Académique Documents
Professionnel Documents
Culture Documents
The Sober.q virus was first spotted Sunday The timing of the attacks coincides with last
as it quickly crossed the globe, blasting e- week's celebrations of the 60th anniversary
mail addresses found on infected PCs. of the end of World War II. Many of the 72
Most of the political rhetoric contained links variations of the e-mail refer to "war-related"
to news stories and content with political messages, such as the Allied
approximately 72 varying subject lines, bombing of Dresden in 1945.
according to security firm MessageLabs.
The spam also included links to the
The payloads quickly turned infected PCs German Web sites for the far-right National
into spam-generating machines, launching Democratic Party.
the propaganda from thousands of hosts.
The Sober virus has now had over 20
The virus, which was sent an estimated 10 incarnations, the most recent coming earlier
million times during the first few days of this month when scammers began gearing
attacks, has since slowed, and the risks up for the 2006 World Cup, to be held in
have been downgraded to "medium" by Germany, by sending millions of virus-
most security firms, including McAfee. " carrying e-mails advertising ticket
confirmations for the matches.
Story By Ccucu
Stewart agreed.
The law, expected next year, has been The report also highlighted major changes
crafted after a consulting period with in the way that DDoS attacks have been
industry groups and mobile operators. coordinated over the last year, focusing
less on layer-3 TCP and hitting weak DDoS
The legislation will follow imminent anti- mitigation devices.
spam measures in China.
"We have seen a 100 percent failure rate in
Elsewhere in the region, the phone several DDoS mitigation devices. Hardware
numbers of 600 Chinese celebrities were does a poor job in identifying attacks that
posted online last Saturday. According to emulate legitimate traffic. Therefore,
the Beijing Daily Star, writers, film directors enterprises that rely on these devices are
and actors were inundated with calls particularly vulnerable to this attack vector.
following the leak, leading to many Essentially, extortionists are becoming
changing their numbers. more intelligent and circumnavigating the
security put in place to stop them," said
News By Ccucu Lyon. The report also revealed that Hong
Kong is the most infected country per
capita. Which may explain the country's
spam problem, due to be addressed by
upcoming anti-spam legislation.
News By Ccucu
Hacker Hunters "In January, 2004, a new virus called
MyDoom attacked the Web site of the SCO
Group Inc. (SCOX ), a software company
Business week in its May 30 2005 edition
that claimed the open-source Linux
publishes a story about the work of the
program violated its copyrights. Most
Secret Service (US) in its battle to protect
security experts suspected the virus writer
computer users everywhere. The paper
was a Linux fan seeking revenge. They
publishes a report about how the "Hacker
were wrong. While the SCO angle created
Hunters" is using new computer technology
confusion, MyDoom acted like a Trojan
and on-line wiretaps (and a bit of good old
horse, infecting millions of computers and
fashioned social engineering) as well as
then opening a secret backdoor for its
regular police gumshoe tactics to penetrate
author. Eight days after the outbreak, the
and bring down a hacker equivalent of
author used that backdoor to download
mafisto crime.
personal data from computer owners. F-
Secure's Hypponen figured this out in time
http://www.businessweek.com/magazine/co
to warn his clients. It was too late, however,
ntent/05_22/b3935001_mz001.htm
for many others. MyDoom caused $4.8
billion in damage, the second-most-
This is a good read. Something everyone in
expensive software attack ever.
both the white and grey hat communities
should read and pass on to all of your News By Ccucu
contacts."
I came onto this story while scanning DEFCON 13, July 29-31,
Groklaw. http://www.groklaw.net/index.php Las Vegas, NV 2005, Alexis
The story has a number of Park
interesting sub scripts, the
main story of how the
criminal gang known as http://www.defcon.org
shadowcrew.com; the
inside workings of a part
of law enforcement that will touch us all, on
both sides of the law, and some other
tidbits like the story of the Russian gang
that seems immune to legal proceedings.
Capture the Flag, WarDriving Contests, Wi-
At the heart of this is a fusion of whitehat Fi Contests, TCP/IP Drinking Games,
workers from many far flung organizations Dozens of quality speeches, Hacker
and law enforcement to be the face of the Jeopardy, Spot the Fed, Dunk The Hacker,
greater good fighting those who would use Coffee Wars, TCP/IP Drinking Contest
computers and the internet against us. (w/Mudge), Lock Picking Contests,
Scavenger Hunts, and more fun than the
At the same time there was one interesting feds can fit into a trip report!
side note that Groklaw pointed out and I put
for you here. News By Ccucu
EliteTorrents shut down by "This Site Has been Permanently Shut
Down by the Federal Bureau of
U.S. customs and FBI Investigation and U.S. Immigration and
Customs Enforcement."
According to the young hacker's account, The hackers accessed the internal T-Mobile
the Hilton caper started the afternoon of site shortly thereafter and began looking up
Feb. 19, when a group member rang a T- famous names and their phone numbers. At
Mobile sales store in a Southern California one point, the youth said, the group
coastal town posing as a supervisor from T- harassed Laurence Fishburne, the actor
Mobile inquiring about reports of slowness perhaps best known for his role in the
on the company's internal networks. "Matrix" movies as Morpheus, captain of the
futuristic ship Nebuchadnezzar.
account -- including phone numbers of
"We called him up a few times and said, celebrities such as Cristina Aguilera,
'GIVE US THE SHIP!'" the youth typed in Eminem, Anna Kournikova and Vin Diesel -
one of his online chats with a reporter. "He - had appeared on GenMay.com (short for
picked up a couple times and kept saying General Mayhem), an eclectic, no-holds-
stuff like YOUR ILLEGALLY CALLING ME." barred online discussion forum.
Later, using their own Sidekick phone, the Within hours of the GenMay posting,
hackers pulled up the secure T-Mobile Hilton's information was published on
customer records site, looked up Hilton's Illmob.org, a Web site run by 27-year-old
phone number and reset the password for William Genovese of Meriden, Conn.,
her account, locking her out of it. Typical known online as "illwill." (The FBI charged
wireless devices can only be hacked into by Genovese in November with selling bits of
someone physically nearby, but a stolen source code for Microsoft Windows
Sidekick's data storage can be accessed 2000 and Windows NT operating systems.)
from anywhere in T-Mobile's service area By Monday morning, dozens of news sites
by someone with control of the account. and personal Web logs had picked up the
That means the hackers were at that point story, with many linking to the illmob.org
able to download all of her stored video, post or mirroring the purloined data on their
text and data files to their phone. own.
