Skip to content
Permalink
main
Switch branches/tags
Go to file
 
 
Cannot retrieve contributors at this time
<html>
<head>
<style><!--iframe{display:none;}--></style>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta name="GENERATOR" content="Microsoft FrontPage 3.0">
<title>r00ted </title>
</head>
<!-- '"Free Servers"' -->
<!-- Auto Banner Insertion Begin -->
<body bgcolor="#000000" link="#FF0000" vlink="#00FF00">
<p align="center"><font color="#C0C0C0" face="Courier New" size="6">This site has been
r00ted</font></p>
<p align="center">&nbsp;</p>
<p align="center"><img src="it8.jpg" alt="it8.jpg (22971 bytes)" width="448" height="336"></p>
<p align="center"><font color="#808080" face="Courier New"><big><big>Fear the Klawn...</big></big></font></p>
<p align="center"><font color="#808080">&nbsp;</font></p>
<p align="center"><font color="#808080">if you are a hacker, you are a revolutionary<br>
--Dr. Crash1 <br>
<br>
[1] Hackers have been called both techno-revolutionaries and heroes of the computer
revolution. Hacking<br>
&quot;has become a cultural icon about decentralized power.&quot;2 But for all that,
hackers are reluctant rebels.<br>
They prefer to fight with code than with words. And they would rather appear on the net
than at a news<br>
conference. Status in the hacker world cannot be granted by the general public: it takes a
hacker to know<br>
and appreciate a hacker. That's part of the hacker's revolutionary reluctance; the other
part is the news<br>
media's slant toward sensationalism, such as, &quot;A CYBERSPACE DRAGNET SNARED FUGITIVE<br>
HACKER.&quot;3 <strong>The public tends to think of hacking as synonymous with computer
crime</strong>, with breaking into<br>
computers and stealing and destroying valuable data. As a result of this tabloid
mentality, the hacker<br>
attempts to fade into the digital world, where he-and it is almost always he-has a place
if not a home. </font></p>
<p align="center"><font color="#808080">
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <em>Dr.
Crash, &quot;The Techno-Revolution,&quot; Phrack 1.6 (1986) Internet.</em><br>
<br>
[2] In his self-conception, the hacker is not a criminal, but rather a &quot;person who
enjoys exploring the details<br>
of programmable systems and how to stretch their capabilities.&quot;4 Which means that he
is not necessarily a<br>
computer geek. The hacker defines himself in terms that extend beyond the computer, as an
&quot;expert or<br>
enthusiast of any kind. One might be an astronomy hacker&quot; (Jargon File). So in the
broadest sense of his<br>
self-conception, the hacker hacks knowledge; he wants to know how things work, and the
computer-the<br>
prototypical programmable system-simply offers more complexity and possibility, and thus
more<br>
fascination, than most other things. From this perspective, hacking appears to be a
harmless if nerdish<br>
enthusiasm. But at the same time, this seemingly innocent enthusiasm is animated by an
ideology that leads<br>
to a conflict with civil authority. The hacker is motivated by the belief that the search
for knowledge is an<br>
end in itself and should be unrestricted. But invariably, when a hacker explores
programmable systems, he<br>
encounters barriers that bureaucracies impose in the name of security. For the hacker,
these security<br>
measures become arbitrary limits placed on his exploration, or in cases that often lead to
confrontation, they<br>
become the focus of further explorations: for the hacker, security measures simply
represent a more<br>
challenging programmable system. As a result, when a hacker explores such systems, he
hacks knowledge,<br>
but ideologically he hacks the freedom to access knowledge. </font></p>
<p align="center"><font face="Courier New" color="#808080">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</font><font
color="#808080"><em>Gareth Branwyn, &quot;Introduction:&quot; Secrets of a Super Hacker by
The Knightmare</em></font></p>
<p align="center"><font color="#808080" face="Courier New">&nbsp;</font></p>
<p align="center"><font color="#808080" face="Courier New">You know who you Are.</font></p>
