Advertisement
Guest User

Untitled

a guest
Sep 17th, 2017
119
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.37 KB | None | 0 0
  1. mnaines
  2.  
  3. The media shouldn't even be feeding the trolls. Lulzsec is just like the Westboro Baptist Church. The more you talk about them, the more they do what they do. They feed on all the attention we give them. The less attention we give them, the less fuel they have for their fire.
  4.  
  5. Hell, the Anonymous hacker group is far more sane and has more common sense than LulzSec. LulzSec are a bunch of script kiddies who prey on random targets like all script kiddies do, and they cannot seem to tolerate criticism or people not liking them. People don't like LulzSec because LulzSec doesn't give people a reason to like them, then they have the nerve to hack those who slander them. At least the Anonymous hacker group has enough common sense to know when to leave well enough alone. I honestly would rather enter a hacking contest with Anonymous than I would with LulzSec because LulzSec isn't even worthy of my scripts. Anonymous would at least be a fair fight.
  6.  
  7. 1 vote
  8.  
  9. Reply#6 - Tue Jun 14, 2011 5:15 PM EDT
  10. mnaines
  11.  
  12. Besides, LulzSec isn't even good enough to bring down a Linux box. All the servers they're striking are Windows boxes. I have yet to see them at least attempt to hack anything other than Windows. At least Anonymous can successfully drop both Unix and Linux. Most of what LulzSec has hit up so far have been web servers on DMZ Host configurations. I am not surprised most of the servers they targeted fell so quickly. That's the one big disadvantage to web servers - most of them have to be placed on an external network in order for the public to access them. Wide-Area Networks are intentionally set up to keep outside traffic out and internal traffic in. The public isn't supposed to have access to a company's internal networks, so most wide-area networks are set up so that each department of a company has its own network and the public web server is on a separate network. This is the primary way that network administrators keep unauthorised persons from having access to data they are not supposed to have. LulzSec may have taken a lot of people's personal information, but keep in mind, they have not breached any of the companies internal networks, just the web servers, which are on a separate network altogether usually.
  13.  
  14. The biggest difference between LulzSec and Anonymous is Anonymous can actually get deep into a company's networks. For example, when Anonymous targeted Westboro Baptist Church, Anonymous was able to get the IP addresses for Fred Phelp's personal computer, his office printer, all the computers and printers in his church, and even grab information about their upcoming plans. LulzSec is apparently loyal to WBC, as both are claiming protection under the first amendment for their actions.
  15.  
  16. 1 vote
  17.  
  18. #6.1 - Tue Jun 14, 2011 5:33 PM EDT
  19. mnaines
  20.  
  21. And just an FYI to anyone who might be wondering: Unlike most of you, I can actually survive on my own without technology, so even if a hacker manages to permanently destroy my computers, it won't keep me from being a thorn in their side. I already have the names and addresses of most of the LulzSec hackers, but I am going to take that information with me to my grave...I have my own plans for that group, but as Julius Caesar once said, a secret that is known by more than one person is no longer a secret. LulzSec better watch their backs, because they will never know when their worst nightmare will come knocking, and no, I don't mean some pro hacker or some insane dude with a double-barrel sawn-off shotgun. Read Tom Clancy's Splinter Cell: Chaos Theory and you will see the type of thing I am capable of.
  22.  
  23. Here's a bit of a spoiler: The "Chaos Theory" is weaponized information warfare algorithms that can crash stock markets, black out entire cities, and hijack ballistic missiles, and the code is almost impossible to decipher because the code is run through an infinite state machine which uses recursive computation to make the code and its encryption infinitely more complex. Recursive computation would be similar to a picture of a man holding a picture of himself and the image repeating over and over to infinity. In the computer world, that recursion is known as an Infinite State Machine. Anyway, these algorithms exist (research Project Watson, which was the United Nations' investigation into these algorithms), are in use by American, Chinese, Japanese, and Russian hackers, and have been used against America twice already.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement