Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Hacker gets 41 months
#1
"I hack, I ruin lives, I make piles of money," he told The New York Times. What a POS!! I think he should have gotten 41 years. The comments under the vid on this site, he is a hero for being a thief.

http://techcrunch.com/2013/03/18/andrew-...on-of-73k/
.

We cross our bridges when we come to them and burn them behind us, with nothing to show for our progress except a memory of the smell of smoke, and a presumption that once our eyes watered.

Reply
#2
So he's helping companies by pointing out their flaws.Tongue
They call me The Mum - Jimmie the Mum
Viva Mumcero - Mahk 12/4/2010 - http://www.stogiechat.com/forum/thread-20737.html
Honorary Shield Brother
Weak people seek Revenge, Strong people Forgive, Intelligent people Ignore
Reply
#3
Better him than another country or a terrorist organization... Really Really.
Reply
#4
But he exposed and published 114,000 peoples e-mail addresses and ICC-IDs to his hacker comunity. It was his "I hack, I ruin lives, I make piles of money," statement that got him that much time from the judge. His buddy only got a year for writing the script.

I still think he should have gotten 41 years from what I just went thru. I'm still leary of going online from it. Did you ever post what you do to protect your stuff?
.

We cross our bridges when we come to them and burn them behind us, with nothing to show for our progress except a memory of the smell of smoke, and a presumption that once our eyes watered.

Reply
#5
Uncle T, I guess i just look at it like this... I blame the company and its employee's who he was able to take information and hack into. It's because of this carelessness that we as individuals have our privacy and personal security violated in instances like this. We expect company's who we do business with to keep our information secure. No matter how you slice it, they did something wrong at some point along the road.

A Hacker, much like a Terrorist only has to get it right once. Failure on the side of the government to protect us, is unacceptable. The same applies to company's we do business with.

I simply cannot help but to look at this and say, This guy turned over the information about the vulnerability to Gawker Media... So that he could and would be paid _something_ for his discovery. Had he sent it to AT&T it would have been ignored (I have personally seen this happen HUNDREDS of times) and he would have been unrewarded for his hard work. And even IF AT&T had done something about it, you would have never known that they F**ed up IN HANDING YOUR INFORMATION because they would have frivolously sued the shit out of this kid to get him to sign a Non-Disclosure Agreement (Again, I've actually been with a company who pulled that same shit).

I'm not saying that what happened is right, but I think that AT&T is most certainly the one to blame here.


Anyway... My security.... I keep it really simple...

Router:
  • I make sure I have a complicated password on my router AND I write it down with a marker right on the router so i don't forget... I look at it like this... You have to survive coming into my house to read the password.
  • I disable SSID broadcast so it doesn't broadcast the ID/network's existence.. I like to hide.
  • I always turn down the broadcast power/range so that I can control how close people have to be to access my network (of course this limits my own use, but i don't care)
  • I also use 802.11b... Yes it is slower, but It's also gives me a stronger signal and more reliable speed AFTER turning down the broadcast power.
  • I also turn off the ability for people to PING my router and the ability to access its web interface from the Web. Again, I want it to look like nothing lives at my IP Address.


On my computer, I also keep it simple...
  • I use a password on my PC's login...
  • I use Eset NOD32 for my Antivirus (I do prefer the Smart Security Suite they offer)...
  • For my Firewall i use COMODO, which is free... I do think the Eset Smart Security Suite is worth the money and a better program... But, to save some cash I use COMODO.
  • Last but not least, I keep MalwareBytes installed (but i don't leave it running) JUST IN CASE I ever need to load into
    "Safe Mode w/Networking" to get rid of some nasty stuff... At that point in time, I can update it before running it.


Beyond that, I'm just smart about what I open on my computer, what sites I visit, what programs I install. I believe in keeping it as simple as possible at home. To quote possibly the best/worst hacker in the world, "The weakest link in security has and will always be the human element. The only way to guaranty a system cannot be compromised is to unplug its power and put it into a locked room that no one has access to".


In a corporate environment you cant just "hide" like you can at home.. Which is when you employ intrusion detection systems, hardware AND software firewalls, multiple levels of access control for users, hardware spam/virus filters, anti-virus software, etc...
Reply
#6
he should get 1 month for every person he violated.
Jonathan Charles Axisa, my beloved son, 11/7/1979 - 7/8/2010

Ғµ(Ķ Cancer
Reply
#7
Yes... Lets punish a part of society even more for committing a crime that pales in comparison to the one that could be committed if he did nothing. Lets punish a part of society who company's ignore when issues are privately brought to their attention.

At best about 100k people had their information (Email addresses) looked at by a Hacker and a member of the Media. He didn't sell the information to any number of organizations who would have paid much more than a member of the media; and, who by the way would have done serious harm. In my eyes, at worst he brought attention to a serious security flaw that AT&T was ignoring. AT&T was putting its users at risk.
Reply
#8
Tafdom you say they should get more jail time.....How much jail time should you get for hacking Mums Photo Bucket account.Ironic isn't it.
Reply
#9
A known security flaw is hardly what I would consider real hacking. http://internet.wonderhowto.com/how-to/h...os-299214/

Rule of thumb is to never put anything on the net you cannot afford to become public, stolen, or used against you. You can search Google on how to hack practically any mainstream website and find warez, appz, and exploits to get in. However using programs like PhotoFuckit can come at a cost. Many times those programs have built-in viruses or open ports on your system without you knowing so that real hackers can get into your system.
Reply
#10
Your right Eric I would not call that being a hacker... I would call it being a creep.
--Mike
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)