.comment-link {margin-left:.6em;} <$BlogRSDURL$>

Tuesday, September 02, 2003

AND HOW WAS YOUR 3-DAY WEEKEND?



I spent mine playing computer war games with the hackers. The prize, of course, is my computer. My drunken pawns and I don't have much in the way of weapons with which to fight them. They have disarmed us rather effectively. But we think we are sneaky and clever. We sneak in by safe mode and get to the new toolbar which leads to the computer's menu. From there we can get to most anywhere, seemingly unnoticed, because there aren't any repercussions unless we do something very daring indeed.

This weekend I fought them at the task manager. There are lots of things you can do with it. It's almost like having a queen in chess. One of the most straightforward, and just out and out fun things to do with it, is to end their processes. I like to see what percent they're running at. Say they're processes are running at 90%. Then I go for the kill. I attack the processes with the largest KB's first, usually Explorer. Then the second highest KB and so on. Then I read the percentage their running at again: hmmm, 22%. What do you know? It's lights out for them. And then they turn off my lights and I'm logging off whether I want to or not. So I make sure to play that game the last thing I do.

I fought them through the registry which is now a crippled mess. That's how I came to the next battle: I fought them again through the re-installation of Windows. That's where we are now. They can't use the computer with the registry the way it is. The error message said Win32 was missing or something and the computer could not start. I tried over and over to format so that everything would be deleted. I deleted a lot but the damn computer continues to save their files. When we get to the point in re-installation where you can opt to have files taken from another place, I hit okay and indicate A:drive. They write that the windows installation is missing a file (which it isn't) and that it will be found in E:\1386 where they think their files are, except I already deleted all those files in formating. One by one I deleted them with the command prompt so I know they're gone. So we sit there playing another computer game that is mindless and repetitive. I hit okay for A:\. They change it to E:\1386. I change it back. Hours of this. I write "checkmate" and turn off the computer and decide no one will use it.

There was quite a good battle at the device manager, and I bet they were pissed. I uninstalled all their favorite toys as well as all network and monitoring devices. The best part was then that they couldn't reinstall them. They've made so many changes to the system that they are no longer compatible with whatever it is they're running and Windows wouldn't reinstall them. I must say I rather enjoyed myself when I turned on the computer and all the "incompatible, won't install" messages began to come up for so many different devices. I sat and clicked on "stop installation" for a couple of hours as the messages came up asking what I wanted to do about about an incompatibility in each device.

I fought them by deleting huge amounts of their code, scripts and files. My time for being able to fight these fights is limited. I learned yesterday that there is a new administrator with a new password that I am not privy to. Unfortunately I have gone ahead and changed so many permissions to "administrator only".


What's worse is that they directed my attention to the rules of the game they are playing. Apparently I am (or at least my computer is) to be cloned any day now. In fact I would guess from their file notes that my cloning is overdue. I have put up a good fight. I still intend to win too.

Whatever happened to good old dungeons and dragons? These kids are playing this ridiculously boring game that is based on an old document from Microsoft entitled, "Planning Migration from Microsoft Windows NT to MS Windows 2000--file name Dommig.doc," which is now updated to Windows XP. It is full of mind-numbing rules and regulations about domains and security and users and clients. Here's a brief sampling that I only copied because I thought it might be useful to me:

"...therefore memberships of users will not be restored in the destination domain by this script unless the users were cloned prior to running clonegg.vbs."(which is apparently the big program set to clone the computer when it's time).

More:

"The Tcpip Client Support registry value must be created and set on the source domain controller for both Windows 2000 (think XP) Windows NT (that's them). Setting this value enables RPC calls over TCP transport. This is required because by default, SAM RPC interfaces are remotable only on the named pipes transport. Using named pipes (all this must be referring to pipes in registry) results in a credential management system that is suitable for interactively logged-on users making networked calls, but is not really flexible for a system process making network calls with user-supplied credentials SPC over TCP is more suitable for that purpose. Setting this value does not diminish the security."

There's more. Much, much more. I tried to save it to a floppy but I don't have access to open the floppy at this public computer. But I'm sure you've had enough. They are insane. That's why I thought they were in the security business. There are all sorts of security rules and regs that they follow in this game. I wonder if they view it as a game at all. I mean they really do capture computers that they clone to become workstations in their domain. And there are many domains created within a gigantic super domain or something. That must be what their conventions of hackers are all about. I don't know, I'm trying to put the pieces of what I read in their files together with the pieces of the security bulletins. It's all very confusing.

I just know I want my computer back and these pimply overgrown Microsoft wannabees are playing King of the Domain with my computer. Why don't they find a nice young woman and take her out somewhere and have some fun? Or learn to shoot pool really well? Or read a bunch of excellent books instead of this crap put out by Microsoft in 1999. Or go to school? Get a job? Get a better education. Get a better job. Work on their spirituality. Get their heads out of their modems and their buttholes. There are so many things a young man could do besides waste his youth playing computer games with other peoples' computers. Don't you think?


Book du jour: Hacking Exposed: by Stuart McClure, Joel Scambray & George Kurtz. Read about it, order it here:

Comments: Post a Comment


This page is powered by Blogger. Isn't yours?