that it is you who has the problem, and you should "back off" and "stop smothering him." Do not allow yourself to be deceived. You are the only chance your son has, even if he doesn't understand the situation he is in. Keep trying to get through to him, no matter how much he retreats into himself.

    8. Is your son obsessed with "Lunix"?

    BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called " xenix", which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the "mp3" program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone.

    Your son may try to install " lunix" on your hard drive. If he is careful, you may not notice its presence, however, lunix is a capricious beast, and if handled incorrectly, your son may damage your computer, and even break it completely by deleting Windows, at which point you will have to have your computer repaired by a professional.

    If you see the word "LILO" during your windows startup (just after you turn the machine on), your son has installed lunix. In order to get rid of it, you will have to send your computer back to the manufacturer, and have them fit a new hard drive. Lunix is extremely dangerous software, and cannot be removed without destroying part of your hard disk surface.

    9. Has your son radically changed his appearance?

    If your son has undergone a sudden change in his style of dress, you may have a hacker on your hands. Hackers tend to dress in bright, day-glo colors. They may wear baggy pants, bright colored shirts and spiky hair dyed in bright colors to match their clothes. They may take to carrying " glow-sticks" and some wear pacifiers around their necks. (I have no idea why they do this) There are many such hackers in schools today, and your son may have started to associate with them. If you notice that your son's group of friends includes people dressed like this, it is time to think about a severe curfew, to protect him from dangerous influences.

    10. Is your son struggling academically?

    If your son is failing courses in school, or performing poorly on sports teams, he may be involved in a hacking group, such as the infamous " Otaku" hacker association. Excessive time spent on the computer, communicating with his fellow hackers may cause temporary damage to the eyes and brain, from the electromagnetic radiation. This will cause his marks to slip dramatically, particularly in difficult subjects such as Math, and Chemistry. In extreme cases, over-exposure to computer radiation can cause schizophrenia, meningitis and other psychological diseases. Also, the reduction in exercise may cause him to lose muscle mass, and even to start gaining weight. For the sake of your child's mental and physical health, you must put a stop to his hacking, and limit his computer time drastically.

    I encourage all parents to read through this guide carefully. Your child's future may depend upon it. Hacking is an illegal and dangerous activity, that may land your child in prison, and tear your family apart. It cannot be taken too seriously.



  2. Remove this section of ads by registering.
  3. #2
    Bwa ha ha ha ha ha! Every single thing mentioned shows a genuine interest in computer tech, not "hacking"! $#@!ing paranoia fear mongers hard at work again!
    1776 > 1984

    The FAILURE of the United States Government to operate and maintain an
    Honest Money System , which frees the ordinary man from the clutches of the money manipulators, is the single largest contributing factor to the World's current Economic Crisis.

    The Elimination of Privacy is the Architecture of Genocide

    Belief, Money, and Violence are the three ways all people are controlled

    Quote Originally Posted by Zippyjuan View Post
    Our central bank is not privately owned.

  4. #3
    Bonzi Buddy
    That was on my son's computer. He managed to turn his laptop into a "potato" and I spent an entire week deleting crap until it would run youtube. He said it runs like a "tater tot" now. I bought him a new computer for Christmas and was going to surprise him with it but it was sitting on our front porch with the contents clearly labeled. I tried to convince him the Cyberpc extreme gaming computer was for me but he wasn't convinced I needed that kind of power for RPF's and Candy Crush Saga.

    some wear pacifiers around their necks
    O_o
    Sounds like her son has a fetish. I googled diapers once at my parents house when my kids were babies and gave them a porn virus. I didn't do internet back then (I'm not good with technology). Anyway, a bunch of adult fetish links popped up so (of course) I clicked on them. It's all fun and games until your dad asks why you were looking at fetish porn on his computer.
    Quote Originally Posted by Ron Paul View Post
    The intellectual battle for liberty can appear to be a lonely one at times. However, the numbers are not as important as the principles that we hold. Leonard Read always taught that "it's not a numbers game, but an ideological game." That's why it's important to continue to provide a principled philosophy as to what the role of government ought to be, despite the numbers that stare us in the face.
    Quote Originally Posted by Origanalist View Post
    This intellectually stimulating conversation is the reason I keep coming here.

  5. #4
    This is from 2001. That was about the time I was looking for diapers on the internet. Maybe that fetish was just a trend.
    Quote Originally Posted by Ron Paul View Post
    The intellectual battle for liberty can appear to be a lonely one at times. However, the numbers are not as important as the principles that we hold. Leonard Read always taught that "it's not a numbers game, but an ideological game." That's why it's important to continue to provide a principled philosophy as to what the role of government ought to be, despite the numbers that stare us in the face.
    Quote Originally Posted by Origanalist View Post
    This intellectually stimulating conversation is the reason I keep coming here.

  6. #5
    Worst advice ever. If my dad hadn't bought me my own computer at 10 to "hack" with, I'd probably be in prison right now. As it stands, I'm a fairly proficient network engineer with no college degree and a great job. I hope that kid turned out alright.

    Around 2001-ish, I had a kid from up north hack into about 50 computers where I work and install a botnet. I compromised his botnet and managed to figure out where he was coming from. The security office at work insisted that I contact the FBI, so I did. They were really nice but didn't have a clue what I was describing to them the first time we met. About a week later, they understood completely and had tracked the kid down from the information I had given them. I thought that was bizarre.

    They told me that they would charge him if I could show the total damages over $50,000, which I could've easily done. I asked them if they could just send someone to knock on his door and they said they would do that and smiled. They didn't want to ruin that kid's life any more than I did. A few weeks later they invited me to their regional headquarters for pizza. That was weird because I'm sure they knew about MY record. Maybe not.

    That was in the early days of the Infra Guard program. They were trying to get me to join but I politely refused. I felt dirty enough having pizza with them although they were very nice and professional. It was obvious they were a different breed than their local law enforcement brethren.

    When I was about 10 or 11, my dad got a call from the head of the TBI about some of my hacking attempts. They went to school together and still remained friends. That was enough to get me to stop doing the dumb $#@! (war dialing) and be more discreet with my hacking.

  7. #6
    ^^^Did you wear a pacifier around your neck?
    Quote Originally Posted by Ron Paul View Post
    The intellectual battle for liberty can appear to be a lonely one at times. However, the numbers are not as important as the principles that we hold. Leonard Read always taught that "it's not a numbers game, but an ideological game." That's why it's important to continue to provide a principled philosophy as to what the role of government ought to be, despite the numbers that stare us in the face.
    Quote Originally Posted by Origanalist View Post
    This intellectually stimulating conversation is the reason I keep coming here.

  8. #7
    Quote Originally Posted by Suzanimal View Post
    ^^^Did you wear a pacifier around your neck?
    Negatory. I mostly wore camo.

  9. #8
    That had to be satire, right? Right? No way that was a real article!!
    “…I believe that at this point in history, the greatest danger to our freedom and way of life comes from the reasonable fear of omniscient State powers kept in check by nothing more than policy documents.”



  10. Remove this section of ads by registering.
  11. #9
    Quote Originally Posted by DGambler View Post
    That had to be satire, right? Right? No way that was a real article!!
    it's legit.

    "is your son a computer hacker" About 881,000 results (0.72 seconds)
    “I don’t think that there will be any curtailing of Donald Trump as president,” he said. "He controls the media, he controls the sentiment [and] he controls everybody. He’s the one who will resort to executive orders more so than [President] Obama ever used them." - Ron Paul

  12. #10
    The only book you'll ever need:

    “I don’t think that there will be any curtailing of Donald Trump as president,” he said. "He controls the media, he controls the sentiment [and] he controls everybody. He’s the one who will resort to executive orders more so than [President] Obama ever used them." - Ron Paul

  13. #11
    Lunix, Debian and Mandrake are all versions of an illegal hacker operation system
    mmmkay

    Does your son use Quake?
    lol I was grand master in my day

    Most American families use trusted and responsible Internet Service Providers, such as AOL.
    omg is this $#@! for real?

    only buying replacement parts from your computer's manufacturer
    holy $#@! some inside the box isms. Every computer my kid has ever used was built from unrelated components.


    this was the only time I have ever been truly disappointed in one of my children
    first emotion would definitely be pride

    'We endorse the idea of voluntarism; self-responsibility: Family, friends, and churches to solve problems, rather than saying that some monolithic government is going to make you take care of yourself and be a better person. It's a preposterous notion: It never worked, it never will. The government can't make you a better person; it can't make you follow good habits.' - Ron Paul 1988

    Awareness is the Root of Liberation Revolution is Action upon Revelation

    'Resistance and Disobedience in Economic Activity is the Most Moral Human Action Possible' - SEK3

    Flectere si nequeo superos, Acheronta movebo.

