Jump To: Google | Google Scholar | Library | Gmail | Hotmail | GT Mail | GT Sav Mail | Comcast | Myspace | Facebook |

Lane Thames

Contact Information:
210 Technology Circle
Savannah, GA 31407


A general note on the term "Hacking." The nomenclature in the Information Technology field is mixed when one speaks about computer attacks and other malicious computer activity. Some schools of thought refer to malicious computer behaviour as "hacking" and others refer to it as "cracking." Terms such as white-hat and black-hat are also used. Malicious users are normally labeled as black-hats, and computer security professionals are normally labeled as white-hats. Regarding hacker versus cracker, I prefer to use hacker as an equivalent to white-hat and cracker as an equivalent to black-hat. Therefore, I consider myself to be a HACKER. In order to be an expert in the art of hacking and defending against malicious activity, one must understand the behaviour of the opponent. One can't defeat his opponents without practice and knowledge of the game. This is where the principle of security via obscurity becomes a bit blurry. To this end, I justify publishing the information below. The links provided below are intended to only be used for white-hat security research purposes. There is a Russian Proverb that is used by security experts: "TRUST, BUT VERIFY". Some of the links below will point you to code that can be used in very malicious ways (DoS, gaining remote and/or local root access, worms, viruses, etc). So, "HACK, BUT DON'T CRACK" when you use these links!