isc-f20-013y 是什么电解抛光标准f19 f20

全部标准国家标准行业标准国外标准
您的位置:
ISUZU ISC-F20-011-2001&&测试方法色牢度由学振型测试仪日语/英语版摩擦
ISUZU ISC-F20-011-2001&&测试方法色牢度由学振型测试仪日语/英语版摩擦
ISUZU ISC-F20-011-2001
测试方法色牢度由学振型测试仪日语/英语版摩擦
test method for color fastness to rubbing by gakushin-type tester japanese/english version
日语(部分英语)
五十铃汽车标准ISUZU
纸质版或者PDF电子版(用Acrobat Reader打开)或Word版本doc格式
相关免费标准
本类标准下载排行
本类最新免费标准
版权所有:www.ZBGB.org &&|
鲁ICP备号-21全部标准国家标准行业标准国外标准
您的位置:
ISUZU ISC-F20-019-2001&&胶粘剂的比重和密封材料的测量程序日文/英文版本
ISUZU ISC-F20-019-2001&&胶粘剂的比重和密封材料的测量程序日文/英文版本
ISUZU ISC-F20-019-2001
胶粘剂的比重和密封材料的测量程序日文/英文版本
specific gravity of adhesive and sealing material measurement procedure japanese/english version
日语(部分英语)
五十铃汽车标准ISUZU
纸质版或者PDF电子版(用Acrobat Reader打开)或Word版本doc格式
相关免费标准
本类标准下载排行
本类最新免费标准
版权所有:www.ZBGB.org &&|
鲁ICP备号-21全部标准国家标准行业标准国外标准
您的位置:
ISUZU ISC-F20-030-2006&&测试程序清晰度,对图像的漆膜(波扫描GD值)日语/英语版
ISUZU ISC-F20-030-2006&&测试程序清晰度,对图像的漆膜(波扫描GD值)日语/英语版
ISUZU ISC-F20-030-2006
测试程序清晰度,对图像的漆膜(波扫描GD值)日语/英语版
test procedure for distinctness-of-image for paint film (wave-scan gd value) japanese/english version
日语(部分英语)
五十铃汽车标准ISUZU
纸质版或者PDF电子版(用Acrobat Reader打开)或Word版本doc格式
相关免费标准
本类标准下载排行
本类最新免费标准
版权所有:www.ZBGB.org &&|
鲁ICP备号-21==Phrack Inc.==
Volume 0x0c, Issue 0x41, Phile #0x01 of 0x0f
|=-----------------------------------------------------------------------=|
|=--------------------------=[ Introduction ]=---------------------------=|
|=-----------------------------------------------------------------------=|
|=-------------------=[ By The Circle of Lost Hackers ]=-----------------=|
|=-----------------------------------------------------------------------=|
Welcome back.
Another year has passed, another PHRACK issue is out, PHRACK65.
Every time somebody gives me a present I end up thinking to the story of
that gift. Where did it come from ? Who worked on it ? Did who worked on
it ever thought that his work would have end up in my hands ?
What about a PHRACK issue ?
PHRACK comes from the underground, the underground worked on it, submitting
papers, sending feedback, commenting, spending long night chatting,
reading, BREATHING. Does the underground still breath ?
Things change, panta rei. As hackers, we have fun. We want fun. Hacking is
fun. You know it because you did it, because you spent nights and nights on
this fucking fun, going to sleep at 6 a.m. and waking up three hours later
to present your face at school or work, with your brain still back home on
your encrypted work. Are you still having fun ?
Please, don't take it personally, don't over-react. It's just a question.
A question that everybody should pose to themselves every single day, no
matter what he is doing. FUN is not only PAYBACK. We are human, we love
receiving congrats, who doesn't ? We LOVE seeing our little work spread
around. We love the clap-clap-clap sound. But does it really boil down only
When you lose fun and start doing things only for the payback, you're dead.
Everyone of you who experienced a bad job or a bad exam topic knows the
feeling of "wasting time on useless things" that pops out in those moments.
But, most of the time, you _HAVE TO_ do it.
Well, nobody _HAS TO DO_ hacking. Nobody.
If you are only doing that for a payback, than you are a DEAD hacker.
If you are only doing that to present a paper to a conference, to see your
name somewhere, than you are a DEAD hacker.
It will work. You don't need fun to be skilled, you don't even need to be
skilled to post or to go to a conference, there are so many around that
everybody has some hole to fix. But your touch with the underground is
gone. Your responsibility towards friends, ideas, codes will slowly fade
away. HACKING is also responsibility and FUN is the only way to not feel
its pressure
You might disagree, just post on your idea. Maybe it is a too dark
scenario, maybe it is just a spring blues, maybe I am just pessimistic, but
this is the feeling. This is money taking over everywhere, this is seeing
more and more things done only for the payback.
This is seeing the underground heart beating slower and slower.
PHRACK is just an example of what the underground has been able to do. Of
what we can do. But so many hackers out there are capable of disrupting the
system without having to read or write a magazine like we do. We are
entering into a period where Government and Politics are trying to control
technology with supposed-anti-terrorism laws. And they don't lack money
or good congrats.
So please, please, help this fucking heart beating faster, pushing blood
around. Please HAVE FUN.
This is the 65th edition of Phrack and we are still alive. Despite that
some people say they don't learn anything when reading phrack we still
think that Phrack is one of the best underground communication methods. Oh
well, for sure, there are other and even better ways. But Phrack is one way
and probably not the worse. We have tried to release this issue earlier but
editing a magazine (and especially Phrack) is not easy. We have received a
lot of positive comments after Phrack release #64 and a lot of people said
they will contribute. However we did not see anything coming. Almost all
articles from this release are coming from our first circle of friends.
This release, despite that it is not the perfect one, tries to bring
a good mix between technical articles and what we call spirit articles. Our
introducing and concluding articles (Phrack Prophile and The Underground
Myth) bring two opposite visions of the hacking underground.
Contradiction? No. Freedom of speech.
We have kept with our regular columns Phrack World News and International
Scenes. We also have decided to publish less exploit articles. However,
low-level hackers should find their way easily into this new release.
[-]=====================================================================[-]
For this issue, we are bringing you the following :
0x01 Introduction
0x02 Phrack Prophile of The UNIX Terrorist
0x03 Phrack World News
0x04 Stealth Hooking: another way to subvert the Windows kernel
0x05 Clawing holes in NAT with UPnP
felinemenace
0x06 The only laws on Internet are assembly and RFCs
0x07 Hacking the System Management Mode
BSDaemon, coideloko, d0nand0n
0x08 Mystifying the debugger for ultimate stealthness
0x09 Australian Restricted Defense Networks and FISSO
0x0a Phook - The PEB Hooker
shearer & dreg
0x0b Hacking the $49 Wifi Finder
openschemes
0x0c The art of exploitation: Samba WINS stack overflow
max_packetz
0x0d The Underground Myth
0x0e Hacking your brain: Artificial Conciousness
0x0f International scenes
Windows stealth hooking article brings a deep analysis of the XP kernel
internals by presenting two sophisticated backdooring techniques. It is
generally hard to find valuable reverse engineering articles covering
*new* topics and satisfying our standards, but these guys have made a great
job. Make sure also to check out the PEB Hooker and the full published
source code if M$ software reversing is your thing. Both of those articles
will bring you a very good read.