    ...the familiar ritual of institutional self-absolution...
    ...for protecting them, by mock trial, from punishment...


  14. #12
    “I don’t think that there will be any curtailing of Donald Trump as president,” he said. "He controls the media, he controls the sentiment [and] he controls everybody. He’s the one who will resort to executive orders more so than [President] Obama ever used them." - Ron Paul

  15. #13
    Quote Originally Posted by FunkBuddha View Post
    Worst advice ever. If my dad hadn't bought me my own computer at 10 to "hack" with, I'd probably be in prison right now.
    I think I was around 14 when I hacked into university T3 connections to host asian porn for profit; hotasianxxx.edu ftw
    by 18 I realized I needed to kick the habit before I got busted.

    'We endorse the idea of voluntarism; self-responsibility: Family, friends, and churches to solve problems, rather than saying that some monolithic government is going to make you take care of yourself and be a better person. It's a preposterous notion: It never worked, it never will. The government can't make you a better person; it can't make you follow good habits.' - Ron Paul 1988

    Awareness is the Root of Liberation Revolution is Action upon Revelation

    'Resistance and Disobedience in Economic Activity is the Most Moral Human Action Possible' - SEK3

    Flectere si nequeo superos, Acheronta movebo.

    ...the familiar ritual of institutional self-absolution...
    ...for protecting them, by mock trial, from punishment...


  16. #14
    Quote Originally Posted by CPUd View Post
    it's legit.
    Sarcastically saying that a satirical article is legit is like using the word "literally" figuratively. It just confuses people. Don't do it.

    https://en.wikipedia.org/wiki/Adequacy.org

    Adequacy.org was a satirical web site.
    Adequacy first gained widespread Internet notoriety after the December 2, 2001 publication of a story entitled "Is Your Son a Computer Hacker?"
    If you wanted some sort of Ideological purity, you'll get none of that from me.

  17. #15
    Popular hacker software includes "Comet Cursor", "Bonzi Buddy" and "Flash".


    These are, of course, actually spyware/adware/annoying-or-unscrupulous-ware, but relatively benign examples. Bonzi Buddy actually can be pretty funny and entertaining to little kids -- sometimes people actually want it on their computers (such as, perhaps, Suzanimal's son).

    Oh, whoops, I didn't catch "Flash". Yeah, that's a virus. Delete it.


    Quote Originally Posted by CPUd View Post
    The only book you'll ever need:

    That is actually high truth-value.

    Anyway, well-done, funny article, Tim. Thanks for posting.
    Last edited by helmuth_hubener; 12-07-2016 at 10:19 AM.

  18. #16
    Quote Originally Posted by Sam I am View Post
    Sarcastically saying that a satirical article is legit is like using the word "literally" figuratively. It just confuses people. Don't do it.

    https://en.wikipedia.org/wiki/Adequacy.org
    It's legit I found it on the googles.
    “I don’t think that there will be any curtailing of Donald Trump as president,” he said. "He controls the media, he controls the sentiment [and] he controls everybody. He’s the one who will resort to executive orders more so than [President] Obama ever used them." - Ron Paul



  19. Remove this section of ads by registering.
  20. #17
    When I was in Junior High, I figured out enough quick basic using the book CPUd referenced above to write and compile a program to give me sysop access to this guy's Renegade BBS who I suspected of being a pedo. I logged in '*'d into the SysOp Menu poked around and then went to the file area and went through all of the pr0n. I dumped the screen capture to a file before he busted me.

    A few weeks went by and my dad got a letter from his attorney that he was going to sue my dad for what I did. I gave the file list to my dad and never heard another peep out of the guy until years later when he started his pedo $#@! with some of my friends. I put a key logger on my friends computer and told him to get the guy to come over and log into his BBS (he didn't know I was friends with the kid). He logged in and went into Sysop mode to give my friend access to pr0n. After he left, my friend called me up and I went over there and got his creds again and 0wn'd his $#@! and did the same thing with the file listings. He sent me a cease and desist letter after that.

    Then he started giving my friends Xanax, Valium and alcohol and showing them pr0n. He had surveillance cameras all over the inside of his house and he was even LEO at one point. In 1998, I got a call that one of my best friends had shot himself over at that $#@!er's house. I don't know what happened but the stories I heard were all fishy. His mother knew the story was bull$#@! too. She OD'd a few months later. I heard from other friends that there was no video of the "suicide" but that there was video of young boys masturbating in the bathroom and that the guy was being investigated and then nothing ever happened.

    I spent a lot of nights plotting to turn that $#@!ing pedo's head inside out. Even drove by his place a few times. Now I have too much to lose. He was arrested on one count of statutory rape a few years ago... Hardly justice. Every time I hear of a murder in that town I check the news hoping somebody finally killed that dude.

    I think that's why this pizzagate thing freaks me out so bad. I know these people are out there. We need more hackers in the world exposing these creeps at all levels.
    You don't have to be a whiz kid to do it, you just have to be persistent and learn to analyze problems and troubleshoot. If you aren't breaking $#@!, you're doing it wrong. The more you practice, the better you get, as with anything. Hacking is more art than science.

    Now-a-days I use my hacking powers for mostly good and I've made decent money with them. I built both of my boys their own computers before they were 5. I encourage them to do coding exercises using various web tutorials. They know they can't get by doing things they aren't supposed to on the computer... at least for now. And if they ever do figure out how to get out of my sandbox, I'll be proud.

  21. #18
    Quote Originally Posted by FunkBuddha View Post
    When I was in Junior High, I figured out enough quick basic using the book CPUd referenced above to write and compile a program to give me sysop access to this guy's Renegade BBS who I suspected of being a pedo. I logged in '*'d into the SysOp Menu poked around and then went to the file area and went through all of the pr0n. I dumped the screen capture to a file before he busted me.

    A few weeks went by and my dad got a letter from his attorney that he was going to sue my dad for what I did. I gave the file list to my dad and never heard another peep out of the guy until years later when he started his pedo $#@! with some of my friends. I put a key logger on my friends computer and told him to get the guy to come over and log into his BBS (he didn't know I was friends with the kid). He logged in and went into Sysop mode to give my friend access to pr0n. After he left, my friend called me up and I went over there and got his creds again and 0wn'd his $#@! and did the same thing with the file listings. He sent me a cease and desist letter after that.

    Then he started giving my friends Xanax, Valium and alcohol and showing them pr0n. He had surveillance cameras all over the inside of his house and he was even LEO at one point. In 1998, I got a call that one of my best friends had shot himself over at that $#@!er's house. I don't know what happened but the stories I heard were all fishy. His mother knew the story was bull$#@! too. She OD'd a few months later. I heard from other friends that there was no video of the "suicide" but that there was video of young boys masturbating in the bathroom and that the guy was being investigated and then nothing ever happened.

    I spent a lot of nights plotting to turn that $#@!ing pedo's head inside out. Even drove by his place a few times. Now I have too much to lose. He was arrested on one count of statutory rape a few years ago... Hardly justice. Every time I hear of a murder in that town I check the news hoping somebody finally killed that dude.

    I think that's why this pizzagate thing freaks me out so bad. I know these people are out there. We need more hackers in the world exposing these creeps at all levels.
    You don't have to be a whiz kid to do it, you just have to be persistent and learn to analyze problems and troubleshoot. If you aren't breaking $#@!, you're doing it wrong. The more you practice, the better you get, as with anything. Hacking is more art than science.

    Now-a-days I use my hacking powers for mostly good and I've made decent money with them. I built both of my boys their own computers before they were 5. I encourage them to do coding exercises using various web tutorials. They know they can't get by doing things they aren't supposed to on the computer... at least for now. And if they ever do figure out how to get out of my sandbox, I'll be proud.
    This is pretty much the plot for Mr. Robot episode 1.
    “I don’t think that there will be any curtailing of Donald Trump as president,” he said. "He controls the media, he controls the sentiment [and] he controls everybody. He’s the one who will resort to executive orders more so than [President] Obama ever used them." - Ron Paul

  22. #19
    Quote Originally Posted by CPUd View Post
    it's legit.
    So is the CDC but I don't recommend it to children
    https://en.wikipedia.org/wiki/Cult_of_the_Dead_Cow
    Liberty is lost through complacency and a subservient mindset. When we accept or even welcome automobile checkpoints, random searches, mandatory identification cards, and paramilitary police in our streets, we have lost a vital part of our American heritage. America was born of protest, revolution, and mistrust of government. Subservient societies neither maintain nor deserve freedom for long.
    Ron Paul 2004

    Registered Ron Paul supporter # 2202
    It's all about Freedom

  23. #20
    Quote Originally Posted by pcosmar View Post
    So is the CDC but I don't recommend it to children
    https://en.wikipedia.org/wiki/Cult_of_the_Dead_Cow
    Good Ol' Back Orifice and the Butt Plugs. The first modular trojan.

