"Riffling through other files, Mendax found mail confirming that the attack had indeed come from inside MILNET. His eyes grew wide as he read on. US military hackers had broken into MILNET systems, using them for target practice, and no-one had bothered to tell the system admin at the target site.
Mendax couldn't believe it. The US military was hacking its own computers. This discovery led to another, more disturbing, thought. If the US military was hacking its own computers for practice, what was it doing to other countries' computers? "
I thought that was originally a book?
I distinctly remember reading it during an in school suspension in the 2000s.
I tried to go back to my township library and read it again years later, but someone had stolen it around the time that Wikileaks truthfully revealed that the DNC had kneecapped Bernie in the primaries.
(Many folks don't seem to distinguish between the public airing of unpleasant truths that could not be aired without their own actions, and "disinformation" in the "covid is a hoax" vein. To them, anything contrary to their narrative is evil and bad, and if only those dastardly Russians would stop making them look bad my making them send several illegal emails they could stop voting like Republicans)
In the Realm of the Hackers (2003) [video] - https://news.ycombinator.com/item?id=42281735
The Jargon File
https://jargon-file.org/archive/jargon-1.5.0.dos.txt
These are actual hackers and hacks.
[clicks]
>The certificate for hakmem.org expired on 5/8/2021.
I exclude the RE guys who are undoubtedly extraordinary.
Sadly the vast majority of sec teams are not this and exist solely to run some tool that spits out a list of dubious vulns and then dump said list as a pile of tickets into the dev backlog.
One place i worked, the CISO even came up with some slogan for the info-sec along the lines of "observe and report" after I kept trying to show the info-sec how to run, build, test, and patch our various packages and tools their scanners would complain about.
I learned to code specifically because as a kid I wanted to be a hacker; I was reading explanations of a buffer overflow in physical magazines before I learned how to code.
It’s been more than a decade since I even touched these kind of resources, but in a way those people are still the reason I can put food on the table now.
I really should revisit the community at some point, if only to see what the current environment is like. Things must have changed a lot since the time a teenager could bypass any security in their surroundings.
> Then: We were the kids who saw the blinking cursor not as a barrier, but as an invitation. We typed characters into the voids and got back secrets. Our goal was not destruction, it was understanding — to understand the systems better than those who built them.
> Now: Hacking is a job title. Curiosity has been commodified. A thousand "Bug Bounty Platforms" are trying to monetize your desire for understanding, to turn it into CVEs and T-shirts.
perhaps some safety measure. i am used to only drwxrwxrwx or lrwxrwxrwx on dirs and files never seen srwx.....
Can someone pls point me to some doc that explains how to deal with it.
You should check the permissions on it, you may need to chown it to your user, or just remove it as root
(Though I'm biased)
Will try dillo but I guess I will be stuck using Firefox.
edit: dillo worked fine.
jmclnx•4d ago