Felinemenace is featured again and brings you one of their latest hacks on
more recent network protocols. Our second network article digs into FISSO
by introducing not-so-public information about australian restricted
As we continue to care about cryptography, Phrack #65 includes a useful
cryptographic concept of deniable encryption, a particulary relevant topic
for hackers. Check out Julia's article for all details.
As mentioned, we have tried to bring you the best low-level hacking around.
Articles such as Hacking the System Management Mode, Hacking the $49 Wifi
Finder, Mystifying the debugger, are not really 0day for those of you
already in the underground, but aim to bring you sufficiently material to
develop your creativity on that matter.
Finally, we could not release Phrack without at least one exploitation
article. Max Packets has done the job of describing step by step his
Samba WINS exploit. The information contained herein will certainly be
enough for those of you guys who want to develop their own.
Scene Shoutz:
-------------
Again, Phrack #65 could not have happened without so many people. Thanks
to the admins, coders, hackers, scripterz.
Shouts : mauro, sysk, leandro, assad, kiwicon for an amazing conference
with a lot of original topics. As long as you stay a non profit event
Phrack will support you! We are also looking forward to the next BACon in
september 2008. Shouts to all south american hackers & expats.
No shouts: All supposed "Underground people" who asked us million
times when Phrack will be out but never contribute to the magazine. If
you guys were a little more productive perhaps Phrack would be released
more often. Also, we will -not- help poor indonesians bypassing
government's p0rn websites filters. Sorry .
* cucamonga (xt@) has joined #phrack
why hasnt phrack65 been leaked yet
probably coz i don't have it
probably cause nobody wants to read it
Phrack has not been leaked this time...sorry for that... probably because
shiftee needs to sharpen his hacking skills instead of posing on IRC. He
could also read Phrack, we will not deny his IP address. Any questions,
send us an email.
Flames: vegas (insecure wannabe), HDM (pwnie coward)
Enjoy the magazine!
[-]=====================================================================[-]
Nothing may be reproduced in whole or in part without the prior written
permission from the editors. Phrack Magazine is made available to the
public, as often as possible, free of charge.
|=-----------=[ C O N T A C T
P H R A C K
M A G A Z I N E ]=---------=|
: circle[at]phrack{dot}org
Submissions
: circle[at]phrack{dot}org
Commentary
: loopback[@]phrack{dot}org
Phrack World News : pwn[at]phrack{dot}org
|=-----------------------------------------------------------------------=|
Submissions may be encrypted with the following PGP key:
(Hint: Always use the PGP key from the latest issue)
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.5 (GNU/Linux)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-----END PGP PUBLIC KEY BLOCK-----
phrack:~# head -22 /usr/include/std-disclaimer.h
All information in Phrack Magazine is, to the best of the ability of
the editors and contributors, truthful and accurate.
When possible,
all facts are checked, all code is compiled.
However, we are not
omniscient (hell, we don't even get paid).
It is entirely possible
something contained within this publication is incorrect in some way.
If this is the case, please drop us some email so that we can correct
it in a future issue.
Also, keep in mind that Phrack Magazine accepts no responsibility for
the entirely stupid (or illegal) things people may do with the
information contained herein.
Phrack is a compendium of knowledge,
wisdom, wit, and sass.
We neither advocate, condone nor participate
in any sort of illicit behavior.
But we will sit back and watch.
Lastly, it bears mentioning that the opinions that may be expressed in
the articles of Phrack Magazine are intellectual property of their
These opinions do not necessarily represent those of the Phrack Staff.
==Phrack Inc.==
Volume 0xc, Issue 0x41, Phile #0x02 of 0x0f
|=------------------------=[ PHRACK PROPHILE ON ]=----------------------=|
|=----------------------------------------------------------------------=|
|=------------------------=[ The UNIX Terrorist ]=----------------------=|
|=----------------------------------------------------------------------=|
In this issue of Phrack, we have renewed with publishing the prophile
of an influencial underground character. The UNIX terrorist was already
prophiled two years ago but for some editorial reasons at the time, we
were not able to get his prophile published. Now that the Phrack editorial
staff has less open conflicts with some part of the scene represented by
the_uT, we want to make sure everyone remember his engagement. A lot of
people believed he was an extremist blackhat hacker proning non-disclosure
during his time of activity. That was true. But he was not just this.
I have known the UNIX Terrorist in real life seven years ago. At this time,
during his youth, the_uT was a softer hacker. Dont get me wrong, the_uT
(or whatever he was calling himself before) always had this characteristic
personality that made him an exceptionally creative dude. Later on, after
he started body-building (rumors mention that he followed the advices of
his idol Mike Shifman), he got that impressive shape that certainly
represented better his mind shift towards a more aggressive prophile. The
UNIX terrorist is the result of this evolution from a young skilled hacker
to a disabused philosopher of the underground.
This prophile was realized by The Paper Street Hacker in November 2007
for publication in Phrack Magazine #65 by TCLH. Remember the opinion
reflected in this interview only engages the UNIX Terrorist and does not
represent the opinion of the Phrack editors.
So here it is.
|=---=[ Specifications
Handle: the_uT
AKA: daemon10, yu0, jungjeezy
Handle origin: Africa
Age of your body: 24
Produced in: The Heart of Darkness, USA
Living in: The Paper Street Soap Company, USA
Height & Weight: Excessive" / 250lbs
Urlz: /ezines/EL8/
Computers: Anything with a network connection and a working ssh
client will do... I'd rather spend my money on clothes
& entertainment... less tech garbage also means my
bedroom doesn't scare the bitches away
Creator of: PROJEKT MAYHEM / Phrack High Council / anti.security.is
Admin of: Most of South Korea/China ...
Member of: NAMBLA (proud sponsors of TOR!) / ANONYMOUS
Projects: M4YH3M
Codez: stealthrm, the first blackhat RM(1) utility, designed
to rm desktop computers silently. Distributed as a
Linux LKM, VFS functions are hijacked so that file
indexing and rm'ing can be smuggled and interleaved
discretely amongst existing file operations.
Additionally, keyboard I/O is monitored to determine
the sysadmin's presence. Sporadic file wiping occurs
either during heavy PLANNED system hard drive use, or
occurs slowly and steadily, with timed delays, while
the console user is absent. The primary purpose is to
avoid the alarming and sickeningly unexpected HDD
"crunching" sound that alerts many would-be "rm -rf /"
victims to their impending doom. File removal is
scheduled according to a proprietary prioritization
algorithm whose factors include criteria such as
inode atimes and VFS type. Files are secure DOD-wiped
in place, but not unlinked, preserving disk statistics.
Active since: 1998
Inactive since: I don't sleep... I metastasize
|=---=[ Favorites
Actors: Assorted government officials, "security experts,"
and "spiritual leaders" ... Scientologists
Films: Apocalypse Now Redux, Happiness, Gummo, Pi, The Big
Lebowski, Bad Boy Bubby, Irreversible
Authors: Bret Easton Ellis, Louis-Ferdinand Celine, Hunter S
Thompson, William S Burroughs, Will Self, Irvine Welsh,
H.L. Mencken, Mark Twain
Articles: "The New Hacking Manifesto" - warez mullah, PHC Phrack
"lyfestylez of the owned and lamest" - r0b1nleech,
Admins: hendy of team-teso, The Digital Ebola[LoU],
pm/sneakerz.org
Books: The Rise and Fall of the Third Reich, The Rape of
Nanking, The Protocols of the Elders of Zion
Novel: Fight Club, 120 Days of Sodom, American Psycho,
Journey to the End of the Night, The Picture of
Dorian Gray, The Jungle, Fear and Loathing in Las
Vegas, Catch 22, A Confederacy of Dunces, The Story
Meeting: ADMCon / France (2001)
Project: The Manhattan Project, The Final Solution
Sex: "You're dead if you're homely - my shit's for adults,
over eight years old only"
Drugs: Beta blockers and dissociatives... just about any
substance featured on Erowid or T-Nation... especially
modafinil, ayahuasca, ketamine, dinitrophenol, epic
stanozololz (Winstrofl), nandrolone, Epi-Pens
Music: Revolutionary/violent/mysognist/apocalyptic hip-hop
Ex: Jedi Mind Tricks, Necro, Circle of Tyrants, Non
Phixion, Leak Bros, Immortal Technique, Q-Unique,
Cage, Celph Titled Plastikman
Alcohol: Like my women - 15-18 years old, single (malt) and on
the fucking rocks
Cars: blue dodge viper (vroom vroom!)
