• Welcome to Religious Forums, a friendly forum to discuss all religions in a friendly surrounding.

    Your voice is missing! You will need to register to get access to the following site features:
    • Reply to discussions and create your own threads.
    • Our modern chat room. No add-ons or extensions required, just login and start chatting!
    • Access to private conversations with other members.

    We hope to see you as a part of our community soon!

Hacking The Scammers

Terry Sampson

Well-Known Member
Would that I could pull off something like that: undercover reverse hacking. Have never fallen for one the phone or computer scams, (Knock on wood). But am not looking forward to the day when I am still lucid enough to follow instructions, but have lost the wits to avoid or decline following them.

My brother, on the other hand, is a very competent, retired IT specialist, who gets easily bored during retirement, with so much time on his hands. He cracks me up with a tale now and then about a lengthy conversation with a scammer, in which he plays "Mr. Idiot", asking for detailed instructions with frequent requests to repeat them so that he can write them down. And then he ends the conversation with: "But what if I don't own a computer?"
 

Heyo

Veteran Member
Too bad.
I've done a little phone scam baiting.
My minimal Chinese (Beiing hua) has even come in handy.
I never engaged in (serious) hacking but I had a few friends who made money by hacking banks when it was still quasi legal (and some times even when it was illegal. The banks can keep a secret, especially when it's about their online security.)
 

Revoltingest

Pragmatic Libertarian
Premium Member
I never engaged in (serious) hacking but I had a few friends who made money by hacking banks when it was still quasi legal (and some times even when it was illegal. The banks can keep a secret, especially when it's about their online security.)
To steal or extort money?
 

Heyo

Veteran Member
To steal or extort money?
Let's say to "offer services". When the manager gets a message, obviously send from within his system, that the system has been hacked and with it the offer to fix the hole, you don't have to say the silent part out loud, (that, if he doesn't consider the offer, the press will be informed of the breach). The banks where always happy to oblige.
 

Revoltingest

Pragmatic Libertarian
Premium Member
Let's say to "offer services". When the manager gets a message, obviously send from within his system, that the system has been hacked and with it the offer to fix the hole, you don't have to say the silent part out loud, (that, if he doesn't consider the offer, the press will be informed of the breach). The banks where always happy to oblige.
Good.
 

Jayhawker Soule

-- untitled --
Premium Member
Let's say to "offer services". When the manager gets a message, obviously send from within his system, that the system has been hacked and with it the offer to fix the hole, you don't have to say the silent part out loud, (that, if he doesn't consider the offer, the press will be informed of the breach). The banks where always happy to oblige.
It's good to know that about you.
 

sun rise

The world is on fire
Premium Member
I was a hacker when the word hacker means what it's suppose to mean and not the degenerate definition used today.
 

Heyo

Veteran Member
I was a hacker when the word hacker means what it's suppose to mean and not the degenerate definition used today.
Hacking X for Y? Yep, been there, done that.
It's good to know that about you.
I hope you also read the previous post. I didn't engage in this activity, it is a bit too near to blackmail for my taste. Also, that was decades ago. I'm out of the loop. So don't ask me to jailbreak your phone or something like that. I wouldn't even know how to start a penetration test today.
 

sun rise

The world is on fire
Premium Member
Hacking X for Y? Yep, been there, done that.

For the lusers who are clueless due to lack of age or other infirmities. \

Hacking X for Y n. [ITS] Ritual phrasing of part of the information which ITS made publicly available about each user. This information (the INQUIR record) was a sort of form in which the user could fill out various fields. On display, two of these fields were always combined into a project description of the form "Hacking X for Y" (e.g., "Hacking perceptrons for Minsky"). This form of description became traditional and has since been carried over to other systems with more general facilities for self-advertisement (such as Unix plan files).

And to educate the unwashed:

Hacker: [originally, someone who makes furniture with an axe] 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. 2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming. 3. A person capable of appreciating hack value. 4. A person who is good at programming quickly. 5. An expert at a particular program, or one who frequently does work using it or on it; as in `a Unix hacker'. (Definitions 1 through 5 are correlated, and people who fit them congregate.) 6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example. 7. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations. 8. [deprecated] A malicious meddler who tries to discover sensitive information by poking around. Hence `password hacker', `network hacker'. The correct term for this sense is cracker.
 

Heyo

Veteran Member
For the lusers who are clueless due to lack of age or other infirmities. \

Hacking X for Y n. [ITS] Ritual phrasing of part of the information which ITS made publicly available about each user. This information (the INQUIR record) was a sort of form in which the user could fill out various fields. On display, two of these fields were always combined into a project description of the form "Hacking X for Y" (e.g., "Hacking perceptrons for Minsky"). This form of description became traditional and has since been carried over to other systems with more general facilities for self-advertisement (such as Unix plan files).

And to educate the unwashed:

Hacker: [originally, someone who makes furniture with an axe] 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. 2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming. 3. A person capable of appreciating hack value. 4. A person who is good at programming quickly. 5. An expert at a particular program, or one who frequently does work using it or on it; as in `a Unix hacker'. (Definitions 1 through 5 are correlated, and people who fit them congregate.) 6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example. 7. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations. 8. [deprecated] A malicious meddler who tries to discover sensitive information by poking around. Hence `password hacker', `network hacker'. The correct term for this sense is cracker.
Yep, cracker would have been a much better word for someone who cracks a lock, a code or a system but it never became mainstream.
 

Revoltingest

Pragmatic Libertarian
Premium Member
Hacking X for Y? Yep, been there, done that.

I hope you also read the previous post. I didn't engage in this activity, it is a bit too near to blackmail for my taste. Also, that was decades ago. I'm out of the loop. So don't ask me to jailbreak your phone or something like that. I wouldn't even know how to start a penetration test today.
I knew a phone phreak in the mid-70s.
Free long distance calls!

As though I had anyone not local to call.
 

Twilight Hue

Twilight, not bright nor dark, good nor bad.
Would that I could pull off something like that: undercover reverse hacking. Have never fallen for one the phone or computer scams, (Knock on wood). But am not looking forward to the day when I am still lucid enough to follow instructions, but have lost the wits to avoid or decline following them.

My brother, on the other hand, is a very competent, retired IT specialist, who gets easily bored during retirement, with so much time on his hands. He cracks me up with a tale now and then about a lengthy conversation with a scammer, in which he plays "Mr. Idiot", asking for detailed instructions with frequent requests to repeat them so that he can write them down. And then he ends the conversation with: "But what if I don't own a computer?"
That's actually a good technique to take up the scammers time as much as possible so he isn't scamming other people.
 
Top