home *** CD-ROM | disk | FTP | other *** search
- ==Phrack Inc.==
-
- Volume One, Issue Six, Phile #3 of 13
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- The Techno-Revolution
-
- by
-
- Doctor Crash
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- Hacking. It is a full time hobby, taking countless hours per week to learn,
- experiment, and execute the art of penetrating multi-user computers. Why do
- hackers spend a good portion of their time hacking? Some might say it is
- scientific curiosity, others that it is for mental stimulation. But the true
- roots of hacker motives run much deeper than that. In this file I will
- describe the underlying motives of the aware hackers, make known the
- connections between Hacking, Phreaking, Carding, and Anarchy, and make known
- the "techno-revolution" which is laying seeds in the mind of every hacker.
-
- To fully explain the true motives behind hacking, we must first take a
- quick look into the past. In the 1960's, a group of MIT student built the
- first modern computer system. This wild, rebellious group of young men were
- the first to bear the name "hackers". The systems that they developed were
- intended to be used to solve world problems and to benefit all of mankind.
-
- As we can see, this has not been the case. The computer system has been
- solely in the hands of big businesses and the government. The wonderful device
- meant to enrich life has become a weapon which dehumanizes people. To the
- government and large businesses, people are no more than disk space, and the
- government doesn't use computers to arrange aid for the poor, but to control
- nuclear death weapons. The average American can only have access to a small
- microcomputer which is worth only a fraction of what they pay for it. The
- businesses keep the true state of the art equipment away from the people behind
- a steel wall of incredibly high prices and bureaucracy. It is because of this
- state of affairs that hacking was born.
-
- Hackers realize that the businesses aren't the only ones who are entitled
- to modern technology. They tap into online systems and use them to their own
- advantage. Of course, the government doesn't want the monopoly of technology
- broken, so they have outlawed hacking and arrest anyone who is caught. Even
- worse than the government is the security departments of businesses and
- companies. They act as their own "private armies" and their ruthless tactics
- are overlooked by the government, as it also serves their needs.
-
- Hacking is a major facet of the fight against the computer monopoly. One
- of the ways hackers accomplish their means has developed into an art in itself:
- Phone Phreaking. It is essential that every Hacker also be a Phreak, because
- it is necessary to utilize the technology of the phone company to access
- computers far from where they live. The phone company is another example of
- technology abused and kept from people with high prices.
-
- Hackers often find that their existing equipment, due to the monopoly
- tactics of computer companies, is inefficient for their purposes. Due to the
- inexorbitantly high prices, it is impossible to legally purchase the necessary
- equipment. This need has given still another segment of the fight: Credit
- Carding. Carding is a way of obtaining the necessary goods without paying for
- them. It is again due to the companies stupidity that Carding is so easy, and
- shows that the world's businesses are in the hands of those with considerably
- less technical know-how than we, the hackers.
-
- There is one last method of this war against computer abusers. This is a
- less subtle, less electronic method, but much more direct and gets the message
- across. I am speaking of what is called Anarchy. Anarchy as we know it does
- not refer to the true meaning of the word (no ruling body), but to the process
- of physically destroying buildings and governmental establishments. This is a
- very drastic, yet vital part of this "techno-revolution."
-
- Hacking must continue. We must train newcomers to the art of hacking. We
- must also increase computer Crashing. I know that crashing a computer seems a
- waste, but when there is no other way to subvert a business, their system must
- be shut down.
-
- As I stated above, this is only on the motives. If you need a tutorial on
- how to perform any of the above stated methods, please read a file on it. And
- whatever you do, continue the fight. Whether you know it or not, if you are a
- hacker, you are a revolutionary. Don't worry, you're on the right side.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- If you have a question or comment about this file or the "techno-
- revolution" just leave mail for me on the Metal Shop AE (314)256-7284, or any
- other BBS I may happen to be on.
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- ==============================================================================
-
-
-