Foods: Whey protein hydrolysate, Vitargo CGL, BCAA's,
l-glutamine, Carlson's Fish Oil Liquid Omega-3
I like: Andrei Chikatilo, 2girls1[cup/finger], Puma Swede,
thinspiration, violent sporting (WEC,UFC,Pride),
solving intractable problems with violence,
achieving EPIC LULZ of unprecedented magnitude
I dislike: Fat goths, CISSPs, fat people (in general), women with
a BMI over 18, women whose thighs touch when they stand,
miniature dogs, people who tailgate or drink beer out
of red plastic cups, Basshunter
|=---=[ Your current life in a paragraph
I'll give you a hint... it doesn't involve getting paid to do
computer security research. The only reason I would even
consider using a computer anymore would be to meet women of
loose moral standards on myspace, or to engage in the wholesale
piracy of music and video content, preferrably violent
pornography. Or maybe to get directions to a strip club on
mapquest... or order various scheduled substances from corrupt
Eastern European pharmaceutical manufacturing facilities... In
fact, if you're reading my prophile because you just happened
still to be reading Phrack in 2008 and stumbled upon it, then
I pity you... you fucking closet homosexual.
|=---=[ First contact with computers
Studying the mysteries of gorillas.bas and nibbles.bas,
|=---=[ Youth
I was 300 lbs, bespectacled, and acne-stricken. I used to read
copies of Dr. Dobb's Journal in P.E. Everybody hated me. Then I
underwent an emergency negroplasty and decided to enact my
revenge upon the world by inflicting massive verbal trauma
through a medium where personal interaction is impossible and
everybody feels tougher than they really are. So I installed
BitchX and went on EFNET, and the rest, my friend, is history.
|=---=[ Passions : What makes you tick
I'm distinguished by an acutely defined and unparalleled sense
of schadenfreude. Technology is pretty fun too (or at least it
was for a while), but what really drove me harder and further
was the exciting possibility of using computers to turn the
life of a particular fellow human being into a living hell.
So no, I wasn't that kid that used to hang out at Radio Shack
pulling apart electronic equipment and reassembling it to "see
how it works." Shit like that doesn't make you a "hacker" - it
makes you a wannabe EE undergrad. Driving people over the
precipices of depair and frustration is a great way to
pass one's time, but definitely falls short of the pleasure of
discrediting or humiliating or otherwise defaming and
slandering the ill-earned reputations of the various charlatans
and hypocrites in the scene. Publishing the mail spoolz of
the wicked, archiving the hard drives of the lame, and rm'ing
the weak are all activities I find inspirational. Particularly,
I choose to self-medicate my anomie by proving myself smarter
and stronger than others. This is the sort of thing with which
we'll have to make do until we can one day stalk elk around the
ruins of the Rockefeller Center or strip venison in the empty
carpool lanes of some abandoned superhighway. For further
information about what makes me "tick," please consult Dr. Neal
Krawetz's remarkable and highly academic psychological exegesis,
fully annotated to official APA formatting standards.
|=---=[ Entrance in the underground
It all began on EFNET, some time around 1998 (long before they
had CHANFIX like dalnet!) in lame and lamer channels like #b4b0
and #feed-the-goats. Historical note: Several incredibly
diabolical and motivated individuals from b4b0 would come to
rule the virtual entirety of the Interweb with an iron fist for
the following decade. Yeah, I started hacking shit virtually
exclusively on TCP/IP networks, and started writing exploits
long after techniques like heap overflows and return-into-libc
were published, so fuck you if you have a problem with the fact
that I never scanned shit with toneloc or bruteforced SPRINTNET
|=---=[ Which research have you done or which one gave you the most fun?
Writing any one of several reliable exploits for intelligently
brute-forcing complex remote vulnerabilities, which all made me
feel like a hacker from THE MATRIX. Especially writing a
universal blind exploit for the Wu-FTPD globbing vuln for
versions 2.5.x-2.6.1 (cmdtab power!), and porting the remote
client for CORE-SDI's ingenious crc32 deattack backdoor to more
exotic operating systems such as Solaris and IRIX (possibly the
world's slowest exploit). Also, writing an LKM for dynamically
loadable stack/heap execution protection on Linux.
|=---=[ How started low-level ?
Like most other "underground" groups out there, this one started
from the flawed notion that it would somehow be cool to get a
group of people together with a webpage and domain name and IRC
channel and write a bunch of POC code and publish it to the
public and post on sec lists for attention. It was a stupid
|=---=[ Personal general opinion about the underground
Well, the underground is pretty much dead, but I guess you
mostly have the security researchers out there to thank for that
one. However, as a delicious proof of the old adage "be careful
what you wish for," security professionals have made their own
demand scarce. With vulnerabilities so much harder to find,
it means that random idiots out there aren't likely to find
anything remotely useful by grep'ing for overflows in unsafe C
functions. The first sign that things were about to dry out
occurred during the format bug craze in 2000, which resulted in
the systematic scanning of all varargs style functions that were
incorrectly used - the first time an entire class of
vulnerabilities has been nearly perfectly eradicated in a body
of open source code. Slowly over time, the same thing has
happened to most other memory and integer overflows, and casting
bugs. What happens as a result? 0day becomes a highly valued
commodity. The chance of leakage decreases dramatically because:
1. 0day is much more valuable
2. Few people can find useful vulns, which decreases the amount
of sharing. Additionally, smarter people usually find an
intrinsically higher value in their own work than people that
can't understand the exploits they're using.
3. "When guns are outlawed only outlaws will have guns" -
Praise be to Allah and the fact that the divine mathematics of
exploit creation are now made sacred by entities like WIPO and
the DMCA. For nearly a decade, security companies relied on FUD
and fearmongering, heralding the imminent spread of global
cyber-warfare and e-terror. A particularly salient example of
this idiocy would be the infamous Aris Threatcon, second in its
contemptibility only to the Homeland Security Advisory meter.
These scare tactics worked for a while, as sec. companies
boosted sales of products such as firewalls, packet filters,
network scanners, and other useless trash by relentlessly
trumpeting the seriousness of various "hacker" threats and by
strategically scaring the public with their own original
(mostly stolen) advisories. Ironically, they ended up scaring
legislators more than the commercial sector, and now people
like Dmitry Skylarov are arrested for publishing their
"astonishing!" findings. Note to security companies: you're
attempting to be both the cause and the cure and we've got
use for neither.
4. 0day auctions: Blackhats finally realize that it's a lot
more lucrative to sell exploit information to shadowy interest
groups. Such sales have the added benefit of preventing
information dissemination, because it works against the
interests of all parties involved. iDEFENSE, the first and
largest name in hacking middlemanry, was forced to purchase
exploits from the underground when they realized they lacked
the technical skills in their meager R&D labs to find any
exploits on their own. But who in their right mind would
consider auctioning off vulns at Argentinian prices to a
whitehat sweatshop that will just pawn their findings off as
their own, and then publish them to Bugtraq - when they can make
the same sale to somebody in the underground for 5-10x the cost
and rest assured that the vuln will stay alive?
Nowadays, it is claimed that the Chinese and even WOMEN are
hacking things. Man, am I ever glad I got a chance to experience
"the scene" before it degenerated completely. And remember, kids,
knowing how to program or wanting really badly to figure out how
things work inside doesn't make you a hacker! Hacking boxes
makes you a "hacker" ! That's right! Write your local
representatives at Wikipedia/urbandictionary/OED and let them
know that hackers are people that gain unauthorized
access/privileges to computerized systems! Linus Torvalds
isn't a hacker! Richard Stallman isn't a hacker! Niels Provos
isn't a hacker! Fat/ugly, maybe! Hackers, no! And what is up with
the use of the term "cracker"? As far as I'm concerned, that term
applies to people that bypass copyright protection mechanisms.
Vladimir Levin? HACKER. phiber optik? HACKER. Kevin Mitnick? OK,
maybe a gay/bad one, but still WAS a "hacker." Hope that's clear.
|=---=[ Memorable Experiences
First box I ever owned (dropstat'd son)
Watching widespread panic and hysteria grip IRC and various
security mailing lists after the publication of ~el8, esp. #2
The PHC Music & Film Festival, notably Joost Pol
The multi-homed attack/rm'ing of efnet irc operator "seiki,"
which resulted in PHC primacy and alpha male hegemony over
Preparing the memorable vitriolic speech "Wolves Among Us"
from scratch, in less than 30 minutes... then attempting to
deliver it without inducing fatal hilarity
Becoming the Freddy Krueger of the Internet/IRC
Celebrating Kwanzaa online in #darknet with assorted South
African infosec luminaries
Civil rights champions worldwide cheer when a Polish transsexual
becomes the most recognizable expert on the vanguard of kernel
rootkit (un)detection research
Having my first proposed Phrack prophile rejected by humorless
German staff
The suceessful social engineering of hacker "dvdman" - which
resulted in the retrieval of an explicit masturbatory video of
aforementioned individual
iDEFENSE contributors and their laughably low sell-out prices
are revealed in "fake" Phrack
Vomiting in my mouth (just a little bit) the first time I walked
into the Alexis Park Hotel
The communal rm'ing of w00w0's jobe, which became the only
known time in history where the same individual was rm'ed
concurrently by multiple intruders, who, up until the time
of the attack, had no knowledge of each other's presences
Logging into my computer, relying only on muscle memory to type,
after forgetting the alphabet and being too fucked up to read
the letters on my keyboard
The look of surprise on the Cheshire Catalyst's face after his
password was shouted at him repeatedly, at approximately 80
decibels, while he was entertaining fans
stringz attempts to replicate ~el8, fails, and is shamed offline
adds thumbnail pictures to its original
columns - I finally find out infosec rockstars such as Don
Parker, Scott Granneman, and Dr. Neal rawetz really look like!
Slackware founder Patrick Volkerding sends an open SOS to the
world after forgetting to brush his teeth nearly results in
fatal halitosis.
Watching the IRC suicide/accidental deaths of rippah/electrosk0t
Marty Roesch re denies own obesity and
the owning of snort.org
|=---=[ Memorable people you have met
The Blue Boar, at the very first Phrack High Council Ethics
Roundtable
The Rain Forest Puppy (sounds like an adorable stuffed animal
from Mattel(C) but dresses in shiny reflective raver clothing)
Captain Crunch (No thanks du0d I don't want you to open up my
chakras with a special "energy massage")
Ofir Arkin, world's leading ICMP fingerprinting technologist
Honey Dew Moore, child hacker prodigy and world's leading
exploit cataloguer
Shok, world's foremost Mormon hacker
Surprisingly, some actual hackers (various members of MoD),
while attending HOPE, the worst con I've ever been to
The Death Vegetable, largest carbon footprint of any netizen
Packet Fairy
|=---=[ Memorable places you have been
spaf's mail spool (although I'd give it back in a heartbeat
for a chance to take a joyride in his electric wheelchair
cvs.openbsd.org
s1's famous "Studio 31337" HACKING FORT
Rloxley's child porn archive
|=---=[ How started PR0J3KT M4YH3M ?
The idea obviously isn't something entirely new or original.
The earliest known historical precursor to Project Mayhem was
Erostratus, who set fire to the Temple of Artemis at Ephesus,
one of the Seven Wonders of the Ancient World. Though his
motives were questionable (he achieved the act merely because
he had no other way of immortalizing his name), the base concept
was there: destroying something beautiful just for the hell of
it. Note: destruction and vandalism out of ignorance and fear
are decidedly less noble in nature. Obviously, there was some
inspiration from the novel, Fight Club. As far as scene-related
influences, there were some early precursors... the venerable
e-zine "CITADEL" and some of the better work of BOW (Brotherhood
of Warez). ~el8 was probably the single biggest source of
creative energy fueling PR0J3KT M4YH3M, and is still
remembered to this day as the greatest, most revolutionary
blackhat publication of all time. But what really kick-started
PR0J3KT M4YH3M was the apparent lack of success of
anti.security.is, a formal anti-disclosure movement constructed
from a lucid and cogent document illustrating why it would be
better for all parties in the infosec community to stop
publishing exploit code. But as the US government is fond of
saying of the Taliban, it soon occurred to many of us that
these whitehats, like their white-turbaned friends in
Afghanistan, "respond only to violence." Enter PR0J3KT M4YH3M,
a spawn off PHC's Fight Club division. All in all, PR0J3KT
M4YH3M had an impressive run, resulting in the ownage of high
profile whitehats including Theo de Raadt, Kevin Mitnick,
and Marty Roesch. IRC servers were conquered and their
operators were vanquished. Prominent "hacker" magazines were
stolen and leaked prematurely. Hard drives were dd'ed,
tar'ed, gzipped', gpg'ed, and shipped off to snu.ac.kr.
