Do you think I'm being too hard on this poor, misguided bastard?
Yes, you need to be more sensitive, and you can take my genitals with you!
Fuck no, Steamroll that fucker, then take his mom outta the retirement home and drag her to the scene of the crime so she can lick his asshole to identify the body.
What\'s \'misguided\' mean?
I just to know who the stupid little fucker was that asked that question anyhow...
You do not have the required permissions to vote in this poll
Votes: 7
So, I get home from work the other day, and debated on checking my email... good thing, or else i'd have not been so civil... I had a rough day, and when I saw this note sitting there for me, I told myself to be calm about it... It's not like this is new shit, people.. There have been posts about this in other areas of the board... Now, I know this dude more or less just signed up.. but you're ONLY coming here for this type of thing, get the hell out of here, and drop us a note to delete your account...
In any event, I have removed any identifying words (names, handles, email addresses and IP's) of the individual... WE DO NOT WANT TO POINT ANY FInGERS AT WHO THIS PERSON IS... *IT DOES NOT MATTER*... The only thing that matters is the overal request, and the MAIN message in my reply.. Let's keep this here to remind people to not be so blatently uninformed....
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
On Tue, Apr 15, 2008 at 10:40 PM, someone wrote:
I know ***** ******* and she told me to talk to you. I need to see about getting someone hacked or a way I can do it if you could give me and reply soon would like it. She said you was good at what you do.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Greetings!
1. Yes, we are capable of doing this....
2. No, We can not, nor will not do this ourselves... Before you get bent out of shape, allow me to explain...
Hacking is really not all that difficult... You can find manuals online on how to do it, and how to be very successful and cause the most amount of havoc possible... I mean, it really doesn't take a lot to hide a virus in a program or something of the like in hopes that the target will open it and cause his system to crash... Seriously, if you're interested in this kinda thing, just Google it with a few different possible combinations of verbiage, and you'll find more than you need to accomplish this task...
One of the main reasons why we don't do this is because of the legalities of it all... No matter who it is that's "behind" the attack, it's the party that goes into the system and causes the damage that's held to the highest possible extent accountable for any and all damages, collateral or direct, that is incurred by the target computer.. Most times, they'll hit you for EVERYTHING (meaning that the idiot you're attacking doesn't know anything about routine computer basics and care... defrags, virus scans, deleting unused files... shit like that) Once they try to hit you with something like this, you're going to get hamstrung by it because they will NOT stop until they've blamed EVERY POSSIBLE thing they can on you...
Each time a hacker goes into a foreign computer, they can be traced... REGARDLESS of if they use multiple proxy servers, if they completely sheild themselves behind numerous firewalls and proxy routers, there's still an electronic trail that is accessible to anyone wanting to know information about the identity of any attacker.. Proxy servers keep you hidden for the most part, but for anyone who's determined enough, it's kinda like finding someone hiding in a swimming pool if you know what steps to take...
Now then, allow me to jump back just a little bit... Let's go back to the word "hacker" itself... Back when personal computers were not so common a thing, the term hacker was created due to users "hacking away" at a keyboard... Eventually, when the World Wide Web was in it's infant stages (literally, mind you... back in the days where a 2400 baud modem was state-of-the-art equipment), Said hackers were intent on finding out what content was out there for them that they could use to learn about various things... These things varied from new games that were being created, to the best telephone number boards to call up for the latest software, to people just wanting to know how 'easy' it was to get into this kinda thing... THESE people were the pioneer hackers... They were not there to cause any harm, or to cause any other havok in the name of malice... They just simply wanted to know where and how to get the best information possible.. Free would be nice, but most of these initial hackers didn't care if they had to pay for programs...
"Hacker" became a word used in common language soon thereafter... However, what was once a playful term became one that was soon to be regarded as the lowest of the low in society... and the reason for this was because some people realized that by being able to access other people's computers gave them power.. it gave them a sense of accomplishment and joy to realize that they could go into that system, rape its files, and then format the drive so the other person would have nothing... Not being satisfied with this simple result, they soon created programs to do this for them... the programs would be something that would devastate the complete system as a whole, and leave the guilty party in the anonymous zone... These programs would be written with malicious code in order to destroy the word of the target system as a whole, and was usually done by the hacker entering the system, and replacing one of the more commonly used files with his newly created malicious software so that it would almost be assured to be run the next time the person used the system... Or, if they really wanted to be creative.. They'd make a software package that would be a self extracting program claiming it was either a game or a new software package, and they'd use their programming know how to create a batch file (which are still used today, but are much more sophisticated than they were back then) that would install the malicious software WITHOUT the computer owner realizing they were about to get screwed.. The next time they started up the computers, the software would run, and they'd be slammed harder than a fifty-cent prostitute...
Since "hacker" had already taken a slight negative turn in the common language, they decided to find an equally ugly word to be associated with it... This word was something that nobody likes, and certainly did not want to welcome upon themselves.. This word was "virus"... Now then, you take the word virus, and you attach it to a word like hacker, and now you have the complete package.. Everyone associated chaos and menace with the word "hacker" to the point where no decent computer person wanted to use the term.. Even today, if you walked up to someone and told them "I'm an old-time hacker" they're going to look at you in a different light because of the negativity of the term due to the stupid assholes who decided to do bad rather than do good...
Now, to go back to our original thoughts on this (yes, I do jump around quite a bit because I have the attention span of a ferret on speed), Should one get caught in hacking someone's computer, there are not only local police charges that can be pressed, but in the days of the vast internet and all of its capabilities, one can be held on a FEDERAL level as well... Once you are on a federal level, depending on the serverity of the crimes and charges that they are going to hold against you, they come into your house, they take all your 'toys' (anything electronic with exception to things like lights, radios and other stuff like that), and tell you on the way out the door "if you touch another computer, or if we THINK you're trying to access ANY foreign system, you're going to be spending time in a federal jail"... Which, to spell it out for you translates into "You're fucked now!"
Granted, this would be an extreme case.. but it all really does depend on who and what you manage to hack into, and how much damage you do...
My apologies for not being able to comply with your request on this matter. . . But as a point of clarification since you know ***** *******, We are the type of hackers that are more interested in protecting innocent people as opposed to causing harm... We have decided that it's not worth the risk to ourselves, and others, to do anything malicious to another individual or group... We at TSi have dedicated the better part of 20+ years of our experience to helping people recover from malicious attacks rather than do harm... Over the years, we have helped countless people who have been victims rebuild their systems to what they had been in the past to the best of our abilities, and do everything in our efforts to prevent these attacks from going further...
THAT is the definition of a "Good Hacker"...
Do we have the ability to cause harm.. Hell yeah... WILL we cause someone harm? No... You'd have better luck trying to bring a dead relative back to life...
Thank you for your time and consideration, and much luck to your in your endeavors should you decide to continue with this notion...
-=Dan=- -=TSi=-
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Again, people.. do not try to guess who this person was... it's NOT important...
If your SOLE purpose for coming on to this site is to ask us to hack someone that YOU don't get along with... Go fuck yourself rotten with a construction girder...
yes, I'm the kinda guy that'll tell you in an email to fuck yourself in a NICE way.. but on this board, in OUR domain, you get PWNED like the newest and youngest punk in your prison block, Jackson....