Saturday, November 20, 2004
Introduction
In a land far far away, in a time far gone by, long before copyright extended to software and way long before anti-reverse engineering and anti-hacking laws existed, a group of college students were busy dissecting software programs and viruses and probing security and other things boys are apt to do at such age. These are thier stories.
Much has changed in computer technology since then, particularly in the field of security and I personally wouldn't try any of this stuff in real life. Many of these activities may have been outlawed in your country in recent years.
This blog is likely to be full of technical details interleaved with stories from thier life. Some readers would skip one or the other.
I will try to keep everything close to the truth as possible as far as memory serves me.
Much has changed in computer technology since then, particularly in the field of security and I personally wouldn't try any of this stuff in real life. Many of these activities may have been outlawed in your country in recent years.
This blog is likely to be full of technical details interleaved with stories from thier life. Some readers would skip one or the other.
I will try to keep everything close to the truth as possible as far as memory serves me.
Subscribe to Comments [Atom]