Codes of whitehats were backdoored and published
unexpectedly. Violent/offensive/sacrilegious blackhat
ASCII art was created. Heap exploitation tutorials were
rebranded. Hitlists of the whitehat community were
compiled. Info-security professionals were fired. Whitehat
books & movies were leaked. g4yh1tl3r lived, died, and was born
again. And we all had a lot of fun.
|=---=[ Things you are proud of
Closing Captains of Crush #2 (multiple times, with finesse)
Coining several catch phrases which framed the zeitgeist of
the blackhat movement of the early 21st century, including
"w00w00 is p00p00"
Becoming the first "hacker (over 5 ft. tall) on steroids"
Transcending the blood-brain barrier
Reading the last 5 issues of Phrack without learning anything new
Stealthily avoiding all hidden toilet/shower cams at HAL 2001
Becoming the first hacker to write exploit headers in ebonics
Proud author of an exploit that appears bundled with O'Reilly's
"Network Security Assessment" book, after infosec genius Chris
McNab deletes comments/headers and submits it for inclusion
Becoming the first person to rm a box from a cellular device
(while at a nightclub ala "Swordfish")
Coming from a family free of mental retardation/physical birth
Demonstrating to the world repeatedly how stupid it is to be
a whitehat
Triumphing over hackers such as mosthated, missnglnk, gov-boi,
ben-z, ytcracker, kf, and joewee to earn the title of "blackest
man on efnet"
Learning how to krump proficiently after watching only 15
minutes of Rize
Serving for several years as the High Chancellor of *.ac.kr
and *.ac.jp
Ordering the world's only team ~el8 tank top
World's fastest typer on sub-anaesthetic doses of special k
Successfully masking my bipolar disorder in order to become a
fully integrated and respected member of 'society'
Rotating planes of polarized light counterclockwise around
various enantiomers
|=---=[ Things you are not proud of
Ever having released code to the public
Ever having posted to a security mailing list in which the
intention of my correspondence was less than utter sarcasm,
mockery, or malice
Failed attempt at rm'ing def-con.org while at Defcon, due to
network problems
How underappreciated this prophile will inevitably be
Not also ordering the "Countdown to rm" ~el8 wall clock from
Unknowingly losing an underground ytalk speed typing competition
to a rogue TIOCSTI program
|=---=[ Opinion about security conferences
There are any number of flawed reasons why people attend/speak
at security conferences. If you're looking for recognition or
publicity, you're probably better off committing suicide
on Youtube (see "Budd Dwyer" Wikipedia for ideas).
If you're looking for repulsive female companionship or fellow
loser friends to socialize with "IRL," you'll probably save
some time and airfare by checking your local Craigslist first.
Otherwise, the proof is in the pudding. 10 years ago it would
been inconceivable that there would one day be "security
conferences" in retard 3rd world shitpile countries like Mexico,
Malaysia, and Pakistan. Countries whose only contributions to
the progression of the digital age
have been the vigorous repeated typing of "jajaja" and "kekeke"
and "gf0rce pakistan!!!" in
various IRC channels and online message boards. Apparently,
high tech vocations have taken
over! My suggestion is to stock up on sombreros, Nikes, and
taxi cab medallions now before
they become relics of the past.
|=---=[ Opinion on Phrack Magazine 1985' ? 1995' ? 2005' ? '2007 ?
I've always thought this magazine sucked, but in regards to
the specifics of the question at hand, it's probably gotten
steadily worse over time. OK OK... I'm sure the editorial staff
would like me to say something positive here so here's my best
attempt: "PHRACK MAGAZINE - Hey, at least it's not 2600!"
This will probably be the worst issue yet, but that's fine -
I'm just using this prophile as a mouthpiece for my dogma of
physical anabolism and moral decay.
|=---=[ What you would like to see published in Phrack ?
An article on phones! (Not VOIP!)
Definitely more mail spools... a renewed focus on homemade
improvised explosive devices... maybe even some tutorials on
drug trafficking for newbies
|=---=[ Shoutouts to specific (group of) peoples
Doing (R.I.P.), tr4shc4n m4n, krad, odaymaztr, Funny Bunny,
module of rhino9, g4yh1tl3r, drater, the crazy Turk, Rocky
the virgin hacker Jesus, zilvio, all my Icelandic friends,
sk8, j & r, Hans Reiser (everybody on IRC talks about murder,
but nobody actually goes through with it), everybody on asylum
& its admin, my old friends from #!!ADM and #!hax, the
zoroastrian insomniac prophet & his partner in crime
|=---=[ Flames to specific (group of) peoples
pm/gaius (hey did you know there's a facebook group for
HERT now?!?), hd moore & his ersatzsploit project (we
commend you on your entrepreneurial vision of turning your
look-mom-i-just-got-owned tcpdump logs into exploits with your
own name on them), Richard "Dick Theft" Johnson (1500+ on his
SAT; abject failure at real life), The Condor, THE WAREZ D00D
(your next ten bag of heroin will be cut with ricin), jobe,
Philip Emeagwali (father of the supercomputer/Internet),
slashdot, Valdis Kletnieks (if I can't pronounce your name,
it's time to kill yourself or go back to dragging a plow in
Latvia), "Dr." Neal Krawetz, Stefan Esser (currently being
hunted down by European PROJECT MAYHEM operatives with
instructions to sever the right hand in accordance with holy
e-jihad Shariah), Eric S. Raymond (still piecing back together
his ~ from backups after the brutal desecration of his OSI bazaar
via CVS 0day), Electronic Souls, hack.co.za, xfocus, nsfocus,
Souljah Boy, "Tiger Team", GNU, Jose Nazario, Luigi Auriemma,
tsao[IC], divineint (I'm sure the Singaporian government would
have had you caned by now for trading IRIX/VMS/DGUX/AIX/HPUX/
Windows src code if you weren't already in their employment),
Raven (congratulations on having a vagina... it's not even a
good one, but it's still better than your brain so you should
probably try hooking instead of thinking for a living), Don
"Beetle" Bailey, Ron Dufresne, Gadi Evron, lcamtuf, Ulf
H?rnhammar, jeff moss, pete shipley & other vampire hackers,
jericho, marcus ranum, chesswick & bellovin, lamo,
markoff/shimomura/mitnick, theo, knuth, dijkstra & other
CS theory fags, HACKER CRACKER
|=---=[ Quotes
"WTF SAID I WAS A TRADER?" - The Warez Dude
"eye dont wipe logz" - Kareless KaRL
"I'm proud to say I have committed every sin in the Decalogue." -
Sir Richard Burton
"irc warfare isnt very fun when u can just vanquish your f0ez...
i feel like i go thru life with IDDQD on...walking thru firewalls
like IDSPISPOPD" - the_uT
"I hate to think that all the whitehats in the world are
concerned that phc members are busy hacking their home machines
when people are really playing ninja gaiden and hocking off their
computers to buy $1000 dogs." - gayh1tler
"While you were sleeping we helped ourselves" - Canaan Banana
"I'm on the Zoloft to keep from killing y'all" - Mike Tyson
"I've got 5 words for you: drugs smuggled in presidential
baggage" - lu1g1
"I guess I'm gonna fade into Bolivian" - Mike Tyson
"I just want to conquer people and their souls" - Mike Tyson
"My power is so discombobulatingly devastating I could feel
his muscle tissues collapse under my force. It's ludicrous
these mortals even attempt to enter my realm." - Mike Tyson
"step in2 my e-z bake oven!" - gayh1tler
"I think my mask of sanity is about to slip." - Patrick Bateman
"its not nice to treat other people's boxes like toys-r-us" -
"With a gun barrel between your teeth, you speak only in
vowels." - Fight Club
"Fuck damnation, man! Fuck redemption! We are God's unwanted
children? So be it!" - Tyler Durden
"Eat your lima beans!" - Pavel "Papa" Sandrak
"A race condition is how fast you can hit the reset button when
you start hearing your hdd whine" - unknown
"We will achieve samadhi while meditating over s1's studio
31337 MOTD" - the_uT
"Like our great leader, this kernel module selects a child and
touches him in a very special way." - warez mullah, THE EMMANUEL
GOLDSTEIN LKM
"Cuz if you can take a fucking dick, you can take a joke" -
Immortal Technique
"The greatest trick the devil ever pulled was convincing the
world he doesn't exist" - The Usual Suspects / Baudelaire
"So I'm rapelling down Mt. Vesuvius, and my rope breaks and I
begin to fall and im falling, falling. Ahhhh, I'll never forget
the terror! Then I thought to myself, hey Hansel. Haven't you
been smoking peyote for 6 straight days and couldn't some of
this maybe in your head? " - Zoolander
"Shit! If I'd known it was going to be this kind of party I'd
have stuck my dick in the mashed potatoes!"