"As soon as I went into her camera and saw Hallissey, who describes herself as a kind
nudes my head went JACKPOT," the young of "den mom" to a cadre of budding
hacker recalled of his reaction to first hackers, confirmed that the teenage source
seeing the now-public photos of a topless has been engaged in various hacking
Hilton locked in an intimate embrace with a activities for several years. Hallissey met a
female friend. "I was like, HOLY [expletive] slew of the hacker group's members after a
DUDE ... SHES GOT NUDES. THIS three-year stint during the 1990s as one of
[expletive]'s GONNA HIT THE PRESS SO thousands of people who helped AOL
[expletive] QUICK." maintain its online content in exchange for
free Internet access and various other
The hackers set up a conference call and perks. Hallissey has since joined a still-
agreed to spread the news to several active wage lawsuit against AOL and
friends, all the while plotting ways to get the maintains www.observers.net, a Web site
photos up on various Web sites. Kelly critical of the Dulles-based company.
Hallissey, a 41-year-old New York native
who has been in contact with the group of Hallissey said her sense of privacy has
hackers for several years, said the group's been erased gradually over the past two
members showed her evidence that they years as a result of her association with a
had gained access to Hilton's phone during number of AOLers who playfully bragged to
these early hours -- before the images her about their success with social
made their way online. engineering. They showed her online
screen shots of her water, gas and electric
bills, her Social Security number, credit
By early Feb. 20, the pictures, private notes card balances and credit ratings, pictures of
and contact listings from Hilton's phone her e-mail inbox, as well as all of her
previous addresses, including those of her people are usually not well-trained, but they
children. also interact with people to sell products
and services, so they tend to be more
"This was all done not by skilled 'hackers' customer-friendly and cooperative."
but by kids who managed to 'social' their
way into a company's system and gain During his highly publicized hacking career
access to it within one or two phone calls," in the 1990s, Mitnick -- who spent four
said Hallissey, who asked that her current years in prison and now works as a
place of residence not be disclosed. "Major computer security consultant -- broke into
corporations have made social engineering the computer networks of some of the top
way too easy for these kids. In their call companies in the technology and
centers they hire low-pay employees to telecommunications industries, but rarely
man the phones, give them a minimum of targeted computers systems directly.
training, most of which usually dwells on
call times, canned scripts and sales. This Rather, he phoned employees and simply
isn't unique to T-Mobile or AOL. This has asked them for user names, passwords or
become common practice for almost every other "insider" data that he could use to
company." sound more authentic in future phone
inquiries. "This kind of thing works with just
AOL officials declined to comment about about every mobile carrier," Mitnick said.
the young hacker or other "AOLers" for this
story. He said all of the major wireless carriers --
not just T-Mobile -- are popular targets for
The Weakest Link social engineering attacks. Mitnick said he
knows private investigators who routinely
Security experts say the raiding of Hilton's obtain phone records of people they are
wireless account highlights one of the most investigating by calling a sales office at the
serious security challenges facing target's wireless carrier and pretending to
corporations -- teaching employees to be be an employee from another sales office.
watchful for "social engineering," the use of
deception to trick people into giving away Mitnick described how an investigator will
sensitive data, usually over the phone. claim to have the customer they're
investigating in the store, but can't access
In his book "The Art of Deception," their data because of computer trouble.
notorious ex-hacker Kevin Mitnick says Then the investigator asks the sales
major corporations spend millions of dollars representative at the other store to look up
each year on new technologies to keep out that person's password, account number
hackers and viruses, yet few dedicate and Social Security number. In many cases
significant resources to educating the employee provides the information
employees about the dangers of old- without verifying the caller's identity. Armed
fashioned con artistry. with that data, he said, investigators usually
can create an account at the wireless
"The average $10-an-hour sales clerk or provider's Web site and pull all of the
call-center employee will tell you anything target's phone records.
you want, including passwords," Mitnick
said in a telephone interview. "These
Large organizations that maintain Service agent. Jacobsen had posted to an
numerous branches around the country are online bulletin board that he could be hired
especially susceptible to social engineering to look up the name, Social Security
attacks, said Peter Stewart, president of number, birth date, and voice-mail and e-
Baton Rouge, La.-based Trace Security, a mail passwords of any T-Mobile subscriber.
company that is hired to test the physical
and network security for some of the most T-Mobile later alerted 400 customers that
paranoid companies in the world: banks. their e-mails, phone records and other data
More often than not, Stewart says, his had been compromised as a result of that
people can talk their way into employee- break-in.
only areas of banks by pretending to be a
repairman or just another employee. In The court files don't give details about how
most cases, the break-in attempts are aided it happened, but Jack Koziol, a senior
by information gleaned over the phone. instructor for the Oak Park, Ill.-based
InfoSec Institute, said the intruder likely
"Usually your corporate headquarters are took advantage of security flaws in the
more stringent and things get more lax the company's Web servers. Koziol conducted
further away from there you get," Stewart an informal audit of T-Mobile's site in March
said. "The larger you are as a company the and uncovered hundreds of pages run by
more likely it is that you're not going to Web servers vulnerable to well-known
know everyone by name, and lots of security flaws, he said.
companies have no policy in place of "It's pretty amazing how poorly secured
verifying who's calling you and how to their Web properties are," said Koziol,
respond to that person." whose company offers training to corporate,
law enforcement and government clients on
'Web Security 101' the latest techniques and tactics used by
hackers. "Most of these flaws are simple
Social engineering can be difficult to Web Security 101, stuff you'd learn about in
counter, but the now-infamous Paris Hilton the first few chapters of a basic book on
attack follows other recent serious T-Mobile how to secure Web applications."
security breaches engineered by hackers.
On Feb. 15, Nicolas Jacobsen, 22, of Santa T-Mobile officials declined to say what
Ana, Calif., pleaded guilty to compromising steps they took to close the security holes
a T-Mobile Web server that granted access identified by the Hilton hackers or how
to hundreds of wireless accounts. He faces many other accounts may have been
a maximum of five years in jail and a hijacked.
$250,000 fine at a sentencing hearing "T-Mobile has invested millions of dollars to
originally scheduled for mid-May. protect our customers' information, and we
continue to reinforce our systems to
Jacobsen was arrested last fall by the U.S. address the security needs of our
Secret Service as part of a large-scale subscribers," company spokesman Peter
investigation into an international online Dobrow wrote in an e-mail. "For our
credit card fraud ring. According to court customers' protection, we do not publicly
records, Jacobsen had hijacked hundreds disclose the specific actions taken to
of T-Mobile accounts, including a mobile reinforce our systems."
phone belonging to a then-active Secret News By Coldrock
it was big page with almost 20000
members, with paid sections etc. that was
like original job, big thing and great honor to
work with those neat old guys.
