Does anyone know of a good way to get medicinal nutrition into the food supply to help children who misuse their computer access to bully, harass and terrorize the world? You know, the crackers mistaken for hackers?
Perhaps it is possible to super-size those fries with yam genes? And through selective breeding, the farm factory industry are able to create cows that produce a higher yield of choline (source of acetylcholine), tyrosine (source of the neurotransmitters dopamine and noradrenalin) and tryptophan (source of serotonin) in addition to pyridoxal (helps create neurotransmitters and retinol (improves eyesight) derivatives along with thiamine (improves mental acuity)? Or the vegan equivalent of grains and nuts to boost brain power? Yes, I am suggesting we move beyond hacking computers.
Where's the gene splicing kits for tomorrow's gene hackers? We may need to make a smart-drug neuro-peptide with nutritional co-factors piggybacking within the polypeptide chain.
Additionally, I feel that crackerjacks need to be inoculated with a special virus to enlighten their current methods of social control. Perhaps that's what they mean by "a dose of humility."
Originally posted: February 10, 2007 1:31 PM
Inspired by the Journey to the West, Gandhara is devoted to both Western and Eastern Truth.
ਵਾਹਿਗੁਰੂ - Hail the Lord whose name eliminates spiritual darkness.
Om Ganeshaya Namaha (ॐ गणेशाय नमः) - Homage to Ganesha.
Unconditional love tranquilizes the mind, and thus conquers all.
Search This Blog
Showing posts with label hacking. Show all posts
Showing posts with label hacking. Show all posts
20131231
An Immoral Proposal Regarding Crackerjack Kids (satire)
Labels:
America,
computers,
cows,
food,
gene,
genes,
glutamine,
hackers,
hacking,
humility,
neuropeptide,
satire,
smart drug,
social control,
thiamine,
tryptophan,
tyrosine,
virus,
vitamins
20120523
All of Life Hacks, From Algae to Humans
NSA and CSIS are hackers, even the sexists who harrass women, for subliminal seduction too is hacking.
Even you all are hackers but don't even know it. I a hacker, u a hacker We a hacker too! Nobody should be excluded.
Anyone who denies being a #hacker even Obama may be a LIAR.
#LIAR == Love, Intelligence, Active, Romantic
Oxford Dictionary has it wrong, because that's the colonial definition.
I'm a #LIAR and proud of it because hacking is good & not #hacking leads to death. Even little babies hack, too. They after all #hack life.
However, judge not others for they will judge you in return three times harshly.
Whenever someone calls a #cracker who "hacked" someone else's personal info, he hacked NOTHING — he just put on a black hat.
Therefore, all a #criminal "hacker" is a #crackerjack #blackhat #hacker. He'll spin the truth to make it seem like #whitehat hackers suck.
Remember though: even babies hack, so hacking is not just about computers, for the best hack mankind did was to invent language.
If we had to rely on what non-humanoid beings have for millions of years to communicate, then we'd have no need for computers.
Just as there are computer hackers, there are also hacks who spin a story from a few facts sprinkled between hyperbole.
Do not forget that people do not actually lie; they merely keep their peace.
Nothing in this article is a lie or the truth; that's ephemeral.
What's important is, quite possibly even non-humanoid life hacks too. For example, crows making tools is a hack.
Thus all life hacks, from algae to human beings. This is what the Buddha means by "the suffering of sentient beings leads to enlightenment" which means "all life hacks, to survive lest we all suffer."
Therefore, hacking seeks life to make things beautiful as it was in the beginning.
Even you all are hackers but don't even know it. I a hacker, u a hacker We a hacker too! Nobody should be excluded.
Anyone who denies being a #hacker even Obama may be a LIAR.
#LIAR == Love, Intelligence, Active, Romantic
Oxford Dictionary has it wrong, because that's the colonial definition.
I'm a #LIAR and proud of it because hacking is good & not #hacking leads to death. Even little babies hack, too. They after all #hack life.
However, judge not others for they will judge you in return three times harshly.
Whenever someone calls a #cracker who "hacked" someone else's personal info, he hacked NOTHING — he just put on a black hat.
Therefore, all a #criminal "hacker" is a #crackerjack #blackhat #hacker. He'll spin the truth to make it seem like #whitehat hackers suck.
Remember though: even babies hack, so hacking is not just about computers, for the best hack mankind did was to invent language.
If we had to rely on what non-humanoid beings have for millions of years to communicate, then we'd have no need for computers.
Just as there are computer hackers, there are also hacks who spin a story from a few facts sprinkled between hyperbole.
Do not forget that people do not actually lie; they merely keep their peace.
Nothing in this article is a lie or the truth; that's ephemeral.
What's important is, quite possibly even non-humanoid life hacks too. For example, crows making tools is a hack.
Thus all life hacks, from algae to human beings. This is what the Buddha means by "the suffering of sentient beings leads to enlightenment" which means "all life hacks, to survive lest we all suffer."
Therefore, hacking seeks life to make things beautiful as it was in the beginning.
Labels:
hacker,
hacking,
life,
Universal hacktivism
20080303
Loss, and Profit within the context of HaX0ring
No, this aint a financial analysis of my so-called life. Today's story began at home, where I'd be stuck for about five or six day due to a slight influenza attack, which stormed in late last Sunday night, only to inflame my body the next day. For several days I passed in and out of consciousness, my breath hot, my throat parched, my joints aching...
