Files
hpr-knowledge-base/hpr_transcripts/hpr1014.txt
Lee Hanken 7c8efd2228 Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use
- Search episodes, transcripts, hosts, and series
- 4,511 episodes with metadata and transcripts
- Data loader with in-memory JSON storage

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-26 10:54:13 +00:00

655 lines
61 KiB
Plaintext

Episode: 1014
Title: HPR1014: Radio FreeK America 15 (2002/06/05) - Special Rax-only Episode
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr1014/hpr1014.mp3
Transcribed: 2025-10-17 17:27:27
---
Hi, you've reached to a parallel. I can't make it to the show right now, but if you please
leave your name and number, Radio Freak America 15, you'll get back to you as soon as you can.
The number you have reached has been disconnected.
Welcome to Radio Freak America 15. I am not, repeat, not dual parallel. Dual, as you
heard is unavailable this week. He is, as they say, in TV land off on assignment. And who was that?
Walter Cronkite or somebody that used to be off on assignment? Well, turns out years later,
people found out that assignment was the name of his yacht. So when he said he was off on
assignment, he wasn't lying. They weren't lying to you. The media wouldn't lie to you. They
were stretching the truth. Well, they weren't even really even stretching the truth. They were
telling you the truth. Technically, he was on assignment. They just didn't tell you that
assignment was the name of a boat. So anyway, dual is not on Walter Cronkite's yacht or anything
like that. He's working hard and wasn't going to be able to do the show today. So I stepped in and
oh yeah, my name is Rax. In case you're tuning in for the first time,
dual is the phone freak in the crew. I'm the hacker. I'm the hack. I want to get my jolies on
figuring out clever kinds of solutions to things. Well, maybe sometimes they're clever. Maybe
sometimes they're not so clever, but one of the things that we do here on Radio Freak America
is give out free knowledge. And that's one of the things that's sort of the hackers' term,
Radio Freak America. Radio Freak America. Well, the free K is free knowledge. And it's also kind
of a wordplay on freak, like phone freak, which is what dual's forte is. But I want to talk to you
tonight about hacking. And we're going to go back a little bit in time and look at the origins of
hacking and see where and why and how come hacking has gotten to be a dirty word. Well, the
blame it on the media, if you will. As always, on the sign out of the show, we always
says, be the media. Well, why do you want to be the media? Do it. Well, you've got to do something.
You can't just sit back and let them pour all that slap on you on TV or on regular radio. So
that's why avenues like this and rant radio are so cool because they give you and me and anyone
out there who cares to take the time to do it gives you an opportunity to give their viewpoint.
And hacking goes back, oh, quite a ways. I mean, you know, there's hackers, golfers,
called themselves hackers, and you know, it's someone who's not a professional, but you know,
hacking kind of got started or that as it got applied to computers and technology anyway,
got started at MIT, yes, good old Massachusetts Institute of Technology. And hacking was
something that people did there. I mean, it was a higher education institute dealing with
technology. The Massachusetts Institute of Technology was an institute of sports or medicine
or whatever. It was about technology and technology can take various types of forms. Of course,
they're doing all kinds of nifty things at MIT these days, but hackers back in the day when things
got started were mainly computer programmers and they would work hard and they would be diligent
and they'd be there all night. And oh, yeah, they forgot to take a bath or a shower when they
came in today because, well, God, it is just so important to work on that program and get it
all figured out who can afford to take the extra five minutes to take a shower. So, but hackers,
aside from that less than admirable trait, had the tendency to be very diligent and work on things
and come up with clever solutions to things and not only would they find those solutions,
they would tell other people, they would tell their peers, they would tell other hackers,
hey, I found this really cool way of doing this. I found a neat way around, oh, I don't know,
maybe getting this donated super secret Xerox laser printer that's in the mid-70s at Richard
Stolman had to deal with and he's being one of the, you know, quintessential hackers of our day.
And we'll talk a little bit more about Stolman later on. But there was a problem with printing and
they couldn't get into things. They couldn't get the source code because, unlike in the hacker
tradition where you share that information, people at Xerox decided to start doing this thing called
proprietary software. And with the proprietary software, they just kept all that stuff to themselves.
Well, hackers didn't do that. Hackers shared their knowledge. So, when someone found a solution
to something, someone invented a better mouse trap or came up with a better algorithm for sorting
or whatever, they would share it with everybody. Why should someone else have to reinvent the wheel?
I just figured out this, you know, cool binary tree or bubble-sort algorithm. I want to share it
with everybody. Let them, you know, I've done all the hard work on it. Let them benefit by it.
That way, people won't have to spin their brain cycles on figuring out a way to sort data.
They can build on what I've done and take it from there and come up with other great things.
Well, that's what hackers originally were. That's where the term came from or that is near as
urban legend can tell that that's the sort of area that it came from. But hacking and hackers,
like everything else, the media got a hold of and twisted it around to their own liking,
to their own devices. Because let's sell it to face it, folks. The media is out there to sell.
And think about it. You watch the 11 o'clock news or 10 o'clock news or whatever time it comes on
for you and what are they talking about? Hey, this cool thing happened or that cool thing happened.
No, it's this train wreck happened and this fire was going on and this many people were killed. Well,
I don't know what it is about our society, but it's kind of like an accident at the side of the road.
You just got to watch. You just got a rubber neck. You know, we've got this rubber neck society
where people just have to stop and look and see the tragedy that's going on somewhere else. Well,
the media knows that people like that and they sell that. They sell advertising, right? That's how
they make their money, one of their ways. So if people didn't have all this rubber necking kind of
iffy stuff to look at, fires and theft and God knows what else. Who'd watch the news? Well,
maybe you'd watch for the weather. Yeah, that's okay. Maybe you'd watch for the sports scores or
if you're into that kind of thing or whatever, but the media found out that that other kind of stuff
sells. The dirty laundry as the song goes. So the media wants to make money. Hey, they're big corporate
America or corporate insert your own country here because we know that listeners out there are
we've got listeners in Germany and Norway and hey, if you're listening from one of the other
countries, please do feel free to email us. Go to oldschoolfreakphreak.com and click on one of the
links. Drop us a note. Let us know where you're listening to us from and let us know how we're doing.
Give us some ideas. Tell us what you like. Tell us what you don't like. And if you got some ideas,
just share it. That's you know, keep knowledge free. Share the knowledge. Keep the things going.
So anyway, the media, the media, the media, they want to have people tune in because hey,
the more eyes that are glued to that set or the more eyes that are reading that newspaper,
does anyone read newspapers out there anymore? By the way, but the more eyes that are watching TV,
the more they can sell that advertising space for the abdominizer or whatever kind of thing or
fast food place. You know, the more people that are watching, the more they can charge and that's
how they make their money. So good news, unfortunately folks, doesn't sell very much. Why do you think all
the human interest stories as they call them appear at the end of the show? It's like, oh yeah,
you know, we had this death and this war and this famine and oh yeah, by the way, here's something
really nice that someone in your community did. You know, they help their fellow man, isn't that
special? Well, thanks for tuning in folks. Be sure to watch for war and pestilence and famine
and everything else tomorrow. Tune back in, same bad time, same bad channel. So that's what the media
wants to do. Well, as computers were coming along, they didn't understand it. They were afraid of it
and let's face it, everyone listening to the show right now probably knows someone or knows
someone who knows someone that's afraid of technology. You know, the 12 o'clock flashers out there
every appliance in their house is flashing at 12 o'clock because they have no idea how to
quote unquote program their VCR. They don't know how to set the clock on it. So they're just afraid of
it. Hey, they think that microwave technology like heat up your coffee in the morning or cook your
jiffy pop popcorn. That's about the peak of technology. That's as much technology as they need to
stick a cup of water in there, turn the dial, push the button, and away you go. That's the technology
they need. That's what Joe six pack out there wants. And let's face it, there's a lot of Joe six packs
out there. You know, guys who in gals, whoever come home from work, grab a beer, sit down in front
of the boob tube and watch and see what's going on. Well, the media as they found out that, you know,
these computers things were coming on and there was these various stories and oh my goodness. Look
at this. Here's some dirty laundry. Here's some people who aren't necessarily playing by the rules.
Hey, they're not coloring inside the lines. They're going outside of those lines a little bit.
Well, there's got to be some name for them. There's there. There has to be some term for that. Oh,
look at that. Hackers. Yeah, that's what they are. Those hackers, those programmers. That's what
that guy is. That or that girl is that just broke into a computer or did something nasty. They
must be a hacker. And unfortunately, Joe six pack set back there and said, you know what? Now I've
gone. That is a hacker. Boy, them hackers are bad. But anyway, there's a lot more to it. But just
over simplification, that's kind of where it came from. That's kind of how it got messed up. So
hacking isn't necessarily a bad thing. It's not a bad thing in my book. I don't I call myself a
hacker. I like looking for creative solutions for things, finding out information, delving in,
and then sharing that knowledge with other people. So if a hacker is someone who's
enjoying the technology, finding out information, sharing that information,
it's not necessarily a negative thing. What should someone who has negative intentions for
using that technology be called? Well, some people have tried to use the term or tried the
popularize the term cracker, like a safe cracker. Someone who's breaking into things and
you know, it just hasn't seemed to stick quite as well. People, the media are still calling
people hackers who are not necessarily bad as the media tries to make it say. But there's
a book active defense. I know we talked about this before in the show, but since this is our
hacker special, I'll read this again. It's Chris Breton and Cameron Hunt wrote this book called
Active Defense. They've got a great passage in here that goes, people from trade magazine writers
to Hollywood movie makers often use the words attacker hacker and cracker interchangeably.
The phrase we got hacked has come to mean we were attacked. However, there are some strong
distinctions between these three terms and understanding the difference will help you to understand
who is trying to help reinforce your security posture and who is trying to infiltrate it.
An attacker is someone who looks to steal or disrupt your assets. An attacker may be
technically adept or a rank amateur. An attacker is best resembles a spy or a crook.
The original meaning of hacker was someone with a deep understanding of computers and or
networking. Hackers are not satisfied with simply executing a program. They need to understand
all the nuances of how it works. A hacker is someone who feels the need to go beyond the obvious.
The art of hacking can either be positive or negative depending on the personalities and
motivations involved. Hacking has become its own subculture with its own language and accepted
social practices. It's probably human nature that motivates people outside of this subculture to
identify hackers as attackers or even anarchists. In my opinion, however, hackers are more like
revolutionaries. History seems with individuals whose motivation was beyond the understanding of
the mainstream culture of their time. The Vinci, Galileo, Byron, Mozart, Tesla were all considered
quite odd and out of step with the accepted social norm. In the information age, this revolutionary
role is being filled by individuals we call hackers. Hackers tend not to take statements at face
value. For example, when a vendor claims, quote, our product is 100% secure, unquote,
a hacker may take this statement as a personal challenge. What a hacker chooses to do with the
information uncovered, however, is what determines what color hat a particular hacker wears.
To distinguish between hackers who are simply attempting to further their understanding of any
information system and those that use knowledge to illegally or unethically penetrate systems,
some of the computer industry reviews the term cracker to refer to the latter.
This was an attempt to preserve the traditional meaning of the term hacker, but this effort has
mostly been unsuccessful. Occasionally, publications still use the term. The law, however,
does not recognize the difference in intent only the similar behavior of the unauthorized system
penetration. So I think it's a pretty good description. Hackers are trying to find out information.
It's like any other kind of tool. Knowledge is power. Power can be used for good things,
and power can be used for bad things. You have power like electricity to light your homes,
or it can be used to carry out a best sentence, an execution, the electric chair.
The same electricity that would be running through your house is the electricity bad because
that's how it's used? No. What else? Airplanes, right? September 11th, still in the minds of most
of the people around the world. An airplane's a wonderful tool. Those people who chose to use it
as a weapon on September 11th, perverted the use of that tool. So just because you have a tool
does not mean that it's necessarily bad. The airplane itself wasn't inherently bad. Certainly,
all the other people who died, the passengers and the crew on the airplane weren't bad. They
didn't have evil intents. It's just those few people who went on there that had bad intents to do
things. So hacking with all those negative connotations really can be, and is, in my opinion,
a positive thing. You want to go beyond the obvious as it's said. You want to delve in, dig in,
find out information. There's the hacker's dictionary. It's a book that, if you look it up online
on your favorite search engine, you'll find that it is available online, and it defines all the
little terms and the little techniques. Not so much techniques, but terms that people use
to identify things. So hackish terms, just like any other subculture or any other group,
you know, words and terms are developed and used for different meanings. And the hacker's dictionary
does a pretty good job of keeping up with that stuff, so you can know what's going on with that.