In this issue of "Masters of
WareZ", I bring you the We worked together on few projects and
later, and I was around warez scene all the
man who I admire the time.. when I decided to start running my
most, the man who is like a own pages.
second father, and, also First page was wizzwarez.info, which went
like a brother to me. So down and doesn't exist anymore..(IPB took
me down, 4 using their board software,
here is WiZzMaster, the pirated, how ironically). Not long after,
man who cracked XP SP 2, almost a year ago new project came,
wizzworld.info and later wizzworld.org, first
before it was officially out, my big warez forum and first real quality
"The King of WareZ". site.
In first reactions I expect laughter and Hack to improve things, not to brake and
public judgment for (in some way) my critics steal somebody's private property, find and
about people and their lives, but time and learn new skills which all are going to
history shows that only thing which could benefit from.
bring our persistence in question, is Article by WiZzMaster
something what we will produce...
1) You enter a website. Once you hit any And much much more.
one of the files on the web server, the
website owners can find out these pieces of The same goes for online games that allow
information about you, and much more: players to view the other players' IP
addresses.
1. Your IP Address.
2. Your hostname. 3) Suppose my name is Paul Matthews,
3. Your continent. and my Email address is
4. Your country. pmatthews@boring.ISP.net. It is extremely
5. Your city. easy to figure out that the first letter of my
6. Your web browser. first name is P and that my last name is
7. Your Operating System. Matthews, but that's not all.
8. Your screen resolution. Some ISPs give their entire listings to web
9. Your screen colors. directories. Meaning, people can go to,
10. The previous URL you've been to. say... whowhere.com, punch in the words
11. Your ISP. Paul Matthews or search for people with
Matthews as their last name on
And this is just the tip of the iceberg. Go to boring.ISP.net and find out that
our homepage at blacksun.box.sk and find pmatthews@boring.ISP.net does actually
the web statistics button (later addition: we belong to Paul Matthews, hence
discovering your real name. Instant Messenger, allow you to add people
But it is also possible to use these web in or outside your contact list to an "invisible
directories for 1,001 uses. Therefore you list", so they won't be able to know whether
should go to whowhere.com as soon as you're online or not and you'll appear to be
possible, try to track down yourself and offline to them. If they have your Email
then tell whowhere.com to delete your address, and your ISP is running a finger
listing. daemon, they are able to know whether
you're really offline or just trying to fool
4) Some ISPs also run finger daemons. them.
A daemon is a program that waits for 2. Your friend promised you to do
incoming connections on a specific or something for you on the net, but when you
several ports. finally go online to ask him if he's done it he
The finger daemon is a daemon that waits says that he just got back from work and
for open connections on port 79. Once you that he just got online. Using finger, you can
get in, you need to punch in a username on test this and see when he really got online.
the system the daemon runs on and you
will get tons of information about him. These were just a little out of many
For example: a while ago my ISP was examples.
running a finger daemon on their servers During this tutorial I will explain to you how
(until I forced them to take it off because it to prevent people from finding out
was a privacy invasion). Now, suppose you information about you (there will always be
know nothing about me besides my Email new tricks, but blocking the most basic /
address, which is barakirs@netvision.net.il. common ones will hold off most attackers
The first thing you should do is to go to and make it harder for the more
netvision.net.il on port 79 and hope there's experienced ones). If you really wanna
somebody there. If there is, you can find the learn how to do these things, as well as
following information by typing in my some really cool and advanced tricks, then
username, barakirs: read the 'Info-Gathering' tutorial.
WARNING: some IRC networks run bots Here's a good example for an Anonymous
that will kick out people using Wingates. Remailer:
These bots try to connect to random people First, head to http://anon.isp.ee (by the way,
on port 1080. If they succeed, they kick you the extension .ee stands for Estonia) and
out. This works because the IRC network, sign up your free account. Once you're a
as well as everyone on it, thinks that your registered user, send an Email to
IP is the wingated machine's IP. If the bot robot@anon.isp.ee with no subject and the
tries to connect to your IP on port 1080, it following content:
will actually go to the wingated machine. user: your username
The bot will then detect that your IP is pass: your password
actually a Wingate and kick you off (since realaddr: your recipient's Email address.
it's being run by the IRC network and given realsubj: the subject of your mail.
enough privileges to kick out anyone). Example: if I want to send an anonymous
mail containing the following:
You can find lists of Wingates at
http://www.cyberarmy.com/lists. There are Subject: ANONYMITY RULEZ!!
also tons of Wingate scanners out there Hi.
that can scan whole subnets and look for This is an anonymous Email message.
Wingates, but this might take some time Let's see you trace me now!
(and make your ISP get suspicious), so
you'd just better go for Cyber Army’s lists. to bgates@microsoft.com, and your
username is user and your pass is pass,
Anonymous Remailers? send the following Email to
robot@anon.isp.ee (remember not to enter
Previously I have demonstrated to you what a subject):
a person with very little knowledge can find
out about you just by knowing your Email user: user
address. Now it is obvious that to keep your pass: pass
privacy, you need to sign up for a free realaddr: bgates@microsoft.com
Email account (such as Hotmail realsubj: ANONYMITY RULEZ!!
[hotmail.com], Yahoo mail Hi.
[mail.yahoo.com], ZDNet Mail This is an anonymous Email message.
[zdnetmail.com], Net @dress Let's see you trace me now!
[netaddress.com], Bigfoot [bigfoot.com]
etc'). But what if you had a special Email You'll receive an Email notification from
address on a free server that automatically anon.isp.ee once your message has been
forwards all incoming Email to your real delivered.
Once your recipient will reply to this Email, browser to create and then retrieve
the message will return to you. information from them. Websites can put
your password or any other information in
You can also use web-based anonymous these files.
remailers such as Replay Associates If you don't want your co-workers or other
(replay.com/remailer/anon.html), but it won't people to sniff around and see where
let you receive replies. you've been visiting, what items you've
been buying etc', you should delete them
Encryption? when you don't need them.
On Unix, your cookies would usually be
Everyone can read your Email. Whether it's stored somewhere in your home directory
some script kiddie who hacked your (usually /home/your-login, /usr/your-login or
Hotmail account, a skilled cracker (or a /usr/local/your-login if you're a regular user
script kiddie with a lot of free time) that and /root if you're root, but anyone with
hacked your POP3 mailbox or a person write access to /etc/passwd can change
who got your Email by mistake. If you don't that).
want other people to read your Email, use On Windows and Mac, cookies are stored
PGP. on a sub-directory at your browser's
Everyone who uses PGP can have their directory called cookies.
own PGP key. A key consists of tons of
characters, whether they are lowercase or Note 1: you can tell your browser to ask you
uppercase letters, number or symbols. After before accepting a cookie. Just play around
you make your key, you need to transfer it with its preferences menu, you'll find it
to everyone you want to send encrypted (there are so many browsers out there so I
mail to. Once they have it, you can start can't give a detailed explanation for every
sending encrypted mail to them and they'll single one).
be able to use your key to decrypt it. Note 2: if you're browsing from a public
More info on www.pgpi.com. computer, do not save any cookies, or other
people will be able to snoop around and
Note: PGP is very strong and can only be look at your cookies or even enter various
broken with giant supercomputers. The websites with your passwords, your credit
longer your key is, the harder it is to break card number etc'.
the encryption.
