Name Size Description
Parent Directory - 3-way.zip 1.4K a5.zip 5.1K applied-crypto-README.txt 11K assorted.zip 13K bbc.zip 4.1K bignum1.zip 9.0K bignum2.zip 10K blowfish.zip 6.6K ca1_1.zip 11K cbw.zip 197K chambers.zip 6.2K crpt-pol.zip 22K crypt1.zip 898 crypt3-1.zip 4.6K crypt3-2.zip 2.6K cryptolb.zip 171K des-barr.zip 33K des-bish.zip 8.5K des-karn.zip 18K des-koon.zip 23K des-levy.zip 14K des-louk.zip 89K des-mitc.zip 13K des-osth.zip 85K des-oute.zip 11K des-youn.zip 59K dessbox.zip 1.5K enigma.zip 2.7K escrow.zip 5.8K examples.zip 7.8K feal8.zip 1.6K fealnx.zip 2.4K fips171.zip 21K fips180.zip 3.8K fips181.zip 27K fips185.zip 6.5K freq.zip 846 gost.zip 3.8K grenbook.zip 111K hashes.zip 24K haval.zip 9.5K hill.zip 4.6K i-hat.zip 17K idea68k.zip 26K idea8086.zip 7.4K idea_c.zip 7.9K isomorph.zip 1.2K itar.zip 62K kerberos.zip 59K khufu.zip 7.4K ks-test.zip 1.2K lcrng-t.zip 3.2K lcrng.zip 7.9K loki.zip 21K lucifer2.zip 3.6K md-rfc.zip 28K md4-dos.zip 30K md4.zip 3.4K md5-karn.zip 6.3K mimic.zip 62K newde.zip 5.0K newdes.zip 7.7K nhash.zip 1.2K nsea.zip 32K pem-rfc.zip 69K pgp.zip 2.1K pike.zip 7.0K pkc.zip 106K playfair.zip 1.4K ppsc.zip 11K prngxor.zip 9.9K prv-anmt.zip 87K radix64.zip 3.1K ran-mix.zip 21K random1.zip 3.1K The random2.zip 4.7K The random3.zip 2.6K The random4.zip 25K The rc4.zip 1.2K rc4asm.zip 1.3K rc5-1.zip 903 rc5-2.zip 2.7K rc5-3.zip 1.4K redoc2.zip 4.9K redoc3.zip 1.0K ripe-md.zip 5.2K ripem12a.zip 592K rnd-anls.zip 1.3K rsa-faq.zip 50K rsaref20.zip 93K safer.zip 1.8K scicrypt.zip 43K seal.zip 2.0K sha1.zip 3.8K sha2.zip 4.7K sha3.zip 2.1K sharing.zip 8.4K snefru.zip 35K snuffle.zip 3.0K splay.zip 11K tea.zip 826 tis-pem.zip 4.3K tran-pwd.zip 11K tran.zip 10K trnspose.zip 3.2K vigenere.zip 2.8K vigsolve.zip 2.7K wpcrack.zip 15K zip-bark.zip 6.2K zip.zip 2.2K
Merci a tous les Uploaders anonymes, pour toutes demandes/remarques : Contact
TESTIMONY BY GEOFFREY S. GOODFELLOWBefore the Subcommittee on Transportation, Aviation and Materials on the subject of Telecommunications Security and Privacy.
26 September 1983
Table of Contents 1. Introduction 2. The Nature of Computer Hackers and Hacking. 3. What Can and Should Be Done to Help Abate The Unsavory Hacking Problem? 4. Let Us Not Lull Ourselves into a False Sense of Security. 5. Recommendations 6. Biography (The Making of a Hacker)
1.IntroductionMy name is Geoffrey S. Goodfellow. I am primarily employed by the Computer Science Laboratory at SRI International, Menlo Park, California. For the past 10 years at SRI, I have been involved in research efforts related with packet switched computer network communication systems, protocols and security technologies. I have also been involved in various operating and sub-system development projects. Currently, my responsibilities include a position as Principle Investigator of SRI's involvement in a Department of Defense program aimed at developing and proving secure computer systems, that operate at different security levels and communicate via networks. A detailed biography of my career from 7th grade school where I discovered computers (which eventually lead to my permanent abandonment of the formal educational system during high school) to how I got to where I am today with no degrees or any type of equivalency to my name is included at the end of my testimony. I am a coauthor of the Hacker's Dictionary -- A Guide to the World of Computer Wizards, a new book being published this fall. THE STATEMENTS INCLUDED HEREIN ARE MY OWN AND DO NOT NECESSARILY REPRESENT THOSE OF SRI INTERNATIONAL OR ANY CLIENTS OF SRI.
2. The Nature of Computer Hackers and Hacking.The primary nature of a computer hacker can be defined as follows: - A person who enjoys learning or knowing the details of computer systems and how to stretch their capabilities, as opposed to most users of computers, who prefer to learn or know only the minimum amount necessary in order to get their job done. - One who programs computers enthusiastically, for the sheer fun of it, and gets a non professional amount of enjoyment out of using them. - A person capable of appreciating the irony and beauty (i.e.`hack value') of a program. - A person who is good at programming quickly or is an expert on aparticular program. (This definition and the proceeding ones are correlated, and people who fit them congregate). Unfortunately, though, hacking has an unsavory faction to it: - A malicious or inquisitive meddler (i.e. `poacher') who tries to discover information by poking around.For example, a "password hacker" is one who tries, possibly by deceptive or illegal means, to discover other people's computer passwords. - A "network hacker" is one who tries to learn about the computer network (possibly because he wants to interfere--one can tell the difference only by context, tone of voice and manner of approach). [...]
- More >> Testimony - 1983