The editor of that, Eric Raymond, is the guy who edits that, and he wrote a little article
in 2001, I guess, called How to Be a Hacker. And he just talks about it. And I think it's a
really good read. Gives lots of information. The hacker and slash nerd connection. Of course,
I prefer the term geek over nerd, but that's just a personal opinion. Talks about basic hacking
skills and, you know, what you should do and why it's important to know some programming language
and even get some suggestions of some of the things in that to do with it. But hacking in itself
is in our form. It can be used to, well, I make a living at computer technology. That's what I do.
And I use my skills as a hacker, my creative thinking to do more mundane things. Of course,
it doesn't take a lot of creative thinking to form at a hard drive or install an operating system.
But when you come up with the problem, being able to think outside of that box, think creatively.
Remember reading something about, oh yeah, I remember someone read something about this,
and someone wrote something about this. You know, let me look it up and see and get that information.
Again, that's why it's so important that that sharing of knowledge is sharing of information.
Keeping knowledge free is important. And that's one of the big
creeds, if you will, the creedos of the hacker culture is to share that knowledge. And that's
part of the thing that makes it so difficult for the open source community is they're working at
sharing that knowledge and sharing the source code. And companies, Microsoft, being one of them,
certainly not the only one, but being being a very influential one in that regard.
It's closed down their source code, proprietary source code. You can find out, I think it's called
the letter to hobbyist by Bill Gates talking about why it's important for companies to close their
source code. And it's kind of interesting. I was talking about this with someone else the other day,
but for those of you that can remember back in about what was it, 1987 or so, IBM came out with
their PS2 line of computers. Computers were around before IBM. Personal computers were around
before IBM, certainly, but the ones that were popularized, the IBM PC, the Intel,
standard, the IBM compatible, whatever you want to call it. IBM developed that specification
came out with it in about late 1981, early 1982. And it was very untypical IBM. I mean, they took
off-the-shelf components. The 8088 chip was made by Intel. I'm not sure what else it was being
used for at the time, but basically all the components that they had were off-the-shelf type of things.
Hell, even their operating system was from this little start, you know, little company up in
Seattle, Washington called Microsoft. They talked to digital research who had an operating system,
but that didn't go through. So they even took this off-the-shelf quote unquote off-the-shelf operating
system from this little, you know, nothing company called Microsoft up in Seattle, Washington,
though, of all places. I mean, you know, IBM was headquartered in Bocawood's own Florida,
and they had things in Armak, New York, and all the other thing. But they took all these off-the-shelf
components, put them together, and in another non-traditional IBM move made those general
specifications available. Now they didn't let people just copy everything. They didn't open-source
the BIOS or anything else, but the specifications were published, so other companies, other people
could make components that were compatible. They could plug them in. Now I know the Mac fans out
in the audience there might be taking exception to some of this stuff, but think about it for
second folks, you know, Macintosh is great computers. They always have been, but they were always
very close, very proprietary. And to Apple's credit, they've done a great job with it. They've kept
the quality control, if you will. They specify everything from start to finish on Apple programs
that are not only the hardware itself, but any component that was going in there. They had all
the specifications for the programs, and they've done a phenomenal job, especially of late OSX,
you know, being, well, we'll get into that a little bit later, but being, you know, Unix or
Mac-based for the kernel is building on all that work that had been done before. But IBM,
in a non-traditional IBM type of move, made this type of information available. Well, you had
companies like Compact, which was formed of former HP engineers and other double-ease electronic
engineers coming together, and they reversed engineered it. Another yet another traditional
hacking type of thing. You look at the outputs that something does. You look at the inputs,
and you figure out what went on in the middle. So here's an example. The output is a house.
The input is a bunch of lumber, and wires, and pipes, and whatever else. So you know what the
output is. You know what the input is. So you figure out what goes in between. You figure out
how to build that house. That's reverse engineering. And just for, you know, legal reasons,
they got to make sure that anyone who's working on that, you know, didn't actually build the house
or help build the house or anything. They have to keep that completely clean. So they're doing it,
you know, just from that available information. But Compact came along and reversed engineered
things and came up with an IBM compatible computer. And that was great. And other companies came
along. Well, what they weren't so great necessarily at first, but eventually they got to be great.
And we had all these compatible computers going around, and you know, millions of people were
buying them all over the world. Anyway, fast forward a little bit to 1987. IBM says, hey, wait a minute,
you know, we developed this. We started this. Here's Compact and HP and all these other companies
that are making money. We should be making that money. Well, let's take, let's take this standard
and let's change it a little bit. Let's change the things instead of having these ISA slots. They're
which are kind of slow. I mean, they were okay for their day. We're going to develop our own. Let's call
it a microchannel architecture. And let's not quite publish everything like we did before. Let's
make people license it from us. So if companies want to make cards, well, hey, they got to pay
us royalties for that. If they want to, you know, other companies want to build compatible systems
for that. Hey, we license this technology. Other people can come and buy it from us. And we'll make
money on it, whether we're selling it or someone else is selling it. And they did that. They came
up with the PS2 keyboard connector and mouse connector rather than being serial mouse or the five
pin then larger one for a keyboard. They came up with all these other things.
Bottom line folks, some of the things stuck. PS2 mice and keyboard connectors. Now that's
pretty much gone. Goll gone to USB. The VGA, videographics array, stuck with the PS2. But you know what
IBM found out? They found out that the standard was bigger than IBM. Here's the company that
quote unquote pioneered the personal computer. We all know that's not true. But the company that pioneered
the IBM personal computer was no longer in charge of the standard. Even though they had their name
on it and they had the nice three little letters with the stripes in it that said IBM, they did not
control. They couldn't control what people were doing. They people didn't want to buy that.