A reader called Stone Cold Lyin Skunk has
Cookies? pointed out to me that the cookies.txt file
may be found in the netscape\users\default
Have you noticed how all those websites on directory. This happens when you register
the net are getting "smarter" all of a your user (Netscape let's you have multiple
sudden? You know, like the way message users for the same program, each user with
boards remember your nickname, some his own settings etc') without giving it a
sites remember your password so you won't username.
have to retype it every time, electronic malls He also pointed out to me that some
remember what you last put in your virtual websites will require you to accept cookies
shopping cart etc'. in order to enter them.
This is all because of cookies. Cookies are Also, he recommended to beware of your
small files which a website can request your browser's history file (information on
removing it can be found on the "Where University, designed and implemented
Can I Learn More About Anonymity?" Anonymizer surfing. Anonymizer Surfing is
chapter), as well as your cache and your now in its 4th generation under
preferences.js files, because they may development by the Anonymizer
reveal your browsing habits (where have engineering team.
you been, etc').
Our Mission
.chk files?
Our mission is to ensure that an individual's
Stone Cold Lyin Skunk has pointed out that right to privacy is not compromised once
if you're running Windows and you do a they are online. We began this company as
quick reboot (hold down shift while telling a means to protect this right as embodied in
Windows to reset) Windows generates a file the United Nations' Universal Declaration of
called FILE0001.chk, FILE0002.chk etc' Human Rights:
(usually found on c:\). You will be amazed "No one shall be subjected to arbitrary
to see how much information you could find interference with his privacy, family, home
in these files! Delete them ASAP! or correspondence, nor to attacks upon his
honor and reputation. Everyone has the
The Anonymizer? right to the protection of the law against
such interference or attacks."
The Anonymizer is an Internet service that
helps you anonymize yourself better. The While written 50 years ago, article 19 of this
Anonymizer's homepage is document is now more than ever applicable
www.anonymizer.com. Here's a snapshot with the advent of the recent growth of the
from anonymizer.com: Internet:
"Everyone has the right to freedom of
Company Overview opinion and expression; this right includes
freedom to hold opinions without
Anonymizer.com is a pioneer in Internet interference and to seek, receive and
privacy technologies, and the most popular impart information and ideas through any
and trusted name in delivering online media and regardless of frontiers."
privacy services. Anonymizer.com, today,
has many thousand subscribers to its paid You can read the full Universal Declaration
services and makes anonymous over 7.5 of Human Rights on the following URL:
million pages a month. Lance Cottrell, http://www.unhchr.ch/udhr/lang/eng.htm.
founder and President of Anonymizer.com,
authored the world's most secure You can use The Anonymizer to surf the
anonymous remailer, Mixmaster and has web with anonymity for free by going to
been active for many years in promoting anonymizer.com and typing in the target
free speech. Lance received his URL where asked, or buy an Anonymizer
undergraduate degree in physics from The package, which will give you more benefits.
University of California, Santa Cruz and a If you want some of the money you pay to
masters in Physics from The University of go to Black Sun, subscribe through the
California, San Diego. following URL:
Justin Boyan, while a Computer Science http://www.anonymizer.com/3.0/affiliate/doo
Ph.D. student at Carnegie Mellon r.cgi?CMid=12437.
If you want, you too can join their affiltrates
program. Simply go to Appendix B: Spoofing browser history
http://www.anonymizer.com/3.0/affiliate/afd
oor.cgi?CMid=12437 for more information. Here is something I got by Email from a
If you will subscribe through this URL, you reader called Stone Cold Lyin Skunk:
will still receive all the cash you deserve,
but we at Black Sun will also receive some
benefits. set up a V3 redirect (http://www.v3.com or
something like that) then build a quick
Where Can I Learn More About Anonymity? webpage with a link to the site you want to
view discretely then go to your webpage via
Useful URLs: http://www.theargon.com. the V3 redirect
http://www.pgpi.com (for learning about all I know is that the URL indicator at the
PGP encryption and how to use it to top of the e browser
encrypt your Emails) will not show the URL you visit even your
IP Spoofing Demystified - a long article own .index page
from Phrack magazine on IP spoofing it will only show the URL name
(faking your IP). You can download it from
our books section. so if there is URL logging at your job or
http://www.cyberarmy.com/lists - for lists of school or whatever,
Wingates, Proxies and free shell accounts they can always surf to your homepage via
you can surf from to anonymize yourself. the V3, which they will
http://2waymedia.hypermart.net/hh/browser have. But, by then, you will have erased or.
s/index.htm - how to completely clear your Or maybe it has
browser's history "hidden" links (links the same color as the
background)...
Other useful Tutorials by Black Sun: IRC
Warfare by The Cyber God (for learning in any case, they will not have your URLs
more on Anonymizing yourself on IRC), and they certainly
Proxy/Wingate/SOCKS tutorial by Jet and won't have proof you surfed there...
Sendmail by me, R a v e N.
for instance, you may not want, say, your
Appendix A: Using AltaVista as a proxy local library sysop to know about Black
Sun...so you set up say, a Homestead
If you go to altavista.com, and under their homepage (these are great because they
tools section choose translation (or go feature password protected pages) ...you
directly to the following URL: then
http://babelfish.altavista.com/cgi- set up a V3 redirect to that page. Bingo-
bin/translate?), you can ask AltaVista to you can now surf to the
translate web pages for you. page via V3, log in with your password, hit
But you can also use this as a proxy, since all those cool hidden
when you tell AltaVista to translate a web links to Black Sun, Cyber Army,
page, AltaVista’s CGI translation script peacefire.org what whatever, and the
retrieves the page for you. URL snoop software will only record the
original http://surf.to/fakeoutname
Thanks to Yoink for this information. ... and don't forget, make the V3 Ural as
innocuous-sounding as possible...eg.
http://surf.to.backetweaving ... Appendix D: Anonymity on Usenet
1. The world is full of fascinating (You don't have to believe that you're
problems waiting to be solved. obligated to give all your creative product
away, though the hackers that do are the
Being a hacker is lots of fun, but it's a kind ones that get most respect from other
of fun that takes lots of effort. The effort hackers. It's consistent with hacker values
takes motivation. Successful athletes get to sell enough of it to keep you in food and
their motivation from a kind of physical rent and computers. It's fine to use your
delight in making their bodies perform, in hacking skills to support a family or even
pushing themselves past their own physical get rich, as long as you don't forget your
limits. Similarly, to be a hacker you have to loyalty to your art and your fellow hackers
get a basic thrill from solving problems, while doing it.)
sharpening your skills, and exercising your
intelligence. 3. Boredom and drudgery are evil.
