In Brazil, "gambiarra
" is the art of improvising makeshift repairs
- spontaneously solving the problem at hand
with whatever is in hand.
Wikipedia Brazil has a bit more on the topic and how it extends to architecture and programming
is an arts group exploring this DIY aesthetic. Interestingly, there's lots of discussion
around gambiarra. Personally, I find the original quick fixes
more compelling (examples at bottom of the article).
The best criminal hacker is the one that isn't caught — or even identified. These are 10 of the most infamous unsolved computer crimes
as selected by PC Magazine. However, some do get caught. Here are nine of the most infamous criminal hackers
to ever see the inside of a jail cell. PCMag also reached back into the early days of computing and dredged up the most inspiring examples of hacker brilliance
they could find. [more inside]
Ever admired those hard-working hackers, toiling away to get you the programs you've always loathed to have? Have you ever dreamt of exploring the innards of someone else's computer but have held back due to those pesky legalities? If you said yes to either of the above questions or just want to play an online hacking simulation, then SlaveHack
is the website for you. [more inside]
Congress is about to consider an entertainment industry proposal that would authorize copyright holders to disable PCs used for illicit file trading
. "The measure would permit copyright holders to perform nearly unchecked electronic hacking if they have a "reasonable basis" to believe that piracy is taking place."
Striking back at hackers
"LaBrea" is a free, open-source tool that deters worms and other hack attacks by transforming unused network resources into decoy-computers that appear and act just like normal machines on a network. But when malicious hackers or mindless worms such as Nimda or Code Red attempt to connect with a LaBrea-equipped system, they get sucked into a virtual tarpit that grabs their computer's connection -- and doesn't release it.
Is this an ethical use of network resources, or just vigilante justice? What other methods have you used to strike back at hostile software?
That faith-based missle defense thing again. Check it out, good-looking hack. I might put up a mirror if it gets changed.
Stirring up the chum again, Slashdot has posted their Top 10 Hacks of All Time
. Covering everything from Edison's lightbulbs to the AK47 to the Apollo 13 mission, the post-article commentary is lucid as always.