It was too different. It was non standard. The changes didn't make it worthwhile enough to
adopt it to move over. So after whatever kind of period of time microchannel architecture finally
died. The PS2 series of computers, they have a finally died to Boohoo. But that's what IBM found
out. Matter of fact there was something on the net today that IBM has gotten out of the hard drive
business. I think they've turned that over to Fujitsu or somebody. But IBM used to make hard
grants. Oh, here was a fun thing too folks. When they came out the PS2 line, IBM decided to change
the terms. Everyone was calling it a hard drive. Well, IBM decided to call it a hard file.
It wasn't a hard drive anymore. It was a hard file. And not only were they trying to change
the hardware, they were trying to change the terms that people were using. It's like it's a hard
file. And the motherboard was, I think it was a planar board. It wasn't even a system board. I think
it was a planar PLA and AR. It was a planar board. And people just said, you know what? Call it
what you want IBM. I'm still calling it a motherboard. I'm still calling it a hard drive.
Anyway, they say those who can't remember history are doomed to repeat it. Take a look at what's
going on now folks. Microsoft is pushing really hard. They're pushing on their licensing
technology. Licensing technology. Yeah, they even call it license 6.0. It sounds like a product
doesn't it? Well, I got to upgrade my license 6.0. And that's exactly what they want you to do.
They want you to think like that. Well, you know, I've got to get a new license. I've got
whatever. Anyway, I don't get into this stuff. I don't understand it. I don't know a lot of
people who we actually can't understand it. But I'm sure there are people out there not only
Microsoft employees. There's probably non-Microsoft employees whose business it is to understand
all that stuff. But so they're pushing really hard. They're making you making it difficult to
say the least for people to use their software even to use it properly and ethically. What do
me about properly and ethically? Well, one copy of the software for every computer that you're
running it on. That's what you're supposed to be doing when it's licensed software, when
it's proprietary software. Now when it's open source software or free software as Richard
Solomon likes to call it. But when you do that and you try to do something other than that,
Microsoft is losing money. Well, yeah, it's true. They're losing money on that. And there are
various people who have different arguments. I'm not here to debate that today. But people say,
well, if it didn't cost so much money, if it was more affordable, I would buy it more. Well,
if you look back on it, folks, software is a whole hell of a lot cheaper now than it was before.
You know, think about it. You used to buy a word processor or buy an accounting module,
like an accounts payable module or something. And I mean, it was like $900 for the one thing. Well,
quick books. Now, you know, for a couple hundred bucks is a thousand times better than what that
one module was, you know, ten years ago. Or look at the prices of computers. 1989. I bought
a hundred and fifty meg SD hard drive ESDI extended. Oh, I can't even remember what it stands for.
A more hundred and fifty meg SD hard drive. First of all, that was huge. You know, I was going from
like a forty meg. Now, that's not gig. That's meg megabytes with an Elm. I bought that from a
friend of mine who had a computer store. He gave me his price on it. How much do you think I paid?
Nope. Nope. I paid more than that. I paid more than that. $1,300. $1,300 for a hard drive.
150 megabytes. I was living large. I got files that are bigger than 150 megabytes now.
$1,300. Well, fast forward that, right? The last one I bought was an 80 gigabyte hard drive for
$89. Dollar a gigabyte. I can't even remember how it was like, you know, whatever, $100
megabyte back then. I mean, it's crazy. So if you look back with that kind of perspective,
the amount of horsepower, everything else we have going now is far better. And that's because
of more's laws, they call it, you know, if you haven't heard about more's laws, type it into a search
engine, check it out sometime. But so computers and technology have been marching along, and that's great.
And some people say, well, you know, if it wasn't for Microsoft Windows, you know, the fact that you
have to have bigger hard drives and faster processors and everything, you know, we can still be all
getting along with 486s. And hey, you can't. Linux runs great on the 486. Well, it runs reasonably
well. Let's even face it with all the graphical things and everything else going on that people
are doing now with days. You know, it's it's turning on to be in reality. If you want to do anything
more than just run like a single app on it, like, you know, I have a dedicated firewall box per
your Linux or your BSD or whatever you're doing. You're those unish kind of things, those unix
ish or unishes, I like to call them operating systems. You need something more than a 486
processor these days. But I mean, you can still get some work done. It's still possible to do that.
But I think Microsoft is starting to find or starting to fall victim to the same type of thing
that snuck up and bit IBM on the ass in 1987 that the standard is bigger than they are.
So Windows XP. Yeah, it's great. I run it. I've got it. Yes, I have a license copy of it just in case
you're curious, but it came with my laptop. But it is it's great. It's even better than Windows 2000.
Windows 2000 is a pretty good operating system. I mean, XP is even better. It, you know, and I can
imagine people are groaning and moaning and rolling their eyes and everything else. But hey,
it's out there. It's being used. It's being used a thousand times more than any Linux or BSD or
alternate BOS or Macs or even Macintosh operating systems being used out there. So face reality folks,
it's out there. It's being used. It's going to be used. So, but what's going to happen when
Microsoft finds out that, as they've been seeing, it's like, you know what? Hey, I don't need to
upgrade to Windows XP. My Windows 2000 is working fine. Or my, my, well, I don't know how many people
would really say this. My Windows 98 is working fine. The, uh, the whole Windtendo, you know, Windows 95, 98,
ME, all that stuff, Windtendo, like Nintendo. You know, it was kind of a toy operating system.
I mean, it helped bring us along to where we're at now. That's great and good and everything else.
Microsoft is finding that it's own, it's only competition in the, in the, in the commercial world
anyway, is itself. So when a person has Windows 98 on their two-year-old computer, why are they
going to go out and spend $99 to upgrade to Windows XP when all they have is a Pentium 2 with,
you know, 64 meg of RAM? Well, then they're going to have to start buying memory. They're going to
start buying hardware and everything else. Hey, you know, it's, it's your aunt Sally and, and,
and Podunk Idaho that, uh, just checks email, you know, keeping in touch with her grandkids or
something. I don't know. And, you know, that's all she needs. So why should you go out and buy
that? Well, that's what Microsoft is finding out. There's so many people out there with that
that are working on those things. It's like the only competition they have is themselves.