<p align="center"><font color="#808080" face="Courier New">I know who i´m Not.I am no
Hacker for doing this.</font></p>
<p align="center"><font color="#808080" face="Courier New">You can call me...newbie,
script kiddie, whatever. But i hope this to be useful, and someday, somehow THEY&nbsp; all
get the message and stop talking about Hackers as if they were scum like
thieves,criminals, murderers and other shit, and start to worry about the real
criminals...yes.. those who have Power,(whatever the country you live on),those who want
to manipulate our lives to favour theirs.</font></p>
<p align="center"><font color="#808080" face="Courier New">&nbsp; </font></p>
<p align="left"><font color="#808080" face="Courier New">&nbsp;&nbsp;&nbsp; Hack In Peace.</font></p>
<p align="left"><font color="#808080" size="2" face="Courier New">&nbsp;&nbsp; </font>&nbsp;&nbsp;
&nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp;
&nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp;
&nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; <font
color="#808080" size="2" face="Courier New">KyZseR : <a href="mailto:kyzser@yahoo.com">kyzser@yahoo.com</a></font></p>
<p align="left"><font color="#808080" size="2" face="Courier New">I thank the people that
supports what I´m doing...and for the others who don´t, the only thing i can say
is...YOU JUST DON´T GET IT.</font></p>
<p align="center"><font color="#808080" size="4" face="Courier New">-----------------------------</font></p>
<p align="left"><font color="#C0C0C0" size="2" face="Courier New"><strong>Administrador</strong>:
aca esta el <a href="default1.htm">index.htm</a> original.</font></p>
<p align="left"><font color="#C0C0C0" size="2" face="Courier New"><strong>Shoutz</strong>:</font><font
color="#C0C0C0"> SiDhArTtA kiWI®</font><font color="#C0C0C0" size="2">, Out-A-Time, Emi,
Apocalypse Dow, Basanio&nbsp; and all those who stand for our&nbsp; privacy and freedom of
speech.&nbsp; <font face="Courier New">&nbsp;&nbsp;&nbsp;&nbsp; </font></font><font
color="#C0C0C0" size="2" face="Courier New">&nbsp;&nbsp; </font></p>
<p align="center"><font color="#C0C0C0" size="2" face="Courier New"><a
href="http://www.securityfocus.com">www.securityfocus.com</a>|<a
href="http://packetstorm.securify.com">PacketStorm</a>|<a href="http://www.alldas.de">www.alldas.de</a>|<a
href="http://www.2600.com">www.2600.com</a>|<a href="http://www.safemode.org">www.safemode.org</a>|<a
href="http://www.projectgamma.com">ProjectGamma </a><a href="http://www.attrition.org">www.attrition.org</a>|<a
href="http://www.cyberarmy.com">www.cyberarmy.com</a>|<a href="http://www.hackernews.com">HNN</a>|<a
href="http://www.deficiency.org">www.deficiency.org</a>|<a
href="http://www.403-security.org">www.403-security.org</a></font></p>
<p align="center"><img src="fuckyou1.gif" alt="fuckyou1.gif (17074 bytes)" width="150"
height="100"></p>
<p align="center"><font color="#FFFF00" face="Courier New"><big><big><big><big><big><big><big><big><big><big><big>MPAA</big></big></big></big></big></big></big></big></big></big></big></font></p>
<p align="center">&nbsp;</p>
<p align="center">&nbsp;</p>
</body>
<!-- que cosas ehhh -->
</html>
</noscript>
<!-- -->
</noscript>
<SCRIPT LANGUAGE="JavaScript">
<!--
browser = (((navigator.appName == "Netscape") && (parseInt(navigator.appVersion) >= 2 )) || ((navigator.appName == "Microsoft Internet Explorer") && (parseInt(navigator.appVersion) >= 2 )));
browser4 = (((navigator.appName == "Netscape") && (parseInt(navigator.appVersion) >= 4 )) || ((navigator.appName == "Microsoft Internet Explorer") && (parseInt(navigator.appVersion) >= 4 )));
if (browser4) {
if (!self.url) {
self.url = '';
}
if (parent.name != 'test') {
test = window.open("http://click.go2net.com/adpopup?site=HM&shape=noshape&border=1&area=DIR.APPAREL&sizerepopup=1&hname=UNKNOWN", "test", "resizable=yes,width=528,height=200");
}
} else if (browser) {
if (!self.url) {
self.url = '';
}
if (parent.name != 'test') {
test = window.open("http://click.go2net.com/adpopup?site=HM&shape=banner&border=1&area=DIR.APPAREL&hname=UNKNOWN", "test", "resizable=yes,width=528,height=200");
}
}
//-->
</SCRIPT>
<!-- www.attrition.org web hack mirror - watermark or something -->