If you aren't the kind of person that feels Hackers (and creative people in general)
this way naturally, you'll need to become should never be bored or have to drudge at
one in order to make it as a hacker. stupid repetitive work, because when this
Otherwise you'll find your hacking energy is happens it means they aren't doing what
sapped by distractions like sex, money, and only they can do --- solve new problems.
social approval. This wastefulness hurts everybody.
Therefore boredom and drudgery are not
(You also have to develop a kind of have to just unpleasant but actually evil.
develop a kind of faith in your own learning
capacity --- a belief that even though you To behave like a hacker, you have to
may not know all of what you need to solve believe this enough to want to automate
a problem, if you tackle just a piece of it and away the boring bits as much as possible,
not just for yourself but for everybody else 5. Attitude is no substitute for
(especially other hackers). competence.
(There is one apparent exception to this. To be a hacker, you have to develop some
Hackers will sometimes do things that may of these attitudes. But copping an attitude
seem repetitive or boring to an observer as alone won't make you a hacker, any more
a mind-clearing exercise, or in order to than it will make you a champion athlete or
acquire a skill or have some particular kind a rock star. Becoming a hacker will take
of experience you can't have otherwise. But intelligence, practice, dedication, and hard
this is by choice --- nobody who can think work.
should ever be forced into a situation that
bores them.) Therefore, you have to learn to distrust
attitude and respect competence of every
4. Freedom is good. kind. Hackers won't let posers waste their
time, but they worship competence ---
Hackers are naturally anti-authoritarian. especially competence at hacking, but
Anyone who can give you orders can stop competence at anything is good.
you from solving whatever problem you're Competence at demanding skills that few
being fascinated by --- and, given the way can master is especially good, and
authoritarian minds work, will generally find competence at demanding skills that
some appallingly stupid reason to do so. So involve mental acuteness, craft, and
the authoritarian attitude has to be fought concentration is best.
wherever you find it, lest it smother you and
other hackers. If you revere competence, you'll enjoy
developing it in yourself --- the hard work
(This isn't the same as fighting all authority. and dedication will become a kind of
Children need to be guided and criminals intense play rather than drudgery. That
restrained. A hacker may agree to accept attitude is vital to becoming a hacker.
some kinds of authority in order to get
something he wants more than the time he Basic Hacking Skills
spends following orders. But that's a limited,
conscious bargain; the kind of personal The hacker attitude is vital, but skills are
surrender authoritarians want is not on even more vital. Attitude is no substitute for
offer.) competence, and there's a certain basic
toolkit of skills which you have to have
Authoritarians thrive on censorship and before any hacker will dream of calling you
secrecy. And they distrust voluntary one.
cooperation and information-sharing --- they
only like 'cooperation' that they control. So This toolkit changes slowly over time as
to behave like a hacker, you have to technology creates new skills and makes
develop an instinctive hostility to old ones obsolete. For example, it used to
censorship, secrecy, and the use of force or include programming in machine language,
deception to compel responsible adults. and didn't until recently involve HTML. But
And you have to be willing to act on that right now it pretty clearly includes the
belief. following:
1. Learn how to program. that efficiency by requiring you to do a lot of
low-level management of resources (like
This, of course, is the fundamental hacking memory) by hand. All that low-level code is
skill. If you don't know any computer complex and bug-prone, and will soak up
languages, I recommend starting with huge amounts of your time on debugging.
Python. It is cleanly designed, well With today's machines as powerful as they
documented, and relatively kind to are, this is usually a bad tradeoff --- it's
beginners. Despite being a good first smarter to use a language that uses the
language, it is not just a toy; it is very machine's time less efficiently, but your time
powerful and flexible and well suited for much more efficiently. Thus, Python.
large projects. I have written a more
detailed evaluation of Python. Good Other languages of particular importance to
tutorials are available at the Python web hackers include Perl and LISP. Perl is worth
site. learning for practical reasons; it's very
widely used for active web pages and
Java is also a good language for learning to system administration, so that even if you
program in. It is more difficult than Python, never write Perl you should learn to read it.
but produces faster code than Python. I Many people use Perl in the way I suggest
think it makes an excellent second you should use Python, to avoid C
language. programming on jobs that don't require C's
machine efficiency. You will need to be able
But be aware that you won't reach the skill to understand their code.
level of a hacker or even merely a
programmer if you only know one or two LISP is worth learning for a different reason
languages --- you need to learn how to --- the profound enlightenment experience
think about programming problems in a you will have when you finally get it. That
general way, independent of any one experience will make you a better
language. To be a real hacker, you need to programmer for the rest of your days, even
get to the point where you can learn a new if you never actually use LISP itself a lot.
language in days by relating what's in the (You can get some beginning experience
manual to what you already know. This with LISP fairly easily by writing and
means you should learn several very modifying editing modes for the Emacs text
different languages. editor.)
If you get into serious programming, you It's best, actually, to learn all five of these
will have to learn C, the core language of (Python, Java, C/C++, Perl, and LISP).
Unix. C++ is very closely related to C; if you Besides being the most important hacking
know one, learning the other will not be languages, they represent very different
difficult. Neither language is a good one to approaches to programming, and each will
try learning as your first, however. And, educate you in valuable ways.
actually, the more you can avoid
programming in C the more productive you I can't give complete instructions on how to
will be. learn to program here --- it's a complex skill.
But I can tell you that books and courses
C is very efficient, and very sparing of your won't do it (many, maybe most of the best
machine's resources. Unfortunately, C gets hackers are self-taught). You can learn
language features --- bits of knowledge --- Under OS/X it's possible, but only part of
from books, but the mind-set that makes the system is open source --- you're likely to
that knowledge into living skill can be hit a lot of walls, and you have to be careful
learned only by practice and not to develop the bad habit of depending
apprenticeship. What will do it is (a) reading on Apple's proprietary code. If you
code and (b) writing code. concentrate on the Unix under the hood you
can learn some useful things.