Same thing with, with the office suite, Word Excel, PowerPoint, all that stuff. They're competing
against themselves. They have Office XP. Well, maybe people are buying it when they're getting
their new systems, but how many people, whether you're in a corporate America or corporate, uh,
Euro, you know, corporate Europe or whatever, how many people are going out and buying and upgrading
that? Office 2000 works just fine. Hey, Office 97 works fine for enough of the people that are out
there that they say, you know what, I can really afford to skip this. I don't need this version.
I don't need the next version. Matter of fact, I'm not needing any version because I'm going to go
with OpenOffice.org, but that's, that's getting off into the other side of things. So as we're looking
at that, as we're dealing with this kind of thing, we have to realize folks or Microsoft really
has to realize that the standard is getting larger than they are. Just because Microsoft comes out
with a new operating system doesn't mean people are going to jump into it. Just become,
because they come out with a new network operating system, Windows.net doesn't mean people are going
to jump to it. Now, there's probably servers out there still with Windows 35, and Windows NT 351.
There are certainly lots of Novel 3.1 servers with 3.1 or 3.12. There's lots of servers still running
out there. Let alone the fact that people are still running Novel, but hey, it's doing the job,
it's getting it done. You know, do you run out every year when there's a new car? Well, it's,
it's car 2000. It's, you know, it's car, you know, 4.5. Kind of silly the way Microsoft was changing
that first. It was like, you know, numbers. Everyone kind of dealt with numbers and they wanted to
change it was Windows 95. So you could sell where it was. Well, gee, I'm using Windows 95. That's
seven years old now. Maybe a better upgrade. Well, so they had 95, 98, ME, Millennium, Secondation,
all that other stuff. Came with Windows 2000, and then they decided, you know what? Maybe it's not
such a good idea to go with numbering, you know, by years. Let's call it XP. What's the next one
going to be called? I mean, other than the code names like Longhorn and everything else, your
guess is as good as mine. But if you, just by the way, if you, if you have access to a Windows 2000
or Windows XP machine, drop to a DOS prompt, click on start, click on run, type in CMD Charles
Mary David, command, CMD for command, and type ver, and see what you come up with. You'll see
the version number that you come up with. So internally, they're still kind of referring to it
with those numbers. But Microsoft is finding or is going to find out pretty darn soon that the
standard is bigger than they are. If you didn't catch it on a slashed out a couple weeks back,
go take a look at it. Maybe a little bit longer than that now. But in South America, I think it
was in Peru, one of their elected officials, and typically, or an atypical show of intelligence
in elected office actually said, you know what? We need to look at saving money. We're spending
all this money. We're sending it off to those damn Americans. You know, Microsoft is taking all these,
you know, thousands and millions of dollars out of our countries. We're buying the software.
Maybe there's an alternative. Oh, looky there. There's open source software. There's free software.
And as Stamen says, it's not only free as in free beer, meaning it doesn't cost you anything.
It's free as in freedom, as in you can do with it what you want. You don't like the way this looks.
You don't like the way this works. You want something else. You've got the source code. You can
change it. Oh, you're not a programmer. Hey, find someone who is. You've got the ability to do
that. You've got all the tools in your hands. You can change things as you need to. So anyway,
this South American politician, I think he had a PhD in economics or something as well,
which probably didn't hurt, came with the proposal for the government that as they're looking at
software, they have to just to be responsible with their taxpayers' money. They have to look at
other alternatives other than proprietary software. Well, Microsoft in that country wrote a nice
letter back kind of rebutting all the points and saying why commercial software, as opposed to
proprietary software, why commercial software was a good thing. And you know what, it is a good
thing. It's not necessarily bad. Lots of people are using it. Lots of people are happy. It's just
when you see things happen where they're trying to force those proprietary solutions, those
commercial solutions down your throat or worse, they're taking advantage of the fact that they've
got these hundreds of millions and billions of dollars. In case you haven't heard, Microsoft has
$40 billion in cash reserves. So think of which of your favorite companies. Think of which of your
favorite countries they could buy with that money. But that fact aside, being responsible politicians,
which is almost an oxymoron by itself, they're saying we have to look at alternatives.
Microsoft wrote this rebuttal back and there's some interesting things you can find that online.
Again, one of my favorite places for keeping up on that new stuff is slash.org. But as you go there
and take a look through things, you will see that things are happening. Things are starting to
shake up and if Microsoft doesn't see the writing on the wall, they really should. There was something
posted online today that Ralph Nader wrote to Congress or something and saying that the government
should use its purchase, the US government that is should use its purchasing power to say,
if we're going to be using your programs, you have to, we're going to require you to make those
file formats available. That's not such an outlandish kind of request. The federal government
spending millions and billions of taxpayers dollars on things, that's not an outlandish request.
Oh, by the way, that would just happen to benefit the rest of the computer using world by
making those file formats available. Other things you may have seen, like the Pentagon,
they're looking at their spending, how they're spending their money on that and should things be
proprietary software, commercial software, or can you actually go with open source software,
free software? And in all the difference to Richard Stullman, I know there are some differences
out there with it. I'm not completely versed on that, so I'll try to, if I use the term open
source, I'll try to make sure I put it in the term free software in there as well, because there
are some subtle distinctions between that. But I've been playing with OpenOffice.org,
which also happens to be the website, but that's for legal reasons, it has to be the name of the
product. And I'm telling you what folks, it's looking pretty darn good. I mean, I played with some
of the betas. I had a Microsoft PowerPoint presentation that I did, I decided to open
it up in OpenOffice.org. Well, the Windows Metafiles didn't come out quite right, this didn't
quite work, that didn't quite work, but it was a beta. It was working pretty well. Got the 1.0 release
code. I'll be darn it, all those little problems I was having went away. Everything is displaying
just fine now. So, companies, individuals, governmental agencies, not only federal government,
but state government, municipal government, or you know, insert the proper governmental agency for
your country or municipality in here. They are looking at some of these alternatives and saying,
hey, you know what? Maybe there is another way other than what Microsoft is doing.