Relief came to me only yesterday.
It's said that whether cold or flu, when the virus hits, it's due to contact with whomever suffered its ravages last, rather than because of inclement weather like rain, wind and often, snow. Once you realize this, then getting out of the house after being cooped up for too long is always a welcome relief despite the circumstances, especially when spring is barely nascent and big fluffy bits of snow are trying to obscure the landscape once more.
But I wax too eloquently to match the current mood, which has been briefly influenced by a book edited by Jeff Moss called Stealing the Network: How to Own a Continent, a hacker novel written by a collection of hackers for hackers, which is referred to as STC.
Because I am a great fan of Google, I had to research this book, but didn't get further than this link which I will obscure enough so the botnets don't rip it to shreds:
Bl@ckTo\/\/3r by Brian Hatch of Nmap dot org - the URL is insecure dot org fwf-slash stc fwd-flash sti dot html - is a great spy story for the hacker, complete with an indepth look at how to hack into X11. Yet the novel mentioned the use of /dev/kmem and after a brief spell of searching for it, I discovered the following URL: www dot la dash samhna dot de fwd-slash library fwd-slash rootkits fwd-slash index dot html which explains Linux kernel rootkits in a training manual.
Really wicked stuff!
Especially samhain, which is a great data integrity and host intrusion alert system. A brief use of searching the apt-cache revealed the following:
Oh joy! Oh, jubilation!
Then as I read bits of the la samhna article on Linux kernel rootkits, I realized that STC is more my speed than a manual on kernel rootkits, especially after the flu.
This brain of mine is done in by the flu I suspect, such that while I can understand about 1/3 of the quqntum dynamic stuff on wikipedia, total concentrated effort to grokk a technical manual on kernel rootkits is met with the same feeling I felt long ago when I had to study for not one test but several back in college twenty years ago.
Yes, my brain is currently mush, but hopefully with rest and relaxation I'll be able to finish STC and dive into the kernel rootkit manual... soon.
Relief came to me only yesterday.
It's said that whether cold or flu, when the virus hits, it's due to contact with whomever suffered its ravages last, rather than because of inclement weather like rain, wind and often, snow. Once you realize this, then getting out of the house after being cooped up for too long is always a welcome relief despite the circumstances, especially when spring is barely nascent and big fluffy bits of snow are trying to obscure the landscape once more.
But I wax too eloquently to match the current mood, which has been briefly influenced by a book edited by Jeff Moss called Stealing the Network: How to Own a Continent, a hacker novel written by a collection of hackers for hackers, which is referred to as STC.
Because I am a great fan of Google, I had to research this book, but didn't get further than this link which I will obscure enough so the botnets don't rip it to shreds:
Bl@ckTo\/\/3r by Brian Hatch of Nmap dot org - the URL is insecure dot org fwf-slash stc fwd-flash sti dot html - is a great spy story for the hacker, complete with an indepth look at how to hack into X11. Yet the novel mentioned the use of /dev/kmem and after a brief spell of searching for it, I discovered the following URL: www dot la dash samhna dot de fwd-slash library fwd-slash rootkits fwd-slash index dot html which explains Linux kernel rootkits in a training manual.
Really wicked stuff!
Especially samhain, which is a great data integrity and host intrusion alert system. A brief use of searching the apt-cache revealed the following:
$ apt-cache show samhain
Package: samhain
Priority: optional
Section: universe/admin
Installed-Size: 1788
Maintainer: Javier Fernandez-Sanguino Pen~a
Architecture: i386
Version: 2.0.10a-2
Depends: libc6 (>= 2.3.4-1), debconf (>= 1.2.9) | debconf-2.0
Filename: pool/universe/s/samhain/samhain_2.0.10a-2_i386.deb
Size: 665100
MD5sum: 4441fd7bd602759c8e893a0f6ec00f46
Description: Data integrity and host intrusion alert system
Samhain is an integrity checker and host intrusion detection system that
can be used on single hosts as well as large, UNIX-based networks.
It supports central monitoring as well as powerful (and new) stealth
features to run undetected on memory using steganography.
.
Main features
* Complete integrity check
+ uses cryptographic checksums of files to detect
modifications,
+ can find rogue SUID executables anywhere on disk, and
* Centralized monitoring
+ native support for logging to a central server via encrypted
and authenticated connections
* Tamper resistance
+ database and configuration files can be signed
+ logfile entries and e-mail reports are signed
+ support for stealth operation
.
Homepage: http://la-samhna.de/samhain/index.html
Bugs: mailto:ubuntu-users@lists.ubuntu.com
Origin: Ubuntu
Oh joy! Oh, jubilation!
Then as I read bits of the la samhna article on Linux kernel rootkits, I realized that STC is more my speed than a manual on kernel rootkits, especially after the flu.
This brain of mine is done in by the flu I suspect, such that while I can understand about 1/3 of the quqntum dynamic stuff on wikipedia, total concentrated effort to grokk a technical manual on kernel rootkits is met with the same feeling I felt long ago when I had to study for not one test but several back in college twenty years ago.
Yes, my brain is currently mush, but hopefully with rest and relaxation I'll be able to finish STC and dive into the kernel rootkit manual... soon.
Labels:
/dev/kmem,
hacking,
How to Own a Continent,
Linux kernel rootkit,
STC,
Stealing the Network,
Wikipedia
Subscribe to:
Posts (Atom)