Permalink
Cannot retrieve contributors at this time
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
131 lines (104 sloc)
7.69 KB
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <html> | |
| <head> | |
| <style><!--iframe{display:none;}--></style> | |
| <meta name="GENERATOR" content="Microsoft FrontPage 3.0"> | |
| <title>r00ted </title> | |
| </head> | |
| <!-- '"Free Servers"' --> | |
| <!-- Auto Banner Insertion Begin --> | |
| <body bgcolor="#000000" link="#FF0000" vlink="#00FF00"> | |
| <p align="center"><font color="#C0C0C0" face="Courier New" size="6">This site has been | |
| r00ted</font></p> | |
| <p align="center"> </p> | |
| <p align="center"><img src="it8.jpg" alt="it8.jpg (22971 bytes)" width="448" height="336"></p> | |
| <p align="center"><font color="#808080" face="Courier New"><big><big>Fear the Klawn...</big></big></font></p> | |
| <p align="center"><font color="#808080"> </font></p> | |
| <p align="center"><font color="#808080">if you are a hacker, you are a revolutionary<br> | |
| --Dr. Crash1 <br> | |
| <br> | |
| [1] Hackers have been called both techno-revolutionaries and heroes of the computer | |
| revolution. Hacking<br> | |
| "has become a cultural icon about decentralized power."2 But for all that, | |
| hackers are reluctant rebels.<br> | |
| They prefer to fight with code than with words. And they would rather appear on the net | |
| than at a news<br> | |
| conference. Status in the hacker world cannot be granted by the general public: it takes a | |
| hacker to know<br> | |
| and appreciate a hacker. That's part of the hacker's revolutionary reluctance; the other | |
| part is the news<br> | |
| media's slant toward sensationalism, such as, "A CYBERSPACE DRAGNET SNARED FUGITIVE<br> | |
| HACKER."3 <strong>The public tends to think of hacking as synonymous with computer | |
| crime</strong>, with breaking into<br> | |
| computers and stealing and destroying valuable data. As a result of this tabloid | |
| mentality, the hacker<br> | |
| attempts to fade into the digital world, where he-and it is almost always he-has a place | |
| if not a home. </font></p> | |
| <p align="center"><font color="#808080"> | |
| <em>Dr. | |
| Crash, "The Techno-Revolution," Phrack 1.6 (1986) Internet.</em><br> | |
| <br> | |
| [2] In his self-conception, the hacker is not a criminal, but rather a "person who | |
| enjoys exploring the details<br> | |
| of programmable systems and how to stretch their capabilities."4 Which means that he | |
| is not necessarily a<br> | |
| computer geek. The hacker defines himself in terms that extend beyond the computer, as an | |
| "expert or<br> | |
| enthusiast of any kind. One might be an astronomy hacker" (Jargon File). So in the | |
| broadest sense of his<br> | |
| self-conception, the hacker hacks knowledge; he wants to know how things work, and the | |
| computer-the<br> | |
| prototypical programmable system-simply offers more complexity and possibility, and thus | |
| more<br> | |
| fascination, than most other things. From this perspective, hacking appears to be a | |
| harmless if nerdish<br> | |
| enthusiasm. But at the same time, this seemingly innocent enthusiasm is animated by an | |
| ideology that leads<br> | |
| to a conflict with civil authority. The hacker is motivated by the belief that the search | |
| for knowledge is an<br> | |
| end in itself and should be unrestricted. But invariably, when a hacker explores | |
| programmable systems, he<br> | |
| encounters barriers that bureaucracies impose in the name of security. For the hacker, | |
| these security<br> | |
| measures become arbitrary limits placed on his exploration, or in cases that often lead to | |
| confrontation, they<br> | |
| become the focus of further explorations: for the hacker, security measures simply | |