And that's probably part of the reason that Microsoft is pushing back so hard on a lot of these
things is because let's face it folks, Microsoft is not dumb, okay? There are a lot of smart people
there. You know, I'm not going to comment on the, you know, greed or anything else in that,
say what you want about that, that's fine, that's your opinion. Whether you like their products or
not, hey, they're out there, it's a fact of life, you know, it's like talking about the weather,
something going to happen with it, who knows. The U.S. federal government is taking steps against
them, the federal trade commission, read articles and see things in Europe that people are getting
fed up with things, the European Union and some of the individual countries are looking at
doing different types of things. And there was even, again, today online something about Taiwan,
the government of Taiwan is looking at using free software to save all that money. If you think
about it, you know, technology is, you know, the cost of all that technology. I mean, in Taiwan is
great for hardware, you know, I don't know what kind of percentage of hardware that we have here in
the U.S. comes from, you know, Taiwan and Korea and Japan and China, but certainly a large percentage
of it does. The Apple iMac computer is made by quantum corporation in Taiwan. Some of the delaptop
computers are made in Taiwan. So, you know, it's an international marketplace here, folks. So,
you know, those companies, the countries are making money on that, that's great. Nothing wrong with
that. But as they're starting to look at things, they're saying, well, we're making money on this,
but look at all the money we're shipping back out to the United States, back off to Microsoft.
Maybe there's an alternative. You know, now maybe things are mature enough that there's an alternative.
And, you know, what I really resent is when you see a large company taking advantage of the
fact that they have the power, they have the money. I mean, money is power, knowledge is power,
that's true. Money is power as well. So, they're taking advantage of the fact that they have all this
money that they have this power to squelch the competition. The cool thing about free software,
about open source, since there is no one person out there doing things. I mean, with Linux, you know,
Linux Torval, certainly the key figure in that hole realm. You know, in BSD, there's a whole series
of people who are committers. And there's, you know, there's other things for that in various
projects that are distributed. So, rather than having one centralized place or one centralized
company, they can go against, they have to change their tactics because they can no longer just
threaten to sue one person or one company. They have to change their tactics and start competing
on, start competing on their merits and face it. Microsoft has the lion's share. They have the
lead. We have a long way to go to catch up with open source software, with free software, with Linux,
with BSD, and even to some extent with Macintosh. Macintosh is great products again these days,
but look at the percentages. And people in countries, as they said, are starting to look at that type
of thing. What kind of alternatives do we have? If we can't get it from Microsoft, who could we get
it from? If Microsoft was blown off the face of the earth, which I know some people would certainly
like to see, what could we do as an alternative? And guess what folks? These days, alternatives
are starting to show up. Okay, let's change directions here a little bit and let's talk about
some of the tools of hacking or some of the resources for hacking. I mean, that could be a whole
separate show just on, you know, various utilities and things out there. Let's talk about some of the
resources for hacking, for finding information. One of my favorite, austulavista.com,
A-S-T-A-L-A-V-I-S-T-A.com. Great information there. And there's a matter of fact, if you go there
and do a little search, you'll find a tutorial basically by someone calling himself rabies,
B-I-E-Z, on how to basically develop a serial number generator, a key number generator.
And the interesting thing about this, other than the obvious fact of, you know, what you can get
as a result of it, it goes through, and it uses Adobe, for example, but it goes through and it talks
about looking at that information, the various segments of the information that make up serial
numbers. And then it gets down to the numbers that are really involved, and they're basically
seem to be random. The last segment is a checksum, an mathematical algorithm applied to the
previous numbers that results in a specific number. And he walks you through a little tutorial
figuring those types of things out. So I'm reading that and saying, well, that's very cool.
You know, I've never written a key generator, never had a need to do anything like that,
but it was just interesting and intriguing when you look at something like that. And he walks,
again, he walks you through. So it's a tutorial. There are tutorials for tons and tons and tons
of information, different types of things. I mean tutorials from everything of, you know, setting
up your Windows box to let it do internet connection sharing to writing key generators to just
about anything else you can think of. So, ostilevista.com or ostilevista.net is a great resource for
that. Another one that happens to have ostilevista as well in its name is ostilevista.box.biox.sqs for
sweeping. And at that site, there is tons and tons of information as well in various categories.
As a matter of fact, if you just go to ostilevista.box.sqs, they have the whole box network
that you can go to. New order, which basically deals with, it says the resource for helping people
avoid being hacked security and exploitation files and related links. So that's neworder.box.sqs.
There's an area there for Linux. There's a code area. There's a mobile area, DVDs, MP3s. I mean,
there's just tons and tons and tons of information at the boxnetworkbox.sqs.sqs. So,
and oh yes, just by the way, in case anyone's sitting here in the, you know, the great planet of North
America thinks that all this stuff is just developed and just done here. Sorry folks,
it's definitely international. It's live. It's large. It's out there for the whole world.
And that's the other kind of neat thing about the net is that in addition to being a very
democratizing type of force, it's, it doesn't matter, you know, if you're coming with a cool idea and
you're in, you know, Silicon Valley, California or you're up in some fjord and, uh, you know,
in the Scandinavian country or no matter where you're at, South America. I mean, name any,
any place on the earth, if you can get a net connection, you have as much power and the ability to
publish information as anyone does anywhere else. And, uh, for our international listeners,
here's, you know, a great little joke is what do you call people who speak three languages? Well,
they're trilingual. People who speak two languages, they're bilingual. People that speak one language.
Well, you call them Americans. It's, uh, anyway, oh, it seems kind of funny to me. And, uh, you
talked to anyone who's, uh, from a different country, they, they tend to chuckle what that as well
because we don't necessarily hear in the U.S. We don't necessarily take the time to learn all those
other things that we could out there. But the whole box network definitely is a great resource.
Ostelevista.box.sk has tons and tons of information for you. What else? 2600.com.
2600. It gets back to the, the, the phone freaking type of things that, of course, was the frequency,
uh, for making, uh, blue boxes, for making dial tones to play with the phone system. But 2600.com,
in the magazine is called, you know, they're, they're, uh, magazine now. It's called the Hacker Quarterly
comes out four times every year. But, um, there's tons of information that's shared there as well.
And, as a matter of fact, as I'm taking a look at it here, uh, 37 days remain today. So, when
you hear the show, 36 days remain until H2K2 conference in New York for those folks going there,
um, H2K2, uh, the, um, stand, you know, the original one was Hope Hackers on Planet Earth. And,
um, anyway, long story made short. That's a new one coming up July 12th to 14th in New York.
