home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
No Fragments Archive 10: Diskmags
/
nf_archive_10.iso
/
MAGS
/
STEN
/
STEN15.MSA
/
NEWS.TXT
/
TECHNEWS.ASC
< prev
next >
Wrap
Text File
|
2010-04-21
|
9KB
|
174 lines
∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°
TECHNOLOGY NEWS...TECHNOLOGY NEWS...TECHNOLOGY NEWS...TECHNOLOGY NEWS...TE
∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°
This issue contains a report on the 'Hacking at the End of the Universe
Congress', a Bulgarian virus at Sizewell B, computer acronyms, how to
hire the British Aerospace Concorde simulator, and anything else that's
fit to print...
Bulgarian Hackers Have a Dandy Time at Sizewell-B
∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°
The strangled strains of Yankee Doodle dandy issuing from the offices of
the Sizewell-B nuclear power station have shot a computer virus from
Bulgaria into the hacker's hall of fame and cost one man his job.
To have embarassed Nuclear Electric by penetrating Sizewell-B's security
system is a feather in the cap of the hacker <sic> who invented the
virus, but might cost the station dear in its public relations battle for
the hearts and minds of the people of Suffolk.
The station is the most computerised in the world and part of the safety
case it must make to the Nuclear Installations Inspectorate is that its
computers cannot be penetrated by hackers.
An anonymous group, or person, styled Bulgaria 50 is believed to be
responsible. The tunes are the hallmark of hackers from the former
eastern bloc country.
Tony Collins, executive editor of Computer Weekly which broke the story,
said, "These hackers are usually bright young people in their twenties who
lack maturity. Playing a tune in Sizewell is harmless enough but it does
mean penetration is possible, which is very worrying for Nuclear Electric.
Nuclear Electric was anxious to point out that the tune was not introduced
into the main safety system. A man found with unauthorised software was
subsequently dismissed.
Paul Brown, Environment Correspondent, The Guardian, 11/11/93
~~~~~~~~~~~~~~~~~
Jeez... Why didn't they give it to the gardening correspondent to write
up? The word 'hacker' has two meanings. The original coining (1960s)
refered to an electronics or computer buff who knew his/her subject
inside out; it was a term of approval from peers. The current meaning,
which has overshadowed the first, is someone who breaks into a computer
system by modem.
A virus writer (spit!) could be a hacker in the original sense, but
that's obviously not what Paul Brown had in mind. The type of safety
sytem used at Sizewell is not, repeat *not*, connected to the outside
world; it cannot be hacked into. The truth, although it doesn't make
such a dramatic story is that someone brought in, say, a disc of games
which had a virus on it. That virus was then transmitted to the network.
It shouldn't have happened, the network should have a virus checker built
into it, but it's a very different scenario from someone hacking into the
system.
JFW (in pedantic mode)
∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°
Hacking at the End of the Universe
∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙∙°∙°∙°∙°∙°∙°∙
A campsite outside of Amsterdam was the venue for the first 'Hacking At
The End Of The Universe Congress' this August. A thousand hackers and
techies from all over the world met to take part in informal discussions
and workshops. Participants were urged to "bring anything that has a
power cord or batteries and let's network it!" An Ethernet network was
set up for the duration of the Congress, and six phone lines were laid on
to allow access to Internet and the outside world.
It took twenty people four days to set up the infrastructure. Three
Ethernet networks were built: one for the organisers, one for the only
solid building, and and the most spectacular one for the campsite itself.
Unfortunately, the camp network (a thin cable running a couple of metres
above ground level) was almost severed on the first day by the antennae
on a visiting television van.
The power supply also caused problems. Although three generators had
been rented, only one of them was in place on the first day, and it came
without a regulator to control the current. Participants were limited to
machines that could operate at 180 volts and 40 Hz, and the enthusiastic
few who had brought fridges and microwaves were asked to use the camp
cafe instead... The power problems were sorted out by the end of the
first day and the hackers celebrated by logging on until the small hours
and even, in some cases, continuing with their writing and compiling.
A wide variety of computers were in evidence: the main building housed the
organisers' PC compatibles, while participants arrived with a Sun
workstation, an Apple Macintosh, a range of PCs, and a Vic 20 with a
keyboard painted violet. Several hundred machines, worth many thousands
of pounds, were spread across the campsite and linked to the networks.
If this Congress was anything to go by, then hackers prefer desktop
machines with large hard drives to the more fashionable laptops and
portables. The main reason for this was the storage needed to download
large chunks of news from Usenet. The most popular operating system
(despite having few users who'd openly advocate it) was MS/DOS, with over
half of the machines present running it. The remainder of the campsite
used several dialects of UNIX, with a freeware version called Linux being
the most popular.
And what of the social side? Well, most tents were so full of hardware
that they hardly left enough space for the hackers to sleep, let alone
socialise. Contacts were established and information was exchanged, but
the real nature of the event only became apparant after nightfall, when
the tents were lit up by glowing screens, and the night was disturbed by
the William Tell overture being relayed through a large speaker system
whenever a particular machine was fired up.
Outsiders who view hackers as a criminal subculture will be disturbed to
learn that not one theft was reported from any of the flimsy snd
frequently unattended tents during the duration of the Congress.
The Congress finished with The Party At The End Of Time, after which the
networks were shut down and the power was cut off. The Global Village
had dispersed to its usual networks and groupings once again.
Paraphrased from 'Computer Guardian', 09/09/93
∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°
"Never use an obvious phrase when an Acronym will do..."
∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙∙°∙°∙°
Computer industry acronyms are often feeble and strained (tell me about
it!), but someone at London Underground Ltd has had a bit of fun with them
At the moment, its management runs on the Revenue Office Mini And
Networked Computer Equipement, which adds up to ROMANCE. But early next
year it will be switching to a system developed using Cogno's PowerHouse
to collate information about the 700,000 tickets issued each day. This is
the system for Diverse Integration and Verification Of Revenue Collection
Electronic Data - called, obviously, DIVORCE.
Computer Guardian, 07/10/93
∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°∙°
Flight of Fancy
∙°∙°∙°∙°∙°∙°∙°∙
Computer flight simulator enthusiasts are being offered the ultimate
thrill: a session on the British Aerospace Concorde simulator in Bristol.
The £629 one-day course, through Goodwood Travel (0227 763336), includes a
pre-flight briefing, two hours on the simulator under the instruction of a
British Airways training captain and a three-course lunch.
The Independent, 06/11/93
~~~~~eof~~~~~