Learning to program is like learning to write
good natural language. The best way to do Unix is the operating system of the Internet.
it is to read some stuff written by masters of While you can learn to use the Internet
the form, write some things yourself, read a without knowing Unix, you can't be an
lot more, write a little more, read a lot more, Internet hacker without understanding Unix.
write some more - and repeat until your For this reason, the hacker culture today is
writing begins to develop the kind of pretty strongly Unix-centered. (This wasn't
strength and economy you see in your always true, and some old-time hackers still
models. aren't happy about it, but the symbiosis
between Unix and the Internet has become
Finding good code to read used to be hard, strong enough that even Microsoft's muscle
because there were few large programs doesn't seem able to seriously dent it.)
available in source for fledgeling hackers to
read and tinker with. This has changed So, bring up a Unix --- I like Linux myself
dramatically; open-source software, but there are other ways (and yes, you can
programming tools, and operating systems run both Linux and Microsoft Windows on
(all built by hackers) are now widely the same machine). Learn it. Run it. Tinker
available. Which brings me neatly to our with it. Talk to the Internet with it. Read the
next topic? code. Modify the code. You'll get better
programming tools (including C, LISP,
2. Get one of the open-source Unixes Python, and Perl) than any Microsoft
and learn to use and run it. operating system can dream of hosting,
I'm assuming you have a personal you'll have fun, and you'll soak up more
computer or can get access to one (these knowledge than you realize you're learning
kids today have one (these kids today have until you look back on it as a master hacker.
it so easy :-)). The single most important
step any newbie can take toward acquiring For more about learning Unix, see The
hacker skills is to get a copy of Linux or one Loginataka. You might also want to have a
of the BSD-Unixes, install it on a personal look at The Art Of Unix Programming.
machine, and run it.
To get your hands on a Linux, see the Linux
Yes, there are other operating systems in Online! site; you can download from there
the world besides Unix. But they're or (better idea) find a local Linux user group
distributed in binary --- you can't read the to help you with installation. From a new
code, and you can't modify it. Trying to user's point of view, all Linux distributions
learn to hack on a Microsoft Windows are pretty much equivalent.
machine or under MacOS or any other
closed-source system is like trying to learn You can find BSD Unix help and resources
to dance while wearing a body cast. at www.bsd.org.
I have written a primer on the basics of Unix 4. If you don't have functional English,
and the Internet. learn it.
But just having a home page isn't anywhere Status in the Hacker Culture
near good enough to make you a hacker.
The Web is full of home pages. Most of Like most cultures without a money
them are pointless, zero-content sludge --- economy, hackerdom runs on reputation.
very snazzy-looking sludge, mind you, but You're trying to solve interesting problems,
sludge all the same (for more on this see but how interesting they are, and whether
The HTML Hell Page). your solutions are really good, is something
that only your technical peers or superiors
To be worthwhile, your page must have are normally equipped to judge.
content --- it must be interesting and/or
useful to other hackers. And that brings us Accordingly, when you play the hacker
to the next topic? game, you learn to keep score primarily by
what other hackers think of your skill (this is
why you aren't really a hacker until other They also serve who stand and debug
hackers consistently call you one). This fact open-source software. In this imperfect
is obscured by the image of hacking as world, we will inevitably spend most of our
solitary work; also by a hacker-cultural software development time in the
taboo (now gradually decaying but still debugging phase. That's why any open-
potent) against admitting that ego or source author who's thinking will tell you
external validation are involved in one's that good beta-testers (who know how to
motivation at all. describe symptoms clearly, localize
problems well, can tolerate bugs in a
Specifically, hackerdom is what quickie release, and are willing to apply a
anthropologists call a gift culture. You gain few simple diagnostic routines) are worth
status and reputation in it not by dominating their weight in rubies. Even one of these
other people, nor by being beautiful, nor by can make the difference between a
having things other people want, but rather debugging phase that's a protracted,
by giving things away. Specifically, by exhausting nightmare and one that's merely
giving away your time, your creativity, and a salutary nuisance.
the results of your skill.
If you're a newbie, try to find a program
There are basically five kinds of things you under development that you're interested in
can do to be respected by hackers: and be a good beta-tester. There's a natural
progression from helping test programs to
1. Write open-source software helping debug them to helping modify them.
You'll learn a lot this way, and generate
The first (the most central and most good karma with people who will help you
traditional) is to write programs that other later on.
hackers think are fun or useful, and give the
program sources away to the whole hacker 3. Publish useful information
culture to use.
Another good thing is to collect and filter
(We used to call these works 'free useful and interesting information into web
software', but this confused too many pages or documents like Frequently Asked
people who weren't sure exactly what 'free' Questions (FAQ) lists, and make those
were supposed to mean. Most of us, by at generally available.
least a 2:1 ratio according to web content
analysis, now prefer the term 'open-source' Maintainers of major technical FAQs get
software). almost as much respect as open-source
authors.
Hackerdom's most revered demigods are
people who have written large, capable 4. Help keep the infrastructure working
programs that met a widespread need and
given them away, so that now everyone The hacker culture (and the engineering
uses them. development of the Internet, for that matter)
is run by volunteers. There's a lot of
2. Help test and debug open-source necessary but unglamorous work that
software needs done to keep it going ---
administering mailing lists, moderating
newsgroups, maintaining large software from normal social expectations. See The
archive sites, developing RFCs and other Geek Page for extensive discussion.
technical standards.
If you can manage to concentrate enough
People who do this sort of thing well get a on hacking to be good at it and still have a
lot of respect, because everybody knows life, that's fine. This is a lot easier today
these jobs are huge time sinks and not as than it was when I was a newbie in the
much fun as playing with code. Doing them 1970s; mainstream culture is much
shows dedication. friendlier to techno-nerds now. There are
even growing numbers of people who
5. Serve the hacker culture itself realize that hackers are often high-quality
Finally, you can serve and propagate the lover and spouse material.
culture itself (by, for example, writing an
accurate primer on how to become a If you're attracted to hacking because you
hacker :-)). This is not something you'll be don't have a life, that's OK too --- at least
positioned to do until positioned to do until you won't have trouble concentrating.
you've been around for while and become Maybe you'll get a life later on.
well-known for one of the first four things.
Points For Style
The hacker culture doesn't have leaders,
exactly, but it does have culture heroes and Again, to be a hacker, you have to enter the
tribal elders and historians and hacker mindset. There are some things you
spokespeople. When you've been in the can do when you're not at a computer that
trenches long enough, you may grow into seem to help. They're not substitutes for
one of these. Beware: hackers distrust hacking (nothing is) but many hackers do
blatant ego in their tribal elders, so visibly them, and feel that they connect in some
reaching for this kind of fame is dangerous. basic way with the essence of hacking.
Rather than striving for it, you have to sort
of position yourself so it drops in your lap, • Learn to write your native language
and then be modest and gracious about well. Though it's a common
your status. stereotype that programmers can't
write, a surprising number of hackers
The Hacker/Nerd Connection (including all the most accomplished
ones I know of) are very able writers.
Contrary to popular myth, you don't have to • Read science fiction. Go to science
be a nerd to be a hacker. It does help, fiction conventions (a good way to
however, and many hackers are in fact meet hackers and proto-hackers).
nerds. Being a social outcast helps you stay • Study Zen, and/or take up martial
concentrated on the really important things, arts. (The mental discipline seems
like thinking and hacking. similar in important ways.)
• Develop an analytical ear for music.