Uh, if you're going there, maybe we can hook up, check out, hang out, we'll be there, uh,
dual and I are both planning on going up there and being there for the fun and festivities. So,
2600 has a lot of great information. Um, when you go there, click on the meetings section as well.
That talks about meetings in hopefully your local area. Now, you may find that it's not necessarily
100% completely correct or completely updated. Uh, I started going to 2600 meetings back in about
August or September, I think it was. And went to the 2600 mag, uh, you know, picked up a magazine,
saw where the meeting was, went there and actually ended up running into a few folks, you know,
there at the, at the designated meeting place. Kind of easy to see when they had, uh, you know,
t-shirts with, uh, you know, various computer type of sayings on there. You know, you just walk
into someone and do the, do the old greeting. You say 2600 and they say, yeah, or they say,
what are you talking about? And you just walk away. But, um, you go there, uh, what we found out and
we've, we've moved it out into, uh, it was in a mall and it was in one of the, uh, one of the
stores in the mall and the restaurant. Well, we found it wasn't very conducive. So, we moved it
out into the food court where most places seem to be for the 2600 meetings. And we're having a
heck of a time trying to get them to update that for the 2600 in our area. Maybe when we're off in
New York and seeing people face to face, maybe we'll be able to get some action for that. So,
bottom line is if you don't, uh, find it there, you know, don't be discouraged, uh, you know,
look around in the area. If there's a food court, generally things two people seem to
hang out. The kind of the fall thing is to, uh, meet by the telephones and then, you know,
pick a place to sit down after that. So keep that in mind as you're, uh, as you're doing your 2600
things. And if you're, uh, you know, if there's not one in your area, think about starting one.
Check out. They've got the meeting guidelines online that you can see and, uh, you know, it's,
it's open everybody. That's one of the things that has to be publicly accessible, publicly
open thing because there's nothing to hide. Uh, this is my first H2K2 that I'm going to. I went to
Defcon last year and I mean, you know, it's, it's great. I mean, there's everyone from, you know,
the, uh, the, uh, you know, pale face, pale skinned, uh, black t-shirt wearing, uh, you know,
uber geeks to, uh, guys in their khakis and polo shirts that work for various federal agencies.
And they're all there and they're, you know, all for the same kind of thing, learning information,
finding information, sharing information. I'm not sure how much information the feds can share,
but so they're at least they're learning. So it's, it's kind of an interesting atmosphere to, uh,
to go to and see that. So we're looking forward to that. And if you're going to Defcon,
be sure to, uh, try to find us. We ought to have some old-school freak shirts, uh, that will be
wearing and we'll, uh, make them available. It's other folks if they're interested in doing that as
well. So, uh, anyway, packing is not just about breaking into computers. Hopefully we've gotten
that message across. It's about finding clever solutions to things. For example, the, uh, we've
talked about it a little bit on the show before. The new Celine Dion CD is supposedly impervious
to copying. It crashes computers if you, uh, actually even just try to play the CD in there. Now,
I'm not a big Celine Dion fan, so I don't know that it'd be really be worried about that, but the,
uh, implications of that are great. I mean, if that would take off there, who knows who,
what other kinds of things are going to try to put it on. So, um, you can go and find out without
too much difficulty how to defeat copy protection with a, uh, with a magic marker with a felt tip pen.
Um, again, not too hard to find out. And technically, you know, with the, uh, the digital millennium
copyright act, now felt tip pen should be illegal because that allows people to defeat the, uh,
the copy protection. So, that's a, that's a very bad thing, but you know what? I say it's a clever
hack. It's a really cool way that someone figured out how to do something. Uh, another thing you
may have seen that's a clever hack is these biometrics, you know, measuring some, something on the
human body for identification. People have been doing, uh, you know, uh, face recognition. We all
know about the implications of that, but they've been doing, um, fingerprints. And you can even buy
some laptops now. I think a micron has some laptops now with fingerprint readers built in.
And well, it turns out that a, a clever hacker in, uh, Japan, I'm going to try to pronounce his name
here, but, uh, long story made short, he figured out by using regular household kind of things you
can find in a little, uh, circuit board etcher for making, uh, you know, computer circuit boards and
stuff. And anyway, bottom line is basically using gummy bears. You can fake out these fingerprint
readers. Uh, if you want to read more about it, go to count your pain at C-O-U-N-T-E-R-P-A-N-E.com
and type in the word gummy bear, G-U-M-M-I gummy B-E-A-R. And it gives all the details about it.
And the cool thing about that is, I mean, it's a very clever hack, but as one of the other articles
I was reading about it was saying basically all the companies that are doing biometrics for, uh,
recognition basically should pack it in. I mean, that kind of defeats their whole thing. It's like,
G, you know, we figured out a way to open up the envelope to see what's inside, uh, you know,
it's just not that secure. And the thing is, if people didn't publish this kind of information,
only the, the real bad guys would have that type of stuff. You know, it won't have to be like the
movies you see where, you know, they cut off someone's thumb to, uh, get past the fingerprint readers.
They'll, uh, just be able to grab a fingerprint off something like a glass. Again, this article
and counter pain talks about it. Get that fingerprint cast it into, you know, make it basically
like into a little mold and, uh, you know, make your own duplicate of that fingerprint using gummy bears.
You kind of melt down the gummy bears and it takes the shape of that. So a very clever hack.
Another clever hack is, and I was trying to get one, uh, to play for you here as we were closing
out the show, but, uh, Dictionary Okie, if you haven't heard about it, it's, uh, Dictionary,
pronunciation of various words, uh, Merriman Webster Dictionary at m-w.com and other Dictionaries
online. You can go in type a word. It gives you the definition. You can click on a little icon
and it gives you the, uh, pronunciation of the word. Very cool. I mean, I'm interested in language,
right? Uh, click on things, uh, type in words that I'm not really sure of. Uh, where's
that? Maybe not necessarily sure of how to pronounce. And you get the pronunciation. Well,
that's great and they're fine and everything, but some of the clever hacks somewhere figured out
that something really cool to do would be to get a midi of your favorite song. And instead of
the lyrics, instead of singing the lyrics like you would with traditional karaoke, uh,
now it takes a bit of time, I'm sure, but you go and take all of the words, the lyrics. You save
those sounds from these online dictionaries and you have the dictionary people sing the song.
