mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
85 lines
4.9 KiB
Text
85 lines
4.9 KiB
Text
![]() |
Volume One, Issue Six, Phile 3 of 13
|
||
|
|
||
|
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
||
|
|
||
|
The Techno-Revolution
|
||
|
|
||
|
by
|
||
|
|
||
|
Doctor Crash
|
||
|
|
||
|
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
||
|
|
||
|
Hacking. It is a full time hobby, taking countless hours per week to learn,
|
||
|
experiment, and execute the art of penetrating multi-user computers. Why do
|
||
|
hackers spend a good portion of their time hacking? Some might say it is
|
||
|
scientific curiosity, others that it is for mental stimulation. But the true
|
||
|
roots of hacker motives run much deeper than that. In this file I will
|
||
|
describe the underlying motives of the aware hackers, make known the
|
||
|
connections between Hacking, Phreaking, Carding, and Anarchy, and make known
|
||
|
the "techno-revolution" which is laying seeds in the mind of every hacker.
|
||
|
|
||
|
To fully explain the true motives behind hacking, we must first take a
|
||
|
quick look into the past. In the 1960's, a group of MIT student built the
|
||
|
first modern computer system. This wild, rebellious group of young men were
|
||
|
the first to bear the name "hackers". The systems that they developed were
|
||
|
intended to be used to solve world problems and to benefit all of mankind.
|
||
|
|
||
|
As we can see, this has not been the case. The computer system has been
|
||
|
solely in the hands of big businesses and the government. The wonderful device
|
||
|
meant to enrich life has become a weapon which dehumanizes people. To the
|
||
|
government and large businesses, people are no more than disk space, and the
|
||
|
government doesn't use computers to arrange aid for the poor, but to control
|
||
|
nuclear death weapons. The average American can only have access to a small
|
||
|
microcomputer which is worth only a fraction of what they pay for it. The
|
||
|
businesses keep the true state of the art equipment away from the people behind
|
||
|
a steel wall of incredibly high prices and bureaucracy. It is because of this
|
||
|
state of affairs that hacking was born.
|
||
|
|
||
|
Hackers realize that the businesses aren't the only ones who are entitled
|
||
|
to modern technology. They tap into online systems and use them to their own
|
||
|
advantage. Of course, the government doesn't want the monopoly of technology
|
||
|
broken, so they have outlawed hacking and arrest anyone who is caught. Even
|
||
|
worse than the government is the security departments of businesses and
|
||
|
companies. They act as their own "private armies" and their ruthless tactics
|
||
|
are overlooked by the government, as it also serves their needs.
|
||
|
|
||
|
Hacking is a major facet of the fight against the computer monopoly. One
|
||
|
of the ways hackers accomplish their means has developed into an art in itself:
|
||
|
Phone Phreaking. It is essential that every Hacker also be a Phreak, because
|
||
|
it is necessary to utilize the technology of the phone company to access
|
||
|
computers far from where they live. The phone company is another example of
|
||
|
technology abused and kept from people with high prices.
|
||
|
|
||
|
Hackers often find that their existing equipment, due to the monopoly
|
||
|
tactics of computer companies, is inefficient for their purposes. Due to the
|
||
|
inexorbitantly high prices, it is impossible to legally purchase the necessary
|
||
|
equipment. This need has given still another segment of the fight: Credit
|
||
|
Carding. Carding is a way of obtaining the necessary goods without paying for
|
||
|
them. It is again due to the companies stupidity that Carding is so easy, and
|
||
|
shows that the world's businesses are in the hands of those with considerably
|
||
|
less technical know-how than we, the hackers.
|
||
|
|
||
|
There is one last method of this war against computer abusers. This is a
|
||
|
less subtle, less electronic method, but much more direct and gets the message
|
||
|
across. I am speaking of what is called Anarchy. Anarchy as we know it does
|
||
|
not refer to the true meaning of the word (no ruling body), but to the process
|
||
|
of physically destroying buildings and governmental establishments. This is a
|
||
|
very drastic, yet vital part of this "techno-revolution."
|
||
|
|
||
|
Hacking must continue. We must train newcomers to the art of hacking. We
|
||
|
must also increase computer Crashing. I know that crashing a computer seems a
|
||
|
waste, but when there is no other way to subvert a business, their system must
|
||
|
be shut down.
|
||
|
|
||
|
As I stated above, this is only on the motives. If you need a tutorial on
|
||
|
how to perform any of the above stated methods, please read a file on it. And
|
||
|
whatever you do, continue the fight. Whether you know it or not, if you are a
|
||
|
hacker, you are a revolutionary. Don't worry, you're on the right side.
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
If you have a question or comment about this file or the "techno-
|
||
|
revolution" just leave mail for me on the Metal Shop AE (314)256-7284, or any
|
||
|
other BBS I may happen to be on.
|
||
|
|
||
|
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|