For this reason, many hackers have Learn to appreciate peculiar kinds of
adopted the label 'nerd' and even use the music. Learn to play some musical
harsher term 'geek' as a badge of pride --- instrument well, or how to sing.
it's a way of declaring their independence • Develop your appreciation of puns
and wordplay.
The more of these things you already do, The problem with screen names or handles
the more likely it is that you are natural deserves some amplification. Concealing
hacker material. Why these things in your identity behind a handle is a juvenile
particular is not completely clear, but they're and silly behavior characteristic of crackers,
connected with a mix of left- and right-brain warez d00dz, and other lower life forms.
skills that seems to be important; hackers Hackers don't do this; they're proud of what
need to be able to both reason logically and they do and want it associated with their
step outside the apparent logic of a problem real names. So if you have a handle, drop
at a moment's notice. it. In the hacker culture it will only mark you
as a loser.
Work as intensely as you play and play as
intensely as you work. For true hackers, the Tutorial by arjuna
boundaries between "play", "work",
"science" and "art" all tend to disappear, or
to merge into a high-level creative
playfulness. Also, don't be content with a
narrow range of skills. Though most
hackers self-describe as programmers, they
are very likely to be more than competent in
several related skills --- system
administration, web design, and PC
hardware troubleshooting are common
ones. A hacker who's a system
administrator, on the other hand, is likely to
be quite skilled at script programming and
web design. Hackers don't do things by
halves; if they invest in a skill at all, they
tend to get very good at it.
It lets you apply keyframe animation to The Start menu, in Windows XP, has been
joints and also control them with Inverse completely revamped and made extremely
Kinematics( IK) animation. In addition to customizable. If you want the Start menu to
blending IK and Forward Kinematics (FK) display only certain applications, right click
animation over multiple frames, a blend can in an empty section of the Start menu's left
occur over a single frame. Blending over a column and select Properties > Start menu
single frame switches IK to FK or FK to IK > Customize. Then, go to the General tab,
instantly. click on Clear List, and set the counter to
zero. Now no one can keep track of the
Intensity curves and color curves programs or applications you've recently
used.
Use a custom brightness decay rate to
increase a spotlight's brightness, or a
custom color decay rate to change its color
with distance. Speedup the Start menu
Intensity curves and color curves are
graphical representations of a light's
brightness and color with distance. Use the The Start menu takes quite a while to
graph editor (Windows > Animation Editor), display the list of programs installed. In
to view them. order to get Windows XP to display the list
The vertical axis represents the intensity or faster, you will have to edit the registry
color intensity value, and the horizontal axis settings. To speed up your Start menu, go
represents distance from the light source. to Start > Run and type regedit. This will
Intensity curves and color curves are similar open the registry window. Then navigate to
to animation curves, except that the the following key:
horizontal axis of an animation curve HKEY_CURRENT_USER\Control
represents time. Panel\Desktop. Scroll down in the right
panel and double-click on 'menu show
delay'. In the Value Data box, change the
RampShader brightness default value for the menu speed from 400
to a lesser number, such as 1 or even 0.
Use this Shader Type to create cartoon- Click OK. You should now find a significant
style shading with the help of a ramp with increase in the Start menu speed.
stepped values. The right side of the ramp Note: Remember to back up your registry
shows the color output where the before making any changes.
brightness of the diffused and translucent
lighting is 1.0 or greater. The left side
displays the color with the brightness set to
zero.
Switching users The 'Classic Look'
Windows XP allows you to switch users, If you are not comfortable with the new look
without actually quitting programs and of Windows XP, you can easily switch back
logging off. To make use of this, go to Start to the old classic Windows look. Right click
> Log off. You will be greeted with an option the desktop, select Properties, click the
of 'switching user' wherein another user can Themes tab and choose Windows Classic
log on without you having to quit your from the drop-down list. You will now have
programs. the old Windows 2000 look.
If you have only 128 MB RAM, your Try opening more than three windows of
machine might be a bit sluggish after any program, such as Internet Explorer,
installing Windows XP. So to achieve and you will see them automatically
optimal performance without buying grouped together under a single button.
additional RAM, disable certain visual This happens because Windows XP, by
settings and free up some precious default, enables the option of grouping
memory. Go to the Control Panel > system similar programs. To uncheck this option,
> Advanced, and click on the Settings right click on a blank area of the Taskbar
button under Performance. Change various and select Properties. Under Properties,
graphical effects, and ensure that the deselect 'Group Similar Taskbar Buttons',
animation and shadow options are and then click OK.
unchecked, as they tend to consume a lot If you want to change the number of
of memory. You should get a better windows that can be opened, without
response from your operating system, grouping, you will have to change a registry
without spending any money on RAM. entry. Go to Start > Run and type regedit,
and press [Enter]. Navigate to the key to
Enabling/disabling Clear Type text KEY_CURRENT_USER\Software\Microsoft
\Windows\CurrentVersion\Explorer\Advanc
Microsoft has introduced a new technology ed\Taskbar Groupsize. Right click on
called 'Clear Type' with Windows XP. 'Taskbar Groupsize', and change the
However, it is not enabled by default. To hexadecimal value to whatever you like-for
enable it, right click on a blank area of the example, 4, 5 or even 10. XP will now
Desktop, and choose Properties. Click on group the programs according to the
the Appearance Tab, and then click on number you set.
Effects. Check the 'Use following method to
smooth edges of screen fonts' option and Hiding inactive icons
then choose as per your monitor. For
desktop monitors choose the 'Standard' Windows XP automatically hides inactive
option, and for laptops and other flat screen icons in the System Tray. If you so wish,
monitors, choose Clear Type. This option you can disable this option by right clicking
improves the readability of large screen on the Taskbar, choosing Properties, and
fonts. disabling the 'Hide Inactive Icons' option.
You can specify the ones you would like to
be not hidden.
Disabling Automatic Windows Update
and System Restore Notes
There are certain services, such as To use the Group Policy snap-in, you
Windows Update and System Restore, must be logged on to the computer using
which load automatically and occupy a lot • an account that has administrator
of space. If you want to disable them, right permissions.
click on My Computer and choose
Properties. Click on the System Restore tab This method prevents programs that use
and check the box 'Turn off System the Messenger APIs from using Windows
Restore'. This will increase Windows Messenger. Microsoft Outlook 2002,
performance and save disk space. Microsoft Outlook Express 6, and the
Just next to the 'System Restore' option, •
Remote Assistance feature in Windows
you will find the 'Automatic Update' option. XP are examples of programs that use
This option will periodically ask you to these APIs and that depend on Windows
update the OS. You can go ahead and Messenger.
disable this, but remember that you will
have to update Windows manually after
To turn on the Do not allow Windows
applying this option, and there will be no
Messenger to be run option, follow these
further reminders.
steps:
Change the picture on the welcome
screen Click Start, click Run, type gpedit.msc,
1. and then click OK.
Want to add your own picture in the Startup
menu? Go to Start > Control Panel > User In Group Policy, expand Local
account and click on the user name. There Computer Policy, expand Computer
you will see an option to change the picture Configuration, expand Administrative
on the welcome screen. On clicking it, you 2. Templates, expand Windows
will see an option from which you can select Components, and then expand
the picture already present or you can Windows Messenger.
browse to the folder where you've saved
your photograph. Double-click Do not allow Windows
Messenger to be run, and then click
How to prevent Windows Messenger 3.
Enabled.
from running on a Windows XP-based
computer Click OK.
4.
Use the Group Policy (gpedit.msc) snap-in
On the File menu, click Exit to quit the
to turn on the Do not allow Windows 5.
Group Policy snap-in.
Messenger to be run option.
Monitors (CRT/LCD) 4) Why does my monitor flicker? How do I
solve it?
One of the most 'visible' piece of computer This may be due to incorrect video or
peripheral which helps you visualize what monitor drivers. Also, the refresh rate might
you are doing with your computer is the be too low; set it to 75 Hz.
Monitor. This month we answer some of the
most common queries about it, which you
may have at the back of your mind since a 5) My monitor does not reproduce colours.
long time. Check the connector-pins for any damage.
Make sure that there are no electronic
devices—speakers for example—near the
1) I see a dot on the LCD screen that is monitor. Degauss the monitor at least once
different in colour from the rest? a month. If this doesn’t work, relocate the
This dot is a dead pixel. Normally, dead display. Also, use it with another PC to
pixels emit the colour in whose mode they further isolate the problem.
get stuck, or appear black. Up to three dead
pixels are permitted when performing an
LCD quality check—more than that calls for 6) My screen is tilted? How do I correct it?
a monitor rejection. Use the onscreen-display menu to correct
the problem. If this does not help, check
whether you are using the correct version of
2) My graphics card manual says that it can the video-card driver; also, try using
go up to 1,600 x 1,200 pixels, but I can’t different resolutions. Connect the display to
select a resolution over 1,024 x 768. Why is another PC to check if the problem persists.
this so?
The native resolution supported by a 15-
inch LCD monitor is 1,024 x 768 pixels. 7) I can’t sync my monitor?
Hence, though the graphics card is capable Check whether the D-sub connector is
of delivering a resolution of 1,600 x 1,200 properly plugged in to the graphic card.
pixels, the monitor cannot do so. Also make sure that no pins in the
connector are damaged. Install the latest
graphics card drivers. This ensures a
3) I see two faint horizontal lines on my correct resolution and frequency
monitor—is this a defect? adjustment. Don’t set a refresh rate that
Monitors using the aperture-grille your card can’t support.
technology, have multiple vertical wires of
0.25 mm in diameter. Two horizontal wires
keep these vertical wires aligned. It’s the 8) Why don’t images and text appear
shadow of these that you see on the smooth on my LCD monitor?
monitor. Frankly, there’s nothing you can do You’ve chosen a resolution that distorts the
about it, since they’re an integral part of the aspect ratio, and then used the adjustment
technology. function to force-fit the screen. This makes
images and text look crooked. Always run
an LCD monitor at its native resolution as
suggested by the manufacturer.
9) My LCD monitor displays a scrolling How can I tell which digital cameras
screen. Help! allow playback through my television?
Check whether the cable is connected Not all digital cameras allow playback
properly to the video card. Use the monitor through your television. When you are
with another system. This helps you reading specifications for digital cameras
ascertain whether the fault lies with the look out for ones that have "video out"
display card or the display itself. Also, under interfaces.
remember to specify the correct resolution
and refresh rate for the monitor.
10) How do I get rid of image persistence? What is the best image manipulation
Burn-in, or image persistence, is more of a software for images taken with digital
CRT-specific problem, and is not cameras?
permanent for LCDs. Keeping the panel The market leader is Adobe Photoshop.
powered down for about 15 minutes will This remarkable piece of software will let
solve the problem. you do almost anything with an image.
Before you rush off and buy Adobe
Photoshop there are two things that you
need to consider. First it is aimed at digital
photographers who are looking for serious
Digital Cameras FAQ image manipulation. This gives Adobe
Photoshop a fairly big learning curve and
Do all digital cameras suffer from there are plenty of books and courses
shutter lag? dedicated to helping you get the most from
It is true that digital cameras do suffer from the package. Secondly it doesn't come
shutter lag. Shutter lag is the time in cheap. A guide price is £500-550.
between clicking the shutter button and the
picture actually being taken. Once the There are a couple of very good
button is pressed digital cameras get to alternatives to Adobe Photoshop for those
work setting the focus, white balance and of you who are looking for more general
exposure time. They also need to charge image manipulation. One is Adobe
up the CCD. The end result, a brief pause Photoshop's little brother Adobe Photoshop
before the picture is taken can be very Elements, priced at around £65-70. The
annoying and can prove to be the other is Paint Shop Pro which you can pick
difference between a great picture and a up for under £40. I have used this package
missed opportunity. As with most things in myself and it does everything that I've ever
the world of digital cameras shutter lag wanted to do with an image.
times are decreasing as the technology
evolves. In fact in higher spec digital Cheaper still are products like Kai's Photo
cameras shutter lag has almost been Factory. You shouldn't have to pay more
eliminated. It won't be a problem with the than £15 and it gives you some useful
majority of pictures that you take, but it is image manipulation tools.
something to be aware of.
Digital cameras seem to have lots of paying out for the printer itself. Ink refills
features that I'll never understand. They also add to the price.
must be difficult to use.
It's true that digital cameras, particularly at If you are more dedicated to your
the higher end of the market do have some photography and are looking for a higher
pretty amazing features. It is also true that standard print than is available from the
these will really only be of use to serious inkjet or bubblejet range, then you can buy
photographers who want to experiment with a dye sublimation printer. These are a clear
their digital cameras and want to learn and step up in terms of print quality, but there is
use all that their camera has to offer. Even also a clear step up to pay as well. Dye
then digital cameras come with a fully sublimation printers start off in the £400-
automatic mode that will allow you to use it 500 range.
in a similar way to a traditional point and
shoot camera. The important point to Don't forget though that using digital
remember here is that feature rich digital cameras gives a whole new slant on
cameras also cost a lot of money. If you are photography. The ability to view images on
not planning to make use of all the available your computer and television screens
features then I would suggest that you buy means that it is less important to have your
a model with a smaller feature set and save photographs printed. Therefore you are
yourself a lot of money. You will find that likely to need less prints then you would
digital cameras that are more basic in the have with traditional 35mm photography.
functionality that they offer are also more
easy to use.