"ARE YOU FUCKING RETARDED? STOP CRYING AND FUCK YOUR OWN ASS
WITH IT" -
"So don't ever talk shit. And remember something nigga, while
you rave and rant - a roach can live for nine days without its
head, but you can't" - Immortal Technique
"d00d thats not a LADY OF THE PEN, thats ___ from CUMFIESTA!" -
"Can somebody please tell me what the fuck A RED MAP is???"
"i did it 4 the lulz" - ANONYMOUS
"we dish out rm's like petri" - the_uT
"There he goes. One of God's own prototypes. A high-powered
mutant of some kind never even considered for mass production.
Too weird to live, and too rare to die." - HST UNF UNF
"Behold I am become death, the destroyer of worlds" - Robert
Oppenheimer
"It is better to find 10 dead babies in 1 trash can than to
find 1 dead baby in 10 trash cans." - Unknown
"NIGGA, THE RM IS THE NEW EUGENICS... EUGENIX" - unknown hacker
"WTF SAID I WAS A TRADER?" - The Warez Dude
"For personal reasons, I do not browse the web from my computer.
(I also have not net connection much of the time.)
at page I send mail to a demon which runs wget and mails the
page back to me. It is very efficient use of my time, but it
is slow in real time." - Richard Stallman
"and it shows that you are a complete dork. you are disconnected
from reality. how can we take you for serious?" -
mbalmer@openbsd.org in response to Stallman, officially winning
at irony... FOREVERER
"2 FAST 2 FURIOUS 4 U" - the_uT, upon winning an underground irc
speed typing competition
|=---=[ Anything more you want to say
Looking back on my involvement in computers, I am very happy
that the peak of my activity occurred right during the turn
of the 20th century. Hacking was no longer as simple as manual
labor (wardialing etc.) but finding vulnerabilities and writing
exploits and tools was not exactly as tedious and prohibitively
time-consuming as it is currently. To say that I would rather
commit seppuku than adapt to the challenges of a changing world
by auditing code for SQL injection vulnerabilities and
client-side browser exploits is not an exaggeration. On the
upside of things, hardcore pornography is now far better and
more widely and freely available than ever, and productive
programming like UFC can be seen on channels like Spike TV for
free. Every day, more and more youngsters are born who are many
times more likely to contribute articles to socially useful
publications such as Encyclopedia Dramatica instead of 2600.
Spreading terror and wreaking havoc for "epic lulz" have been
established as viable alternatives to contributing to open
source software projects. If you're a kid reading this zine for
the first time because you're interested in becoming a hacker,
fucking forget it. You're better off starting a collection of
poached adult website passwords, or hanging out on 4chan. At
least trash like this has some modicum of entertainment value,
whereas the hacking/security scene had become some kind of
fetid sinkhole for all the worst kinds of recycled academic
masturbation imaginable. In summary, the end is fucking nigh,
and don't tell me I didn't warn you... even though there's
nothing you can do about it.
Good night and good luck,
- the UNIX TERRORIST
|=[ EOF ]=|
==Phrack Inc.==
Volume 0x0c, Issue 0x41, Phile #0x03 of 0x0f
|=--------------------------------------------------------------------=|
|=-----------------------=[ Phrack World News]=-----------------------=|
|=----------------------------=[ by TCLH ]=---------------------------=|
|=--------------------------------------------------------------------=|
The Circle of Lost Hackers is looking for any kind of news related to
security, hacking, conference report, philosophy, psychology, surrealism,
new technologies, space war, spying systems, information warfare, secret
societies, ... anything interesting! It could be a simple news with just
an URL, a short text or a long text. Feel free to send us your news.
We didn't get any news from the Underground since our last phrack issue,
it means that one more time all the news reports are coming from
friends of our's.
It would be good if people who claim themself "underground" would send
us their news...
Is our underground dead?
1. Speedy Gonzales news
2. How is CSPP controlloing US education network?
3. Retrospective of underground scene
4. Killer robots
5. Meaningful IP addresses
--------------------------------------------
\ `--. _ __
`--. \ '_ \ / _ \/ _ \/ _` | | | |
/\__/ / |_) |
__/ (_| | |_| |
\____/| .__/ \___|\___|\__,_|\__, |
______ _| | ___
| | __ / _ \| '_ \|_
/ _` | |/ _ \/ __|
| |_\ \ (_) | | | |/ / (_| | |
\____/\___/|_| |_/___\__,_|_|\___||___/
\| | _____
| . ` |/ _ \ \ /\ / / __|
\_| \_/\___| \_/\_/ |___/
*-[ The underground complot: when quebec scene takes too much LSD ]-
http://www.mindkind.org/mindkind1011.zip
*-[ "king of the carders" but busted ]-
http://www.theregister.co.uk//max_butler_affidavit/
*-[ "secure area" and "Microsoft" don't belong in the same sentence ]-
http://www.stuff.co.nz/.html
*-[ Being an ethical hacker is definitely not a good idea ]-
.au/news/security/police-swoop-on-hacker-of-the-year/2007
/11/15/1.html?page=2
*-[ When NSA teaches you how to hack ]-
Do they read phrack? :)
*-[ When Phrack is a sponsor without its permission ]-
http://conference.hackinthebox.org/hitbsecconf2007kl/?page_id=65
*-[ Terrorism excuse is good for spying business ]-
http://www.corpwatch.org/article.php?id=14821
*-[ Entersect sounds like an interesting target...]-
/wp-dyn/content/article/2008/
04/01/AR9_pf.html
*-[ Want to work for MI6? ]-
http://news.bbc.co.uk/player/nol/newsid_6150000/newsid_6153000/
6153092.stm?bw=bb&mp=rm&nol_storyid=6153092&news=1
*-[ Flight "not" Simulator ]-
http://www.theregister.co.uk//
boeing_dreamliner_hacker_concerns/
*-[ This design looks familiar...]-
http://hex90.org/
*-[ After hacking your brain: hacking your heart!]-
http://packetstormsecurity.org/papers/attack/icd-study.pdf
--[ 2. How is CSPP controlling US education network ]--
http://www.mccullagh.org/db9/d30-32/kay-rosen-holleyman-1.jpg
The above picture shows Ken Kay, executive director of the Computer
Systems Policy Project on the left and Robert Holleyman, president and
CEO of the Business Software Alliance on the right.
CSPP (www.cspp.org) was created in 1989, and later on renamed as
Technology CEO Council. Bigger members are Applied Material, Dell, EMC,
HP, IBM, Intel, Motorola, NCR and Unisys. All these companies together
are generating 300 billion dollars of annual revenues.
The company was made on request of the US President, to promote
U.S. competitiveness through technology leadership. You can think
technology is for information technology. You are wrong. It's for
Intelligence technology.
The project is two steps. First is to invent a spy chip and
put it in every computer manufactured in US. So did Fairchild
(http://en.wikipedia.org/wiki/Fairchild_Semiconductor) by producing the
Clipper chip (http://en.wikipedia.org/wiki/Clipper_architecture).
The Clipper was designed with internal circuitry to encrypt information
and deliver backdoor capabilities, a little bit as the previous PROMIS
software was doing with Mainframe.
