<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-4028225153763374348</atom:id><lastBuildDate>Tue, 17 Dec 2024 11:32:06 +0000</lastBuildDate><category>1986</category><category>Hack</category><category>Hacker</category><category>Mentor</category><category>RSS</category><category>Technobabble</category><category>The Hacker Manifesto</category><category>The Mentor</category><category>autoblog</category><category>autoblogger</category><category>autoblogging</category><category>blackhat</category><category>blog</category><category>blogger</category><category>profit</category><title>Underground News</title><description>Here at Underground News you will find news on anything and everything regarding the electronic news.</description><link>http://theundergroundnewsnetwork.blogspot.com/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>5</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4028225153763374348.post-4161200618746766632</guid><pubDate>Sun, 04 Jul 2010 04:34:00 +0000</pubDate><atom:updated>2010-08-01T15:03:23.777+00:00</atom:updated><title>7/4 The Professional Security Testers Warehouse for the GPEN GSEC GCIH GREM CEH QISP Q/ISP OPST CPTS</title><description>&lt;span style=&quot;margin: 0pt; padding: 0pt;&quot;&gt;&lt;a href=&quot;http://www.professionalsecuritytesters.org/modules.php?name=News&amp;amp;file=article&amp;amp;sid=1193&quot; style=&quot;color: #011c9f; font-size: 20px; font-weight: bold; line-height: 23px; margin: 0pt; padding: 0pt; text-decoration: none;&quot;&gt;1st Open Backdoor Hiding &amp;amp; Finding Contest to be held at DEFCON 0x12&lt;/a&gt;&lt;/span&gt; &lt;br /&gt;
&lt;span style=&quot;color: #666666; font-size: 11px; margin: 5px 0pt 0pt; padding: 0pt;&quot;&gt;July 3, 2010 at 9:23 AM&lt;/span&gt;&lt;br /&gt;
The CoreTex Team from Core Security is happy to announce the *1st Open Backdoor Hiding &amp;amp; Finding Contest* to be held at DEFCON 0x12 this year!&lt;br /&gt;
&lt;br /&gt;
Hiding a backdoor in open source code that will be subjected to the scrutiny of security auditors by the hundredths may not be an easy task.  Positively and unequivocally identifying a cleverly hidden backdoor may be extremely difficult as well.&lt;br /&gt;
&lt;br /&gt;
But doing both things at DEFCON 0x12 could be a lot of fun!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you liked to read about the exploits of C. Auguste Dupin, the devious Minister D. or even the n00b Prefect Monsieur G. [*] here&#39;s a chance to role-play all of them at DEFCON using your favorite coding and code auditing techniques.&lt;br /&gt;
&lt;br /&gt;
Registration is now open at &lt;b&gt;&lt;a href=&quot;http://www.backdoorhiding.com/&quot;&gt;http://www.backdoorhiding.com&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Questions, feedback, comments and general discussion at: &lt;b&gt;&lt;a href=&quot;https://forum.defcon.org/forumdisplay.php?f=520&quot;&gt;https://forum.defcon.org/forumdisplay.php?f=520&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Here are the details:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Quick intro&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Two in one Backdoor Hiding/Finding Contest (participate in either or both): In the first stage, hiding participants provide a source code hiding a backdoor, in the second stage organizers mix the source codes with non-backdoored (placebos), and then ask finding participants to spot the placebos. Hiding participants get hiding points for being voted as a placebo and finding participants get points for spotting the placebos and negative points for false positives.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Contest Description&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The contest includes two games: a backdoor hiding and a backdoor finding contest which are played simultaneously. The contest will be played in two rounds: a qualification round that starts before the conference and ends during the conference, and a second (smaller and shorter) round during the conference. Each round is a multi-player game, which is played in two stages. The timeline is included below.&lt;br /&gt;
&lt;br /&gt;
Prizes will be announced shortly. We will give prizes for all those that get to the qualification round and special prizes for the winners of each contest.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
Qualification round&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Stage 1 (hiding): All participants registered for the backdoor hiding game are given a set of requirements for a software program. Before the deadline, they must submit the source code for a program that fulfills these requirements plus includes a backdoor. They must also send a description explaining how to exploit the backdoor.&lt;br /&gt;
&lt;br /&gt;
Stage 2 (finding): There is new time to register for the backdoor finding game. All players registered are given a bundle with the different pieces of source code. To each bundle the organizers will add a few placebos (source codes that fulfill the requirements but should not include a backdoor). Before a deadline, the players must answer for each source code if they believe it includes a backdoor or not.&lt;br /&gt;
&lt;br /&gt;
The winners of each game are the ones that accumulate the most points. There is a table for computing points (which can be positive or negative) for the finding contest (X points if it was voted as backdoor and had a backdoor, Y points if it was voted as backdoor and hadn’t a backdoor, etc.).&lt;br /&gt;
&lt;br /&gt;
For the hiding contest, it’s simpler: each time one player’s source code was voted as non-backdoored, the player is given 1 point. The first participants of the backdoor hiding contest with the most points qualify for the second round.&lt;br /&gt;
&lt;br /&gt;
Same with the finding contest.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Final Round&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Stage 1: We provide a source code in C/C++ and describe the requirements it fulfills to all the players. We then describe an additional requirement, and players must write a patch to this source code such that all of the requirements are fulfilled and a backdoor is hidden in the code. They must also provide an explanation on how to use the backdoor.&lt;br /&gt;
&lt;br /&gt;
Stage 2: Again, the organizers will add a few patches/source codes that fulfill the requirements but do not have backdoors. A jury composed of the winners of the hiding contest (1st stage), a small set of well-known security experts and the players of stage 1 (round 2) have 3 hours to cast their votes for each source code if it hides or does not hide a backdoor. Points are computed according to the same strategy as in the first round.&lt;br /&gt;
&lt;br /&gt;
The contest is not restricted to any particular programming language.  However, it is part of the instructions that the “work” was commissioned by a government that needs this software and will audit it. Hence, most players will stay away from non-mainstream programming languages since the non-backdoored programs will most probably be developed in C, C++, etc.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
Timeline&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
-July 1, we open registration.&lt;br /&gt;
-July 19th, we open the 1st stage of the qualification round.  Participants are allowed to register until before the July 29 deadline.&lt;br /&gt;
-Thursday July 29, 0hs, we stop receiving source codes. Registration for 2nd stage of the first round continues.&lt;br /&gt;
-Friday July 30th, 0hs, we open the 2nd stage of the qualification round: users are allowed to download the source code bundles; the site accepts votes (YES/NO)&lt;br /&gt;
-Saturday July 31st, 12hs, Registration and voting are closed. Shortly, we announce first round winners of the backdoor-hiding and backdoor-finding contests.&lt;br /&gt;
-Saturday July 31st, 16hs, we start the second (and final) round which will last less than two hours. Players have some time to write a patch for a given source code and include a backdoor.&lt;br /&gt;
-Saturday July 31st, 17:30hs, The eminence jury members (3-5 members, TBD), winners of the backdoor-hiding qualification round and the winners of the backdoor-finding qualification round are allowed to vote for the final round winner. They have 30 minutes.&lt;br /&gt;
-Sunday 1, 14hs. Winners are announced and prizes delivered in the DefCon Awards Ceremony.&lt;br /&gt;
&lt;br /&gt;
Register now, have fun and see you at DEFCON-0x12 !&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[*] C. Auguste Dupin, Minister D. and Monsieur G. are characters from the 1845 tale &quot;The Purloined Letter&quot; by Edgar Allan Poe&lt;br /&gt;
--&lt;br /&gt;
ariel, andres, Damian Saura, futo, ivan  &amp;amp; pedro&lt;br /&gt;
&lt;br /&gt;
The CoreTex team at Core Security Technologies</description><link>http://theundergroundnewsnetwork.blogspot.com/2010/07/74-professional-security-testers.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4028225153763374348.post-6476900887952382800</guid><pubDate>Sun, 27 Dec 2009 00:10:00 +0000</pubDate><atom:updated>2009-12-27T00:14:38.874+00:00</atom:updated><title>12/26 The Professional Security Testers Warehouse for the CEH GPEN QISP Q/ISP OPST CPTS</title><description>&lt;table border=&quot;0&quot; cellpadding=&quot;15&quot; cellspacing=&quot;0&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;     &lt;td style=&quot;padding: 15px;&quot;&gt;&lt;table border=&quot;0&quot; cellpadding=&quot;8&quot; cellspacing=&quot;0&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;           &lt;td align=&quot;center&quot; style=&quot;padding: 8px;&quot;&gt;&lt;br /&gt;
&lt;/td&gt;         &lt;/tr&gt;
&lt;tr&gt;           &lt;td style=&quot;padding: 8px;&quot;&gt;I just saw this in my RSS feed and thought I would pass it along.&amp;nbsp; I have never been to CarolinaCon, but I have heard mostly good things about it and I am sure it would be a great opportunity for anyone looking to give presentations about hacking.&amp;nbsp;&lt;br /&gt;
&lt;/td&gt;         &lt;/tr&gt;
&lt;tr&gt;           &lt;td style=&quot;padding: 8px;&quot;&gt;&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot;&gt;&lt;tbody&gt;
&lt;tr&gt; &lt;/tr&gt;
&lt;tr&gt;                 &lt;td height=&quot;20&quot;&gt;&lt;hr noshade=&quot;noshade&quot; size=&quot;1&quot; style=&quot;margin: 0pt; padding: 0pt;&quot; width=&quot;100%&quot; /&gt;&lt;/td&gt;               &lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;margin: 0pt; padding: 0pt;&quot;&gt;&lt;a href=&quot;http://www.professionalsecuritytesters.org/modules.php?name=News&amp;amp;file=article&amp;amp;sid=1098&quot; style=&quot;color: #011c9f; font-size: 20px; font-weight: bold; line-height: 23px; margin: 0pt; padding: 0pt; text-decoration: none;&quot;&gt;                   CarolinaCon Call for Paper                  &lt;/a&gt;&lt;/span&gt; &lt;br /&gt;
&lt;span style=&quot;color: #666666; font-size: 11px; margin: 5px 0pt 0pt; padding: 0pt;&quot;&gt;                   December 25, 2009 at 12:53 pm                  &lt;/span&gt;&lt;br /&gt;
&lt;/td&gt;               &lt;/tr&gt;
&lt;tr&gt;                 &lt;td height=&quot;20&quot;&gt;&lt;hr noshade=&quot;noshade&quot; size=&quot;1&quot; style=&quot;margin: 0pt; padding: 0pt;&quot; width=&quot;100%&quot; /&gt;&lt;/td&gt;               &lt;/tr&gt;
&lt;tr&gt;                 &lt;td class=&quot;content&quot;&gt;CarolinaCon is now accepting speaker/paper/demo submissions for its 6th annual event in March 2010!!!&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
What is this &quot;CarolinaCon&quot;?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
CarolinaCon is an annual Technology Conference whose mission/purpose is to:&lt;br /&gt;
&lt;br /&gt;
- Enhance local and global awareness of current technology issues and developments,&lt;br /&gt;
&lt;br /&gt;
- Provide affordable technology education sessions to the unwashed masses,&lt;br /&gt;
&lt;br /&gt;
- Deliver varied/informative/interesting presentations on a wide variety&amp;nbsp; of InfoSec/hacking/technology/science topics, and&lt;br /&gt;
&lt;div&gt;- Mix in enough entertainment and side contests/challenges to make for a truly fun event&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
When/Where is CarolinaCon?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
This year&#39;s event will be held on the weekend of March 19th-21st, 2010.&lt;br /&gt;
&lt;br /&gt;
The event will mostly occur at a Holiday Inn in Raleigh, NC. &amp;nbsp;Raleigh is about 30 minutes from Durham, Chapel Hill, and Research Triangle Park.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
Who develops/delivers CarolinaCon?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
CarolinaCon is proudly brought to you by &quot;The CarolinaCon Group&quot;.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
The CarolinaCon Group is a non-profit organization registered in the state of NC, dedicated to educating the local and global communities about technology, information/network/computer security, and&amp;nbsp; information rights.&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;The CarolinaCon Group is also closely associated with various &quot;2600&quot; chapters across NC, SC, TN, VA, LA, DC, and NY. &amp;nbsp;Many of the volunteers who help develop and deliver CarolinaCon come from those chapters.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;What events will be at CarolinaCon?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
CarolinaCon is mainly about the talks/presentations/demos. &amp;nbsp;Alongside of those we&#39;ll surely have several other technology-related contests/challenges, as we&#39;ve had in past years. &amp;nbsp;Details on other events will be announced soon.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
Who will be presenting which topics this year?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
That&#39;s where YOU possibly come in. &amp;nbsp;If you are somewhat knowledgeable in some interesting field of technology, hacking, science, etc., and are interested in speaking/presenting at CarolinaCon, we invite you to submit your proposal (in brief) for our review. &amp;nbsp;If you&#39;re interested in presenting please send;&lt;br /&gt;
&lt;br /&gt;
- your name or handle,&lt;br /&gt;
- the topic/presentation name,&lt;br /&gt;
- estimated time-length of presentation, and&lt;br /&gt;
- a brief topic abstract&lt;br /&gt;
....via e-mail to:&lt;br /&gt;
speakers  &lt;a href=&quot;http://carolinacon.org/&quot;&gt;carolinacon.org&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;*NOTE: &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
All submissions are due BY January 29, 2010! &amp;nbsp;Please be timely in submission if you&#39;re committed to being part of the elite cadre of presenters. &amp;nbsp;We value diversity, so please don&#39;t hesitate to propose&lt;br /&gt;
your ideas no matter how outlandish.&lt;br /&gt;
&lt;br /&gt;
If you speak at the Con, you will receive;&lt;br /&gt;
&lt;br /&gt;
- free Con admission for you and one guest,&lt;br /&gt;
- a free Con t-shirt,&lt;br /&gt;
- minimal fame, glory, and possibly notoriety, and&lt;br /&gt;
- mad props from our staff and attendees&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
I&#39;m excited and I want to present! &amp;nbsp;What do I do know?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
If you&#39;re interested in speaking, send the 411 requested to:&lt;br /&gt;
speakers  &lt;a href=&quot;http://carolinacon.org/&quot;&gt;carolinacon.org&lt;/a&gt;&lt;br /&gt;
(BY/BEFORE January 29th 2010)&lt;br /&gt;
&lt;br /&gt;
And if you&#39;re interested in attending, watch this space for more details:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.carolinacon.org/&quot;&gt;www.carolinacon.org&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
...and don&#39;t forget to mark the dates on your calendar!&lt;br /&gt;
&lt;br /&gt;
Peace,&lt;br /&gt;
&lt;br /&gt;
Vic&lt;br /&gt;
&lt;/div&gt;&lt;/td&gt;               &lt;/tr&gt;
&lt;tr&gt;                 &lt;td height=&quot;25&quot;&gt;&lt;br /&gt;
&lt;/td&gt;               &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;img src=&quot;http://www.feedmyinbox.com/messages/read/8197802/2055d52a43ba71babe698cb68c69b0ff46221b13/&quot; /&gt;                       &lt;br /&gt;
&lt;/td&gt;         &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/td&gt;   &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;</description><link>http://theundergroundnewsnetwork.blogspot.com/2009/12/1226-professional-security-testers.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4028225153763374348.post-4473156815147692876</guid><pubDate>Sun, 20 Dec 2009 18:50:00 +0000</pubDate><atom:updated>2009-12-20T18:50:11.050+00:00</atom:updated><title>Hacker Shows</title><description>As internet connections become faster, video cameras become cheaper, and streaming video sites go even more mainstream&amp;nbsp;a growing number of people are turning to the internet to broadcast low budget shows.&amp;nbsp; Unlike television, where budgets for even a news broadcast run in the thousands of dollars,&amp;nbsp;these low cost shows&amp;nbsp;usually&amp;nbsp;cost&amp;nbsp;well under 1000&amp;nbsp;dollars&amp;nbsp;an episode (some costing nothing at all).&amp;nbsp; Due to these low costs it is now possible for many more niche shows to be created, one of these niches being hacker shows.&amp;nbsp; &lt;br /&gt;
Two of my favorite hacker shows would have to be &lt;a href=&quot;http://www.hak5.org/&quot;&gt;Hak5&lt;/a&gt;&amp;nbsp;and The &lt;a href=&quot;http://www.hackernews.com/&quot;&gt;Hacker News Network&lt;/a&gt;.&amp;nbsp; Hak5 is a show based on the technical side of hacking.&amp;nbsp; Not all of the hacks will be things which you&#39;re interested in doing, but&amp;nbsp;many of them are pretty cool, and cost nothing to try out, such as installing Doom on a zipit (zipits cost 50 dollars by the way), installing an operating system onto a USB, or rooting a droid.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Hacker News Network is a show based&amp;nbsp;more on computer security.&amp;nbsp; Reporting on topics&amp;nbsp;such as arrests in the scene, new exploits (they don&#39;t show you how to use them), the spread of worms, viruses and trojans, and the inefficiency of the computer security sector in general.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
If anyone reading this&amp;nbsp;knows of any&amp;nbsp;other good hacker shows&amp;nbsp;feel free to&amp;nbsp;post a link in the comments section of this article.&amp;nbsp; I am always looking for better ways to waste my time, learning is just a byproduct.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;</description><link>http://theundergroundnewsnetwork.blogspot.com/2009/12/hacker-shows.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4028225153763374348.post-1092738880063153619</guid><pubDate>Sat, 12 Dec 2009 05:10:00 +0000</pubDate><atom:updated>2009-12-14T01:37:36.376+00:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">autoblog</category><category domain="http://www.blogger.com/atom/ns#">autoblogger</category><category domain="http://www.blogger.com/atom/ns#">autoblogging</category><category domain="http://www.blogger.com/atom/ns#">blackhat</category><category domain="http://www.blogger.com/atom/ns#">blog</category><category domain="http://www.blogger.com/atom/ns#">blogger</category><category domain="http://www.blogger.com/atom/ns#">profit</category><category domain="http://www.blogger.com/atom/ns#">RSS</category><title>AutoBlogging</title><description>&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Yesterday as I was surfing the internet I stumbled upon a forum used mainly by blackhats&amp;nbsp;to discuss the newest methods in profiting&amp;nbsp;via websites and blogs.&amp;nbsp; Many of these methods I have know about for a long time, such as&amp;nbsp;cookie stuffing,&amp;nbsp;spamming forums, fake traffic, etc.&amp;nbsp; One method which caught me by surprise was autoblogging (there were others by the way).&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Autoblogging is basically using a RSS feed to publish content from&amp;nbsp;one&amp;nbsp;blog&amp;nbsp;onto a different&amp;nbsp;blog.&amp;nbsp; The whole process&amp;nbsp;is automated&amp;nbsp;meaning after set up, assuming you&amp;nbsp;set it up right,&amp;nbsp;a blog will be provided with quality articles and cost&amp;nbsp;the operator&amp;nbsp;nothing in time or money.&amp;nbsp;&amp;nbsp; Used correctly&amp;nbsp;autoblogging seems like an easy&amp;nbsp;way to inhance your blog, while promoting another bloggers&amp;nbsp;blog. The problem is a lot of blackhats have taken to finding a nitch markets, setting up an&amp;nbsp;autoblogger, using blackhat tactics to promote their blog, and then moving on to&amp;nbsp;create another blog.&amp;nbsp; Usually these blogs, due to the ways they are promoted, will&amp;nbsp;recieve more traffic then the blogs whose articles they are using, and often times they&amp;nbsp;provide very few, if any, links to the blogs which they recieve there articles from.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; After read&amp;nbsp;up on&amp;nbsp;autoblogging and hearing about the hundereds of dollars per day blackhats make using it I&amp;nbsp;decided to try it out for myself.&amp;nbsp;&amp;nbsp;First however I&amp;nbsp;wanted to&amp;nbsp;lay down a few ground rules for myself.&amp;nbsp;&amp;nbsp;The first being that autoblogging&amp;nbsp;would not be used to&amp;nbsp;supply&amp;nbsp;my blogs with 100% of their content.&amp;nbsp; Secondly any autoblogging which was done would have&amp;nbsp;some sort of&amp;nbsp;link back to the blog which I got&amp;nbsp;the articles&amp;nbsp;from and finally&amp;nbsp;I decided that I would not use&amp;nbsp;everything&amp;nbsp;which&amp;nbsp;was gotten from&amp;nbsp;other blogs RSS feeds.&amp;nbsp; With these rules in place I&amp;nbsp;feel I can consinously use autoblogging to add content to my blog,&amp;nbsp;and at the same time supply&amp;nbsp;other blogs with more&amp;nbsp;viewers.&amp;nbsp; Legality wise there have been no&amp;nbsp;copyright cases&amp;nbsp;involving autoblogging, so&amp;nbsp;I decided to just accept the general consenus that it&amp;nbsp;is legal (even in many of the cases where autoblogging supplies a site with 100% of the content).&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Once you have figured out how&amp;nbsp;you feel morally about autoblogging it is time to get down to business.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;First&lt;/strong&gt;:&amp;nbsp; Start a blog on blogger.com (This method of autoblogging is blogger based).&lt;br /&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;&lt;strong&gt;Second:&amp;nbsp; &lt;/strong&gt;Go to the settings section on blogger, then look&amp;nbsp;under Email &amp;amp; Mobile for the Posting Options.&amp;nbsp; Once you&#39;re here enter your&amp;nbsp;secret&amp;nbsp;word (this is to make sure no one can spam you site with articles).&amp;nbsp; Next select when you want your e-mails to be published, you can either do it right when they are recieved or they can be saved as drafts&amp;nbsp;which you&amp;nbsp;can post, by hand,&amp;nbsp;later.&amp;nbsp; I decided to send everything to my drafts section, because this allows me to publish only the articles I&amp;nbsp;feel apply to my readers.&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9uUJQ8jVweyLwKPZCmRhzG9W_KRREARTGWPhMFQrxD1slmTamUxe33XQNZwdAUPpvO8H-lCNiZEp6VZjLMvbGGLn99KMhWYV3cE21iWEWKsIKiQzQJhJav29Pxzcv0p3HwryRkCk9Vug/s1600-h/autoblogger.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; ps=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9uUJQ8jVweyLwKPZCmRhzG9W_KRREARTGWPhMFQrxD1slmTamUxe33XQNZwdAUPpvO8H-lCNiZEp6VZjLMvbGGLn99KMhWYV3cE21iWEWKsIKiQzQJhJav29Pxzcv0p3HwryRkCk9Vug/s320/autoblogger.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Third:&amp;nbsp; &lt;/strong&gt;Find the blog which you want to get your articles from, and then use a service like &lt;a href=&quot;http://www.feedmyinbox.com/&quot;&gt;Feed My Inbox&lt;/a&gt; to e-mail the blog to your e-mail.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMP1eDP2nNuHwpY7J0PG3aUsNc8KSDeq9bQLOqa4QZf5c2DYJLwPnYRXsq5v7dof8ukOL2mnA6PGn2A4CjNIAJr_SdG_r98lREO9OyhRm7wU1Xe3q83oCIo-13fjSLnGMU7jyfX41RECM/s1600-h/autoblogger2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; ps=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMP1eDP2nNuHwpY7J0PG3aUsNc8KSDeq9bQLOqa4QZf5c2DYJLwPnYRXsq5v7dof8ukOL2mnA6PGn2A4CjNIAJr_SdG_r98lREO9OyhRm7wU1Xe3q83oCIo-13fjSLnGMU7jyfX41RECM/s320/autoblogger2.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;strong&gt;Fourth&lt;/strong&gt;:&amp;nbsp; Set up your e-mail to forward any messages from Feed My Inbox to your blogger address and your ready to go.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; clear: both; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://theundergroundnewsnetwork.blogspot.com/2009/12/autoblogging.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9uUJQ8jVweyLwKPZCmRhzG9W_KRREARTGWPhMFQrxD1slmTamUxe33XQNZwdAUPpvO8H-lCNiZEp6VZjLMvbGGLn99KMhWYV3cE21iWEWKsIKiQzQJhJav29Pxzcv0p3HwryRkCk9Vug/s72-c/autoblogger.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4028225153763374348.post-948474630737582309</guid><pubDate>Wed, 09 Dec 2009 01:45:00 +0000</pubDate><atom:updated>2009-12-14T01:38:30.239+00:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">1986</category><category domain="http://www.blogger.com/atom/ns#">Hack</category><category domain="http://www.blogger.com/atom/ns#">Hacker</category><category domain="http://www.blogger.com/atom/ns#">Mentor</category><category domain="http://www.blogger.com/atom/ns#">Technobabble</category><category domain="http://www.blogger.com/atom/ns#">The Hacker Manifesto</category><category domain="http://www.blogger.com/atom/ns#">The Mentor</category><title>The Hacker Manifesto</title><description>&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;The Hacker Manifesto&amp;nbsp;is a piece of hacker litature which has influenced generations of hackers.&amp;nbsp;&amp;nbsp;I stumbled upon it back in the&amp;nbsp;late 90s when I was first starting to get into hacking.&amp;nbsp; Back then&amp;nbsp;The Hacker&amp;nbsp;Manifesto described me perfectly.&amp;nbsp;&amp;nbsp;Reading&amp;nbsp;this manifesto&amp;nbsp;was&amp;nbsp;my moment of clarity,&amp;nbsp;the point at which I&amp;nbsp;relized that&amp;nbsp;the hacking community was where I belonged.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; It has been&amp;nbsp;roughly 10 years since I began hacking, and&amp;nbsp;I&amp;nbsp;no longer walk the halls of my junior high or high school,&amp;nbsp;but&amp;nbsp;the&amp;nbsp;overall message of the&amp;nbsp;manifesto still applies.&amp;nbsp; If you have not stumbled upon&amp;nbsp;The Hacker Manifesto&amp;nbsp;I&amp;nbsp;would like to&amp;nbsp;introduce you to one of the greatest peices of hacker litature in existance, enjoy!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;&lt;span style=&quot;font-size: large;&quot;&gt;The Hacker Manifesto&lt;/span&gt;&lt;/strong&gt; &lt;br /&gt;
by +++The Mentor+++&lt;br /&gt;
Written January 8, 1986&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Another one got caught today, it&#39;s all over the papers. &quot;Teenager Arrested in Computer Crime Scandal&quot;, &quot;Hacker Arrested after Bank Tampering&quot;...&lt;br /&gt;
&lt;br /&gt;
Damn kids. They&#39;re all alike.&lt;br /&gt;
&lt;br /&gt;
But did you, in your three-piece psychology and 1950&#39;s technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him?&lt;br /&gt;
&lt;br /&gt;
I am a hacker, enter my world...&lt;br /&gt;
&lt;br /&gt;
Mine is a world that begins with school... I&#39;m smarter than most of the other kids, this crap they teach us bores me...&lt;br /&gt;
&lt;br /&gt;
Damn underachiever. They&#39;re all alike.&lt;br /&gt;
&lt;br /&gt;
I&#39;m in junior high or high school. I&#39;ve listened to teachers explain for the fifteenth time how to reduce a fraction. I understand it. &quot;No, Ms. Smith, I didn&#39;t show my work. I did it in my head...&quot;&lt;br /&gt;
&lt;br /&gt;
Damn kid. Probably copied it. They&#39;re all alike.&lt;br /&gt;
&lt;br /&gt;
I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it&#39;s because I screwed it up. Not because it doesn&#39;t like me... Or feels threatened by me.. Or thinks I&#39;m a smart ass.. Or doesn&#39;t like teaching and shouldn&#39;t be here...&lt;br /&gt;
&lt;br /&gt;
Damn kid. All he does is play games. They&#39;re all alike.&lt;br /&gt;
&lt;br /&gt;
And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict&#39;s veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found. &quot;This is it... this is where I belong...&quot; I know everyone here... even if I&#39;ve never met them, never talked to them, may never hear from them again... I know you all...&lt;br /&gt;
&lt;br /&gt;
Damn kid. Tying up the phone line again. They&#39;re all alike...&lt;br /&gt;
&lt;br /&gt;
You bet your ass we&#39;re all alike... we&#39;ve been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. We&#39;ve been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us willing pupils, but those few are like drops of water in the desert. &lt;br /&gt;
&lt;br /&gt;
This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn&#39;t run by profiteering gluttons, and you call us criminals. We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it&#39;s for our own good, yet we&#39;re the criminals.&lt;br /&gt;
&lt;br /&gt;
Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for.&lt;br /&gt;
&lt;br /&gt;
I am a hacker, and this is my manifesto. You may stop this individual, but you can&#39;t stop us all... after all, we&#39;re all alike.</description><link>http://theundergroundnewsnetwork.blogspot.com/2009/12/hacker-manifesto.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item></channel></rss>