>At work, the University of Limerick, we have a group of people called ITD – Information Technology Department. Recently, and over the last couple of days, they apparently had a problem that one (out of 256) computers in our user group (IDC) had been used for hacking. Hacking. First of all I’m delighted that our students actually hack. In my mind, that’s real programming. That’s exactly what I’m up to tonight. The friggin operating system isn’t good enough, other people’s lousy software is crap, and eventually you get angry enough at the sheer incompetence and ignorance and sit down and break your brain to write something that’s better. Much Better. Just to prove that the ignoramus are as incompetent as they appear. Well. To cut a long story short, our beloved ITD people decided to block all IP addresses in our block, all 256 of them, hence our web servers, groupware, etc., does not work for the outside world at the moment. If they get their act together, you’ll get my photos in previous postings. Otherwise, I’ll move the files to a server in the free world.
- abortion Android audio China commercial rents computing County Clare County Limerick creative death defect design Digiweb DIY doors economy electronics euro Europe exhibition experience failure flood plain graphic honey bees human rights ignorance incompetence interaction design iPhone ireland IxD law learning Life light limerick limerick area limerick city Limerick Northern Distributor Road Project limerick post location LoveMachine manufacturing marks and spencer Masters media medical microphone multi-touch music nature O2 Ireland opto-electronics PD Planning postal delivery recording referendum Roads science SMS softday sound art Sound objects sound synthesis technology telecom the universe and everything train Tralee University of Limerick visual spectrum web hosting Windjammer
Echoes
- April 2021
- August 2019
- June 2018
- April 2017
- March 2016
- January 2014
- October 2013
- August 2013
- June 2013
- May 2013
- April 2013
- December 2012
- November 2012
- June 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- September 2011
- August 2011
- June 2011
- May 2011
- February 2011
- October 2010
- July 2010
- May 2010
- April 2010
- September 2009
- July 2009
- April 2009
- March 2009
- January 2009
- October 2008
- September 2008
- August 2008
- July 2008
- May 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
- September 2007
- August 2007
- July 2007
- June 2007
- May 2007
- April 2007
- March 2007
- February 2007
- January 2007
- December 2006
- November 2006
- October 2006
- September 2006
- August 2006
- July 2006
- June 2006
- May 2006
- April 2006
- March 2006
- February 2006
- January 2006
- December 2005
- November 2005
- October 2005
- September 2005
- August 2005
- July 2005
- June 2005
- May 2005
- April 2005
- February 2005
- January 2005
- December 2004
- November 2004
- October 2004
- September 2004
- August 2004
- July 2004
- June 2004
- May 2004
3 Comments
>I think you have misunderstood the term hack. There are 2 derivations of the term, the term you use, where you over-ride the system function because it does not perform correctly, and the other term, where somebody forces entry to a system or database without permission and the intent to harm/break.That’s all. Thanks.
>No, Mossy. The original definition is probably from the sound of typing fast on an old TTY terminal, especially by people trying to improve a system. real hacking is often misunderstood by the surrounding world, especially when a hack goes wrong (Whoops! There goes another worm). OTH, I’ve had many deep experiences of the power of recursion in the good old days of early virus writing. Way back then (mid-80’s) creating code with viral behaviour was sometimes really only good system programming. Then things got out of hand.
>Noted. Thanks.