The Clipper was designed for RISC workstation. After a bankruptcy of
Fairchild, and seeing that Hitachi was interested to acquire the company,
the US government requested Intergraph to continue the project. So
they did by starting the production of a new UNIX workstation line,
named Interpro32 and running AT&T Unix operating system.
So, the operating system was containing code to activate the secret
part of the CPU, and access to users' data. The following declassified
document explains to the US administration how dangerous it could
be to continue to use the Clipper chip in conjunction with AT&T:
http://www.softwar.net/bush.html. CIA and NSA are involved in this
Now that the main US chipset and computer manufacturers are in the
secrets of the CIA intelligence, let's go for step two.
In 1996, the US president Clinton did ask to create the CEO Forum,
managed by Ken Kay, to establish the best rules for the future
classrooms, assuming they will be well connected to the Internet, with
the best possible hardware. Members were Apple, Dell, IBM, Compaq, HP,
Sun... Next, the US government did ask again to Ken Kay in 2002 to
create the Partnership for 21st Century Skills to be at the center of US
K-12 education by building collaborative partnerships among education,
business, community and government leader (www.21stcenturyskills.org). It
was a follow up to the CEO Forum.
Members are:
* Adobe, AOL, Apple, AT&T, Cisco, Dell, Intel, Microsoft, SAP, Oracle...
* National Education Association, Ford Motor Company (?) and the US
Department of Education
Ken Kay is in charge of driving all these companies to install computer,
software and networks systems in all schools of USA, as well as dictating
the content of the courses!
Thinking back to the picture in front of this article, you can make
the connection between all software companies, the BSA company and Ken
Kay. Thanks to the clipper chip success, they all know how to watch you!
The cherry on the cake will be to tell you that Ken Kay is managing WWASP,
the largest world network of special establishment for "Teens In Crisis".
http://en.wikipedia.org/wiki/World_Wide_Association_of_Specialty_Programs_
and_Schools
Many parents are complaining against the treatment methods employed by
WWASPS institutions. These methods are said to be controversial, as there
have been allegations of severe (sexual) abuse and torture by staff.
In 2004, during a testimony, Ken Kay stated that in his opinion, sexual
activity between staff members and students is "not necessarily abuse".
How do you explain that Ken Kay is controlling the whole US computer
industry, as well as the US education, and able to manage a galaxy of
establishments doing sexual abuses in its total acceptation?
--[ 3. Retrospective of The Underground scene ]--
Almost one year after the release of "A brief History of the Underground
Scene", it's now time to give some feedback. First of all, The Phrack
Staff and I would like to thank you all for your positive and negative
comments about this article. The goal of this article was not to
explain what the scene once was or what should be but more to provoke
the debate. And on this point the article was a success. Now it's time
About the negative comments that I had, I won't reply to each of one.
As you have probably seen, I didn't reply to any negative or positive
comments (except one at the beginning...my bad) I prefer let people
talk. But I was quite amused to see negative comments which for the
majority were on some insignificant points (speech recognition is not
datamining, this guy doesn't know subnets, underground pyramid is for
Holywood magazine or hacking tricks are too lame). It would be stupid
to reply to them. So I won't.
One of the thing that I am the most happy about is that a lot of young
generations of hackers have found this article interesting and found their
way through it. As you have probably seen, there is another article about
the Underground scene in this issue. Anonymous' opinion is opposite
to mine but if you read beetween the lines, we both go to the same
direction.
Of course it's important to understand the history of hacking (what
I tried to explain in my article) or how the underground died (what
Anonymous tries to explain in his article) but it's more important
to keep hackers alive. Even if the Underground won't ever be the same,
the passion is still there. It's this passion of hacking that should
stay alive.
I really hope that all people who gave constructive comments can
participate to the new Underground. A lot of people talk but don't do
anything. I've seen lots of interesting comment from people who want to
do something but at this stage we haven't seen anything from them. Are
these people too busy? Are these people just dreamers? Are these people
lacking required knowledge? Are these people....? I don't know.
But this message is for these people: please stop talking but try to bring
something to new generation of hackers.
They need you.
--[ 4. Killer robots ]--
My roomba can get lost under the dining room table, bumping off
the chair legs, over and over. There are many routes of escape,
but it rarely finds one. Only a true genius could turn this
remarkable example of AI into a killing machine.
/defense/2007/10/roomba-maker-un.html
--------------------------------------------------------------------
The makers of the cuter-than-cute robotic vacuum cleaner are
rolling out a new machine: A big, fast-moving, semi-autonomous
'bot capable of killing a whole bunch of people at once.
Unlike other armed robots -- which are entirely remote-controlled
-- the Warriors are "being engineered with advanced software,
giving them the ability to perform some battlefield functions
autonomously."
At the same time, a key dimension to the Warrior X700 is its
ability to protect soldiers by firing weapons such as a machine
gun or 40mm explosive round.
--------------------------------------------------------------------
Bring in the big guns.
/defense/2007/10/robot-cannon-ki.html
--------------------------------------------------------------------
We're not used to thinking of them this way.
But many advanced
military weapons are essentially robotic -- picking targets out
automatically, slewing into position, and waiting only for a
human to pull the trigger.
Most of the time.
Once in a while,
though, these machines start firing mysteriously on their own.
During the shooting trials at Armscor's Alkantpan shooting range,
"I personally saw a gun go out of control several times," Young
says. "They made a temporary rig consisting of two steel poles on
each side of the weapon, with a rope in between to keep the
weapon from swinging. The weapon eventually knocked the pol[e]s
Mangope told The Star that it "is assumed that there was a
mechanical problem, which led to the accident. The gun, which was
fully loaded, did not fire as it normally should have," he said.
"It appears as though the gun, which is computerised, jammed
before there was some sort of explosion, and then it opened fire
uncontrollably, killing and injuring the soldiers."
But the brave, as yet unnamed officer was unable to stop the
wildly swinging computerised Swiss/German Oerlikon 35mm MK5
anti-aircraft twin-barrelled gun. It sprayed hundreds of
high-explosive 0.5kg 35mm cannon shells around the five-gun
firing position.
By the time the gun had emptied its twin 250-round
auto-loader magazines, nine soldiers were dead and 11 injured.
--------------------------------------------------------------------
Can I play too?
/defense/2007/12/new-killer-bot.html
--------------------------------------------------------------------
The stars: "a 25-year-old self-taught engineer named Adam
and his "toy-like but gun-wielding robot designed to
replace human soldiers on the battlefield."
Gettings' company doesn't have much of an online signature -- not
even a website.
But he does have some interesting partners,
including former Disney imagineer Terry Izumi (who cooked up this
video for the 'bot) and shotgun maker Jerry Barber (who provided
the firepower).
Blackwater has also endorsed the product,
allegedly.
--------------------------------------------------------------------
Blackwater and Disney? Who could ask for better qualifications?
Oh, and there's this cool marketing video.
n.com/video/ft/#/video/fortune//robotex.fortune
Robot wars, anyone?
/defense/2007/05/top_war_tech_5_.html
--------------------------------------------------------------------
"The Baghdad bomb squad used their iRobots to decorate their
shop," Noah reported after an embed with an Army
ordnance-disposal unit a couple years back. "Not far away, at the
U.S. military's central robot depot for Iraq, the iRobots sat on
shelves, serenely gathering dust, while Foster-Miller's Talon
robots would come back, scarred and in pieces, after being chewed
up by a bomb."
