![]() |
Dark cloud...
... or:
Amazon, and you're done. :D http://www.reuters.com/assets/print?...70641M20110107 The machine he leased, wa snot even a real supercomputer, but just a combination of two CPUs and two nVidia chips, says the German article that I originally found: Quote:
|
you know, they say that the nVIDIA Cuda is better at number crunching than even the intel xeon
|
True Hackers don't ever report what they can do.
:03: I find the whole thing funny and a cry for attention. Which again, they don't do. Cuda allows better GPU functions on the Nvidia GPU's with Cuda support. But it can be accessed for 'other' purposes if you know what you are doing. |
Quote:
research is better, and publishing stuff and speaking at conventions really do gets you "rich and famous" |
And the ones that never tell what they are doing?
:hmmm: Probably liveing a very nice life and no one bothers to ask where the money came from. :haha: Here's a simple link to some history of early hackers. http://www.sptimes.com/Hackers/history.hacking.html You probably know some of the names there. |
well i know nothing about that
though i am still trying to get into defcon my most current project get my friend on this list:http://attrition.org/errata/charlatan/ |
Those named in that article are the not so sly ones.
Hacker has become a bad word where once it had a true meaning. To Hack was to enter a system, leave no trace, and do no harm. Somewhere in the course of things? The meaning changed. A few people decided to use thier knowledge as a weapon. Thus anyone calling themselves 'Hacker' were branded, and hunted down. Those dark ages have mostly been ignored now. We see the 'kid in XXX caught for' reports now and then sure. But he's probably useing outdated Tools and/or technics. And doing something stupid! The real up to date Tools/technics are shared by a select few. They have better security the even the GWX Lair! :haha: |
as the self promoter i am, check out my research essay:http://sihanstechblog.blogspot.com/2...es-war-in.html
I hope i can get into some hacking convention with something like this:D |
Not a bad idea for the most part.
But I think you missed a very obvious solution. One I am very sure has already been developed. :03: You do not need multipule persons to launch any attack. You only need special software located on servers that allow executables to be run. Give the order? Those programs run. Thus one person can launch thousands of attacks at the click of a button. |
Quote:
|
Hack as a term is pretty well defined here as most want to define it.
http://en.wikipedia.org/wiki/Hack_(technology) Hacker is now confused with Cracker. We Hack an internet linked site to gain access, but Crack a program to operate as we want it to. Funny how the powers in charge can re-define terms. Funnier still is how many follow what they are told. |
Quote:
One may hack to crack, but one may also crack without a hack. Quote:
|
All times are GMT -5. The time now is 11:47 PM. |
Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Copyright © 1995- 2025 Subsim®
"Subsim" is a registered trademark, all rights reserved.