March 25, 2010 at 4:03 pm #4852
i thought i’d start a topic similar to the old “real programmers
i’ll start: “real hackers don’t use web browsers they telnet all the info off the servers” or “real hackers wish the celebrated the day before their birth because it was the greatest exploit of all time” or ” real hackers don’t drink coffee they inject it into their arm’s vein that has the most traffic”
jump on in
March 25, 2010 at 4:47 pm #30502
not a real programmers joke but still on topic:
In the beginning the Internet was a bunch of smart users with dumb terminals. Now…
March 25, 2010 at 5:38 pm #30503geekyoneParticipant
I copied this from somewhere. I can’t remember where sorry if I am stepping on some ones IP. Enjoy!!
You know you’re a computer security professional when:
You not only lock your laptop with a physical cable leash, but you change the combination of the lock when it’s not in use so that it can’t be “compromised”.
Although you have no ill intent, you spend no small amount of your downtime in airports thinking of ways to circumvent TSA security — and you’ve come up with several can’t-miss terrorist ideas that even Jack Bauer couldn’t stop.
You lock your screensaver with twice as much insistence when security friends are around than when strangers are, because you’re not nearly as worried about a stranger’s intentions.
You’re immediately discontent with all newly announced security solutions, even before you know anything beyond the name.
Having extralong passwords that you must type over and over again to get correct is not a bother.
You have a database program to store all your passwords, but even it doesn’t contain a single, decoded password.
When you read industry-mandated security guidelines, you chuckle at all the newbie mistakes.
You secretly hope you don’t miss a big virus outbreak while you are out on vacation.
Any security book you read is covered in pen from the technical corrections you’ve made.
Your Internet browser home page is a computer security news bundling Web site.
You’ve so fine-tuned your personal computer’s host-based firewall that you are sure it is causing problems with legitimate programs, but you really don’t care.
You fantasize about a job where you could bust into the house of unsuspecting malicious hackers and take them away to jail.
You’ve got a new car with a built-in GPS and computer, but you are constantly worried about how easy it would be to hack.
You loath government interference with the Internet because you know they will only mess it up more and not fix the problem (see CAN-SPAM Act).
When you hear that we’ve arrested some big spammer, you have the same nonreaction as when you hear we’ve arrested Al-Qaeda’s No. 2 person … again.
You resist every new application install because of the new attack vector opportunities it will bring.
You know that mobile small-form-factor computers have almost no security.
Your cell phone is password-protected.
You resent having to give out your Social Security number to any person or company, especially because you have never given it when dealing with the Social Security administration.
You already own or covet one of those special screen covers that prevent people on either side of you of from reading your screen.
You can’t prevent yourself from laughing out loud when someone announces they think that computer viruses, buffer overflows, or whatever will be solved in five years.
You hate upgrading your computer because it means spending days trying to copy and convert all your cool hacker and anti-hacker tools to the new system.
You have solid friends on computer security discussion lists, whom you know would be there for you in a life-crisis pinch but that you’ve never met in person or talked to on the phone.
Although you never try to shoulder surf other people’s passwords, you can always tell by sound alone when they haven’t typed one that is eight characters or more, and you chuckle inside.
When someone hands you their USB key to copy something, you always decline, and instead offer your known, clean USB key. You would also prefer one-time, disposable, Tupperware-like memory drives if they existed.
You always slow down when reading security guidance looking for the words “should,” “must,” “never,” and “always” — and you understand their importance.
By the time you read a CERT security bulletin, you’ve known about the issue for several days.
You always investigate SSL certificate errors when they come up in your browser.
Finally, you know you’re a computer security person when you have so frequently spoken passionately to complete strangers about computer security and the frustration it entails that you know what it’s like to be covered in sweat — and the listening party to have a look on their face that says they didn’t know what they were in for.
March 25, 2010 at 6:24 pm #30504pizza1337Participant
TOP 10 SIGNS YOUR CO-WORKER IS A COMPUTER HACKER
10) You ticked him off once and your next phone bill was for $20,000.
9) He’s won the Publisher’s Clearing House sweepstakes 3 years running.
8) When asked for his phone number, he gives it in hex.
7) Seems strangely calm whenever the office LAN goes down.
6) Somehow gets HBO on his PC at work.
5) Mumbled, “Oh, puh-leeez” 95 times during the movie “The Net”.
4) Massive 401k contribution made in half-cent increments.
3) His video dating profile lists “public-key encryption” among turn-ons.
2) When his computer starts up, you hear, “Good Morning, Mr. President”.
1) You hear him murmur, “Let’s see you use that Visa card now, Professor I-Don’t-Give-A’s-In-Computer-Science!”
March 25, 2010 at 7:07 pm #30505
lol @ previous posts…just remembered:
Hackers do more before 4am then most people do in a day
Hacker 4 hire: will work for 0-day spl0itz!
March 25, 2010 at 7:13 pm #30506unsupportedParticipant
Man, I fit into most of the categories on the original post, and some in the second…. this is funny.
March 25, 2010 at 7:16 pm #30507hayabusaParticipant
No doubt… was gonna post similar, but glad someone beat me to it!!! 😀
March 27, 2010 at 12:39 am #30508
real hackers don’t understand why they can’t inject code into their parking meters after all it is not clean
March 29, 2010 at 9:54 am #30509
a while back i was meeting a customer that requested some services from us and we wanted to meet to get some more information about the issue and scope of the project.
After half an hour talking management stuff about the project i got the question what my role would be in this project. i explained i was going to be the one that would perform the pentest/security audit and they looked at me like they saw water burn.
immediately i got the question why i didnt look like a hacker (i was wearing a suit as always when i need to look representative). i explained that not all computer intellects look like either a 13 yr old, pony tailed script kiddie living in the attic of his parents house with a semi-black iron maiden shirt from a concert back in ’92 with paled skin and skinny arms or like a 40 yr old with a huge beard, “linux inside” shirt, living in the basement of his parents house with a weight problem. ofcourse i put it out there a little more subtle but the reaction was great!
gotta love stereotypes…
April 10, 2010 at 5:46 pm #30510
real hackers don’t use Ip addressed they go by ethernet frames
May 7, 2010 at 6:02 pm #30511inf3kt1dParticipant
Real hackers don’t read books. They just parse what interests them…
May 11, 2011 at 7:00 pm #30512f4csimil3Participant
JAJAJAJA really Funny stuff!!
I found myself in a couple of them 😀
May 11, 2011 at 8:37 pm #30513Data_RaidParticipant
01010010 01100101 01100001 01101100 00100000 01101000 01100001 01100011 01101011 01100101 01110010 01110011 00100000 01110100 01111001 01110000 01100101 00100000 01101001 01101110 00100000 01100010 01101001 01101110 01100001 01110010 01111001 00100001 00100000 00111010 00101101 00101001
May 11, 2011 at 9:41 pm #30514tturnerParticipant
Real hackers can cut and paste from an ASCII to binary converter 😀 *ducks*
Although if you can honestly claim you typed it in binary from your head I’d have to be very impressed.
- You must be logged in to reply to this topic.