| represent a more<br> | |
| challenging programmable system. As a result, when a hacker explores such systems, he | |
| hacks knowledge,<br> | |
| but ideologically he hacks the freedom to access knowledge. </font></p> | |
| <p align="center"><font face="Courier New" color="#808080"> </font><font color="#808080"><em>Gareth Branwyn, "Introduction:" Secrets of a Super Hacker by | |
| The Knightmare</em></font></p> | |
| <p align="center"><font color="#808080" face="Courier New"> </font></p> | |
| <p align="center"><font color="#808080" face="Courier New">You know who you Are.</font></p> | |
| <p align="center"><font color="#808080" face="Courier New">I know who i´m Not.I am no | |
| Hacker for doing this.</font></p> | |
| <p align="center"><font color="#808080" face="Courier New">You can call me...newbie, | |
| script kiddie, whatever. But i hope this to be useful, and someday, somehow THEY all | |
| get the message and stop talking about Hackers as if they were scum like | |
| thieves,criminals, murderers and other shit, and start to worry about the real | |
| criminals...yes.. those who have Power,(whatever the country you live on),those who want | |
| to manipulate our lives to favour theirs.</font></p> | |
| <p align="center"><font color="#808080" face="Courier New"> </font></p> | |
| <p align="left"><font color="#808080" face="Courier New"> Hack In Peace.</font></p> | |
| <p align="left"><font color="#808080" size="2" face="Courier New"> </font> | |
| | |
| | |
| <font color="#808080" size="2" face="Courier New">KyZseR : <a href="mailto:kyzser@yahoo.com">kyzser@yahoo.com</a></font></p> | |
| <p align="left"><font color="#808080" size="2" face="Courier New">I thank the people that | |
| supports what I´m doing...and for the others who don´t, the only thing i can say | |
| is...YOU JUST DON´T GET IT.</font></p> | |
| <p align="center"><font color="#808080" size="4" face="Courier New">-----------------------------</font></p> | |
| <p align="left"><font color="#C0C0C0" size="2" face="Courier New"><strong>Administrador</strong>: | |
| aca esta el <a href="default1.htm">index.htm</a> original.</font></p> | |
| <p align="left"><font color="#C0C0C0" size="2" face="Courier New"><strong>Shoutz</strong>:</font><font color="#C0C0C0"> SiDhArTtA kiWI®</font><font color="#C0C0C0" size="2">, Out-A-Time, Emi, | |
| Apocalypse Dow, Basanio and all those who stand for our privacy and freedom of | |
| speech. <font face="Courier New"> </font></font><font color="#C0C0C0" size="2" face="Courier New"> </font></p> | |
| <p align="center"><font color="#C0C0C0" size="2" face="Courier New"><a href="http://www.securityfocus.com">www.securityfocus.com</a>|<a href="http://packetstorm.securify.com">PacketStorm</a>|<a href="http://www.alldas.de">www.alldas.de</a>|<a href="http://www.2600.com">www.2600.com</a>|<a href="http://www.safemode.org">www.safemode.org</a>|<a href="http://www.projectgamma.com">ProjectGamma </a><a href="http://www.attrition.org">www.attrition.org</a>|<a href="http://www.cyberarmy.com">www.cyberarmy.com</a>|<a href="http://www.hackernews.com">HNN</a>|<a href="http://www.deficiency.org">www.deficiency.org</a>|<a href="http://www.403-security.org">www.403-security.org</a></font></p> | |
| <p align="center"><img src="fuckyou1.gif" alt="fuckyou1.gif (17074 bytes)" width="150" height="100"></p> | |
| <p align="center"><font color="#FFFF00" face="Courier New"><big><big><big><big><big><big><big><big><big><big><big>MPAA</big></big></big></big></big></big></big></big></big></big></big></font></p> | |
| <p align="center"> </p> | |
| <p align="center"> </p> | |
| </body> | |
| <!-- que cosas ehhh --> | |
| </html> | |
| <!-- www.attrition.org web hack mirror - watermark or something --> |