The company noted that war zone "Robot Hospitals" are repairing
more than 400 bomb-damaged robots a week to put them back into
--------------------------------------------------------------------
My bot can kick your bot's ass. Great. But how do they stand up
against humans?
Not the kind of humans that throw rocks at tanks, but the
thinking kind, like the ones that broke Israeli comms crypto
during the recent war in Lebanon.
Let's see what happens when it comes across a carpet stretched
over a pit. Or somebody throws a blanket over it, or spray paints
the camera lens, or fires IR lasers or very bright oLEDS at the
Once you have physical access to the thing, you own it. How hard
would it be to re-chip the thing and send it back against its
Can we test our killer-robot counter measures? Maybe. The
opportunity may soon be as close as your local pigsty.
/defense/2007/08/armed-robots-so.html
--------------------------------------------------------------------
Armed robots -- similar to the ones now on patrol in Iraq -- are
being marketed to domestic police forces, according to the
machines' manufacturer and law enforcement officers.
Foster-Miller, maker of the armed SWORDS robot for military use,
is also actively promoting a similar model to domestic, civilian
police forces.
The Talon SWAT/MP is a "robot specifically
equipped for scenarios frequently encountered by police SWAT
[special weapon and tactics] units and MPs [military police]," a
company fact sheet announces.
It "can be configured with the
following equipment:
. Multi-shot TASER electronic control device with laser-dot
. Loudspeaker and audio receiver for negotiations.
. Night vision and thermal cameras.
. Choice of weapons for lethal or less-than-lethal responses
- 40 mm grenade launcher - 2 rounds
- 12-gage shotgun - 5 rounds
- FN303 less-lethal launcher - 15 rounds.
In addition to the Massachusetts State Police,
SWAT teams in
Houston, San Francisco, and Lubbock, TX all have the robots,
according to Foster-Miller spokesperson Cynthia Black.
--------------------------------------------------------------------
Finally, a legitimate excuse for Swatting.
http://en.wikipedia.org/wiki/Swatting
--------------------------------------------------------------------
In the field of Information Security, Swatting is an attempt to
trick an emergency service to dispatch an emergency response
team. The name derives from attempts to trick an emergency
services operator (a "911 operator") into dispatching a SWAT
(Special Weapons and Training) team to a location under false
--------------------------------------------------------------------
What next?
/defense/2007/11/black-knight.html
--------------------------------------------------------------------
We now know that there are robotic cars smart enough to drive
themselves around a city.
The next step: give those vehicles
automatic weapons, of course.
Or the troops can stay just chill out, and let the thing drive
The Knight uses "advanced robotic technology for
autonomous mobility," according to BAE.
"This capability allows
the Black Knight to plan routes, maneuver on the planned route,
and avoid obstacles - all without operator intervention."
--------------------------------------------------------------------
/defense/2008/01/israel-thinking.html
--------------------------------------------------------------------
So Israeli military leaders have begun early planning for a new,
robotic defense system, armed with enough artificial intelligence
that it "could take over completely" from flesh-and-blood
operators.
"It will be designed for... autonomous operations,'
Brig. Gen. Daniel Milo, commander of Israel's air defense forces,
tells Defense News' Barbara Opall-Rome.
And in the event of a
"doomsday" strike, Opall-Rome notes, the system could handle
"attacks that exceed physiological limits of human command."
How do you say "Skynet" in Hebrew, again?
--------------------------------------------------------------------
/article/oddlyEnoughNews/idUST08?feedType=RSS&feedName=oddlyEnoughNews&rpc=22&sp=true
--------------------------------------------------------------------
Robots could fill the jobs of 3.5 million people in graying Japan
by 2025, a thinktank says, helping to avert worker shortages as
the country's population shrinks.
Caregivers would save more than an hour a day if robots helped
look after children, older people and did some housework, it
added. Robotic duties could include reading books out loud or
helping bathe the elderly.
--------------------------------------------------------------------
Don't drop the soap.
--[ 5. Meaningful IP addresses ]--
Here are some IP addresses that people send us...we haven't tried anything
so don't blame us. If you have more ranges feel free to share.
But before, the best IP list is probably the one on cryptome:
http://cryptome.org/nsa-ip-update14.htm
6.* - Army Information Systems Center
7.*.*.* Defense Information Systems Agency, VA
11.*.*.* DoD Intel Information Systems, Defense Intelligence Agency,
Washington DC
21. - US Defense Information Systems Agency
22.* - Defense Information Systems Agency
24.198.*.*
25.*.*.* Royal Signals and Radar Establishment, UK
26.* - Defense Information Systems Agency
29.* - Defense Information Systems Agency
30.* - Defense Information Systems Agency
49.* - Joint Tactical Command
50.* - Joint Tactical Command
55.* - Army National Guard Bureau
55.* - Army National Guard Bureau
62.0.0.1 - 62.30.255.255 Do not scan!
64.70.*.* Do not scan
64.224.* Do not Scan
64.225.* Do not scan
64.226.* Do not scan
128.37.0.0 Army Yuma Proving Ground
128.38.0.0 Naval Surface Warfare Center
128.43.0.0 Defence Research Establishment-Ottawa
128.47.0.0 Army Communications Electronics Command
128.49.0.0 Naval Ocean Systems Center
128.50.0.0 Department of Defense
128.51.0.0 Department of Defense
128.56.0.0 U.S. Naval Academy
128.60.0.0 Naval Research Laboratory
128.63.0.0 Army Ballistics Research Laboratory
128.80.0.0 Army Communications Electronics Command
128.98.0.0 - 128.98.255.255 Defence Evaluation and Research Agency
128.102.0.0 NASA Ames Research Center
128.149.0.0 NASA Headquarters
128.154.0.0 NASA Wallops Flight Facility
128.155.0.0 NASA Langley Research Center
128.156.0.0 NASA Lewis Network Control Center
128.157.0.0 NASA Johnson Space Center
128.158.0.0 NASA Ames Research Center
128.159.0.0 NASA Ames Research Center
128.160.0.0 Naval Research Laboratory
128.161.0.0 NASA Ames Research Center
128.183.0.0 NASA Goddard Space Flight Center
128.190.0.0 Army Belvoir Reasearch and Development Center
128.202.0.0 50th Space Wing
128.216.0.0 MacDill Air Force Base
128.217.0.0 NASA Kennedy Space Center
128.236.0.0 U.S. Air Force Academy
129.23.0.0 Strategic Defense Initiative Organization
129.29.0.0 United States Military Academy
129.50.0.0 NASA Marshall Space Flight Center
129.51.0.0 Patrick Air Force Base
129.52.0.0 Wright-Patterson Air Force Base
129.53.0.0 - 129.53.255.255 66SPTG-SCB
129.54.0.0 Vandenberg Air Force Base, CA
129.92.0.0 Air Force Institute of Technology
129.99.0.0 NASA Ames Research Center
129.131.0.0 Naval Weapons Center
129.139.0.0 Army Armament Research Development and Engineering Center
129.141.0.0 85 MISSION SUPPORT SQUADRON/SCSN
129.163.0.0 NASA/Johnson Space Center
129.164.0.0 NASA IVV
129.165.0.0 NASA Goddard Space Flight Center
129.166.0.0 NASA - John F. Kennedy Space Center
129.167.0.0 NASA Marshall Space Flight Center
129.168.0.0 NASA Lewis Research Center
129.190.0.0 Naval Underwater Systems Center
129.198.0.0 Air Force F

我要回帖

更多关于 电解抛光标准f19 f20 的文章

 

随机推荐