  24. #21
    “I don’t think that there will be any curtailing of Donald Trump as president,” he said. "He controls the media, he controls the sentiment [and] he controls everybody. He’s the one who will resort to executive orders more so than [President] Obama ever used them." - Ron Paul

  25. #22
    Back in the day, a "hacker" was a programmer who tended to sit at a terminal for long stretches. The term had nothing to do with criminality. I could sit for 18 hours without getting up, until whatever idiotic code I was working on was right.

    Then the media got its nose where it did not belong and the rest is sordid history.
    freedomisobvious.blogspot.com

    There is only one correct way: freedom. All other solutions are non-solutions.

    It appears that artificial intelligence is at least slightly superior to natural stupidity.

    Our words make us the ghosts that we are.

    Convincing the world he didn't exist was the Devil's second greatest trick; the first was convincing us that God didn't exist.

  26. #23
    This thread is 2600
    “I don’t think that there will be any curtailing of Donald Trump as president,” he said. "He controls the media, he controls the sentiment [and] he controls everybody. He’s the one who will resort to executive orders more so than [President] Obama ever used them." - Ron Paul

  27. #24
    Quote Originally Posted by osan View Post
    Back in the day, a "hacker" was a programmer who tended to sit at a terminal for long stretches. The term had nothing to do with criminality. I could sit for 18 hours without getting up, until whatever idiotic code I was working on was right.

    Then the media got its nose where it did not belong and the rest is sordid history.
    Hackers vs. crackers - not everybody got the memo.



  28. Remove this section of ads by registering.
  29. #25
    Quote Originally Posted by Suzanimal View Post
    ^^^Did you wear a pacifier around your neck?
    That was a druggie thing. Ecstasy made users grind teeth, so they sucked pacifiers to compensate.

  30. #26
    Quote Originally Posted by osan View Post
    Back in the day, a "hacker" was a programmer who tended to sit at a terminal for long stretches. The term had nothing to do with criminality. I could sit for 18 hours without getting up, until whatever idiotic code I was working on was right.

    Then the media got its nose where it did not belong and the rest is sordid history.
    Nowadays those that sit at a terminal for long stretches are known as poop-sockers.

  31. #27
    Quote Originally Posted by Suzanimal View Post
    O_o
    Sounds like her son has a fetish. I googled diapers once at my parents house when my kids were babies and gave them a porn virus. I didn't do internet back then (I'm not good with technology). Anyway, a bunch of adult fetish links popped up so (of course) I clicked on them. It's all fun and games until your dad asks why you were looking at fetish porn on his computer.
    Pacifiers were a raver thing (not a "druggie" thing lol), a lot of computer hackers liked techno music in 2001. A lot of ecstasy pills contained some meth and so the pacifier helped prevent teeth grinding. Yes, drugs are involved but we aren't talking about heroin and coke addicts here..
    "He's talkin' to his gut like it's a person!!" -me
    "dumpster diving isn't professional." - angelatc
    "You don't need a medical degree to spot obvious bullshit, that's actually a separate skill." -Scott Adams
    "When you are divided, and angry, and controlled, you target those 'different' from you, not those responsible [controllers]" -Q

    "Each of us must choose which course of action we should take: education, conventional political action, or even peaceful civil disobedience to bring about necessary changes. But let it not be said that we did nothing." - Ron Paul

    "Paul said "the wave of the future" is a coalition of anti-authoritarian progressive Democrats and libertarian Republicans in Congress opposed to domestic surveillance, opposed to starting new wars and in favor of ending the so-called War on Drugs."



Similar Threads

  1. The Hacker Wars
    By CPUd in forum Privacy & Data Security
    Replies: 1
    Last Post: 04-22-2015, 04:39 AM
  2. Replies: 3
    Last Post: 08-08-2009, 02:14 PM
  3. How To Know If Your Child Is A Hacker
    By yongrel in forum Open Discussion
    Replies: 9
    Last Post: 05-12-2008, 09:26 AM
  4. O Banker! My Hacker!
    By FireofLiberty in forum Economy & Markets
    Replies: 0
    Last Post: 02-08-2008, 04:37 PM
  5. Praying for a hacker supreme.
    By slamhead in forum Fox Boycott
    Replies: 9
    Last Post: 01-06-2008, 07:04 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •