As I have said earlier I have never hacked Illegaly. There are plenty like me. They are called "White-Hat". I am tired of helping my school secure their computers and later being asked if I will hack (Insert webpage name here). I am just sick of this stereotype sent across by the Media and into the minds of everyone else. I want to get a job someday as A sys Admin for a fortune 500 company. So no flames to me please.
I will refute every thing with a valid reason that can be verified. If you find a unvalid refutement tell me and I will attemt to go into further detail providing clearly legidiment sources. For purposes of this
A Hacker: Someone who seeks to gain information what they do with that information is up to them
A Cracer: Someone who illegally breaks into computer systems
Ok now on to the show...
1. Has your son asked you to change ISPs?
Most American families use trusted and responsible Internet Service Providers, such as AOL. These providers have a strict "No Hacking" policy (error #1 just about all ISPS have a strict policy of do not BREAK the law on their connect, earthlink attbroadband speakeasy.net all do.), and take careful measures to ensure that your internet experience is enjoyable, educational and above all legal (error #2 all isps do. If isps have people hacking from their accounts THEY might be held liable However all are not cripled like AOL IMHO. Ever tried playing a game over AOL? Ever tried doing ANYTHING that is not strictly browsing internet over AOL? It does not work as well IMHO). If your child is becoming a hacker, one of his first steps will be to request a change to a more hacker friendly provider (Error #3 more like a internet provider that is not crippled IMHO.)
I would advise all parents to refuse this request. One of the reasons your son is interested in switching providers is to get away from AOL's child safety filter (Error #4 I am not sure about AOL's filter but most also block non bad stuff. Some block stuff from oposing political views and some block sites that shouldn't be I was reading about a article on a suppreme court decision and it was blocked at my school). This filter is vital to any parent who wants his son to enjoy the internet without the endangering him through exposure to "adult" content. (see error #4) It is best to stick with the protection AOL provides, rather than using a home-based solution (Error #5 ANY web filtering soloution will block legidiment sites and many have hidden political agendas IMHO). If your son is becoming a hacker, he will be able to circumvent any home-based measures with surprising ease, using information gleaned from various hacker sites. (Error #6 If your kid is a hacker they can get around aol too.)
2. Are you finding programs on your computer that you don't remember installing?
Your son will probably try to install some hacker software. He may attempt to conceal the presence of the software in some way, but you can usually find any new programs by reading through the programs listed under "Install/Remove Programs" in your control panel (Error #7 almost NO hacker software is under control pannel). Popular hacker software includes "Comet Cursor", "Bonzi Buddy" and "Flash". (Error #8 These are legidiment programs. Program to change mouse cursor, IM program I believe, and internet explorer plugin.)
The best option is to confront your son with the evidence, and force him to remove the offending programs (Wow something good in this article! Talking to the kid about hacking if you suspect it but DO NOT over react). He will probably try to install the software again, but you will be able to tell that this is happening, if your machine offers to "download" one of the hacker applications. (See Error #8) If this happens, it is time to give your son a stern talking to, and possibly consider punishing him with a grounding. (See Error #8)
3. Has your child asked for new hardware?
Computer hackers are often limited by conventional computer hardware. They may request "faster" video cards, and larger hard drives, or even more memory. If your son starts requesting these devices, it is possible that he has a legitimate need. You can best ensure that you are buying legal, trustworthy hardware by only buying replacement parts from your computer's manufacturer.
(HUGE ERROR #9 Hardware has nothing to do with hacking only software).
If your son has requested a new "processor" from a company called "AMD", this is genuine cause for alarm. AMD is a third-world based company who make inferior, "knock-off" copies of American processor chips. They use child labor extensively in their third world sweatshops, and they deliberately disable the security features that American processor makers, such as Intel, use to prevent hacking. AMD chips are never sold in stores, and you will most likely be told that you have to order them from internet sites. Do not buy this chip! This is one request that you must refuse your son, if you are to have any hope of raising him well.
(HUGE ERROR #10 AMD is a publicly traded company. That should be proof enough. If its not how can kids make things thiner then a piece of paper?)
4. Does your child read hacking manuals? (Isn't this a well duh?)
5. How much time does your child spend using the computer each day?
If your son spends more than thirty minutes each day on the computer, he may be using it to DOS other peoples sites. DOSing involves gaining access to the "command prompt" on other people's machines, and using it to tie up vital internet services.(Error #11 DoSing is Denial of Service. You do not do this from the dos prompt but from programs.) This can take up to eight hours. (Error #12 the command to do it certain ways can take seconds.) If your son is doing this, he is breaking the law, and you should stop him immediately.(This IS TRUE) The safest policy is to limit your children's access to the computer to a maximum of forty-five minutes each day. (Error #13 Simply not true. Many reasons to use computers more then forty-five min a day. This has nothing to do with hacking but is a perental decision on if you think that much computer is good for them. I have spent 15 hours on a computer doing nothing even related to hacking).
6. Does your son use Quake?
Quake is an online virtual reality used by hackers. It is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms. Many hackers develop anti-social tendencies due to the use of this virtual world, and it may cause erratic behaviour at home and at school. (Error #14 SOME quake places may be used as a meeting place however most of the time is NOT. This may cause the behavior but this is NOT a hacking issue but a violance one.
7. Is your son becoming argumentative and surly in his social behaviour?
As a child enters the electronic world of hacking, he may become disaffected with the real world. He may lose the ability to control his actions, or judge the rightness or wrongness of a course of behaviour. This will manifest itself soonest in the way he treats others. Those whom he disagrees with will be met with scorn, bitterness, and even foul language. He may utter threats of violence of a real or electronic nature. (error #15 YESH I thought this was puberty?)
Even when confronted, your son will probably find it difficult to talk about this problem to you. He will probably claim that there is no problem, and that you are imagining things. He may tell you that it is you who has the problem, and you should "back off" and "stop smothering him." Do not allow yourself to be deceived. You are the only chance your son has, even if he doesn't understand the situation he is in. Keep trying to get through to him, no matter how much he retreats into himself. ( see #15)
8. Is your son obsessed with "Lunix"?
BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called "xenix", which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the "mp3" program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone. (Do reaserch for god sakes error #16 Linus Torvals wrote this. He is a outstanding member of the USA. He made LINUX (spell it right yesh). It is based off of UNIX (written by ATT if I rember right). MANY big corperations use linux (www.ibm.com). It is certainly not illgegal. MP3 is a file format not a program althought taking music without paying for it (pirating) is wrong and should be discussed with him. Telnet was not invented by anyone but is a key way of logging remotley into systems. There are LEGIDIMENT uses for it and it was not made by Linus Torvals).
Your son may try to install "lunix" on your hard drive. If he is careful, you may not notice its presence, however, lunix is a capricious beast, and if handled incorrectly, your son may damage your computer, and even break it completely by deleting Windows, at which point you will have to have your computer repaired by a professional. (Error #17 I think.... Its Linux not lunix. Your son can NOT dammage your computer with Linux. Deleting windows does not destroy a computer. It is very easy to reinstalll if you OEM provided the neccesary disks.)
If you see the word "LILO" during your windows startup (just after you turn the machine on), your son has installed lunix. In order to get rid of it, you will have to send your computer back to the manufacturer, and have them fit a new hard drive. Lunix is extremely dangerous software, and cannot be removed without destroying part of your hard disk surface. (Error #18 Funny I have reinstalled and uninstalled Linux about 5 times and haven't ever had to destroy my harddrive or send it back to my OEM. Use windows or linux tool "fdisk")
9. Has your son radically changed his appearance?
Error 19 This is because of DRUGS or PUBERTY.
10. Is your son struggling academically?
Error 20 as with all things computer use NEEDS moderation otherwise it CAN lead to these things but this is NOT a sure sign of hacking. I can watch TV all day and get the same results.
I encourage all parents to read through this guide carefully. (And my comments) Your child's future may depend upon it (Yes if you listen to him your son may never be able to have a very good job as a sys admin which pays very well). Hacking is an illegal and dangerous activity (Error 21 You can legally hack if you have permision. Some hackers set up dedicated computers JUST so they can hack legally. Most of the time these are more of a chalenge then hacking a normal computer. They also sometimes have fun competitions using these computers they have permision to hack (Like a sport team and Just as legal).), that may land your child in prison, and tear your family apart.(Can't anything?) It cannot be taken too seriously. (This I must agree with. If you suspect your child of hacking talk to him!) Once again I can not stress unlinke this article portraies there ARE LEGAL OPERTUNITIES FOR HACKING. Its like the force in Starwars. Theres a Goodside and a Darkside.
Post with comments please.