Well, it's hilarious. And like I say, I'll try to see if I can find one to dig up here, but I think
my favorite one was, uh, uh, from nine-inch nails, uh, closer. And they hear the dictionary people
sing the lyrics or pronounce the lyrics of that particular song is, uh, kind of, kind of interesting,
kind of funny. But that's what it's all about. Figuring out clever things to do. You know,
defacing a website, that's just vandalism. I'm sorry, call it cybervandalism if you want.
Uh, what some people do, they'll go and they'll find out things. They will leave a message. They'll
try to contact the system. Uh, the, uh, boy, that's showed you how old school I am. They'll try to
contact the webmaster, uh, the system operator of, of the, uh, of those computer systems and let them
know that they're vulnerable. And unfortunately, this litigious society that we live in,
generally when people do that, they have to do it anonymously to, you know, try to prevent any
kind of negative repercussions or doing that thing. Um, but there's also things called like, you
know, white hat hackers. There's companies that are doing things. Um, used to be loft heavy
industries. Can't think of the name now of what they, what they do. Uh, they're, their new website
thing, but they, a loft was making, you know, password crackers and other kinds of things.
And, I mean, they found out that companies were coming to them and say, hey, you guys know about
security. You can figure out things. I'll pay you X-ember of dollars, see if you can penetrate my
securities. You know, tell me what's wrong with, with the security on my network. And so when
you're doing it with the, the blessing with the sanction of the, uh, people that own the equipment
and own the services, that's called white hat hacking. And it's certainly a way to make a living.
Uh, is it less fun because it's lethal? I don't know. That's up to you. Um, you know, certainly,
I'm not interested in, uh, you know, spending time in any kind of prison and, uh, making friends
there. Uh, and I'm taking some of these things and I'm applying the, the techniques and tools
and that that I know of and learn. I'm making those things available for my clients. I want to
help them have a better environment. And I think most hackers out there that are doing things,
uh, you know, except, except for the crackers, except for the attackers out there, they want to
ultimately see things be better. So if people find out solutions to things, you know, like this
fingerprint, um, hack that's the Japanese guy came up with. If he just kept that information to
himself or just, you know, traded it with some other, uh, you know, pulled on quote friends, uh,
if it got into the underground, only those people would know about it. And, uh, it would be
exploitable, certainly. So by making it generally available to the public, you are actually doing a
service to them. Um, companies, Microsoft included have tried to come up with ways of not allowing
people to make that information generally available right away to let the company have, uh,
have that information so they can fix it. But you know, if you hold people up to, uh, the light of
days sometimes, it tends to motivate things a little bit more. You know, if people know about it,
if the whole world knows about the fact that you can bypass fingerprints, um, biometrics,
by going through a couple of steps, do you think the companies out there that were thinking about
buying biometrics, do you think they're probably going to go through that or biometric fingerprinting
I should say? Do you think they're going to spend hundreds of thousands of dollars on these
solutions thinking that they're secure? Hell no. They need to know that just as well as everybody
else needs to know that knowledge needs to be free, keeping information free, keeping knowledge
free about that. Is there proprietary stuff that needs to be kept control of, kept under wraps?
In the corporate environment, I'm sure most people would say yes, certainly for security,
national security. Uh, there are certain things that definitely need to be kept under wraps for
that. Unfortunately, especially in the wake of September 11, um, that whole thing has been
certainly blown out of proportion. The Patriot Act, uh, is something going on here in the US. It's
basically making it a felony to do all kinds of things, including, uh, you know, illegal entry
into computer systems. And we've talked about this a little bit before. Patriot, by the way,
is an acronym. I don't have it at my fingertips what it stands for, but it's not, you know,
you people think, oh, I don't want to be unpatriotic. Well, guess what folks? It's a little bit of,
oh, smoking mirrors or it's a little bit of media kind of misconception, what that it is actually
an acronym standing for something, but you know, it appeals to that patriotic nature and everybody
that, uh, they don't want to be unpatriotic and do these things against their country. Certainly,
you know, I'm not encouraging you to do things against the country. I'm not encouraging you
to do things against companies. I'm encouraging you to think creatively, find solutions and share
that information with other people. If we can take and share all this information back and forth
with people, we can improve the quality of the technology, the quality of information. Hell,
it'll even eventually once it's spread enough can help to improve the quality of life.
You know, there's a whole big thing about the digital divide, the haves and have-nots. There
are certainly, you know, other countries rather than, you know, US, Canada and Western Europe where
technology is not that readily available. There are a whole lot of people out there that can benefit
by it. Of course, you know, they need basic things like food and shelter and clothing before they,
you know, start worrying about computers, but if we all can try to work together, if we can help
keep corporate America's greedy hand out of everything, we can help keep the government honest
by sharing this information. We can end up benefiting everybody else and I don't know about you,
but that's what I'm in it for. You know, it's fun. It's, you know, it's all that other stuff, but,
you know, I think it's basically ending up coming down to helping people. And anyway,
that'll wrap up the show for today. Next week, we'll see if we can get us slipping away or
condor back on the line. They were supposed to be calling in this week. I guess it just didn't end
up happening. Dole is still going to be off on assignment, working away on some stuff, so
we'll be talking to you later. See you online. Check us out at www.oldschoolfreakoldskol.phru.cak.com
for a dual parallel who always says, be the media. I'm Rax. Keep knowledge free.
I'm now standing on the plains of Abraham, watching the dung, the sun rise.
We are a community podcast network that releases shows every weekday on
day through Friday. Today's show, like all our shows, was contributed by a HBR listener like
yourself. If you ever consider recording a podcast, then visit our website to find out how easy it
really is. Hacker Public Radio was founded by the Digital Dark Pound and the Infonomicum
Computer Club. HBR is funded by the binary revolution at binref.com. All binref projects are
crowd-responsive by lunar pages. From shared hosting to custom private clouds, go to lunar pages.com
for all your hosting needs. Unless otherwise stasis, today's show is released under
creative commons, attribution, share a life, lead us our license.