Rampant Piracy on the Sea of Information - Part 2
So wondered where the other half of this article was last issue eh? Well it jumped right over to this issue! :D
Asia is left out
So wondered where the other half of this article was last issue eh? Well it jumped right over to this issue! :D
Asia is left out
After 10 plus years of being underground the Shadow Legacy has step out
of the Shadows. Hidden in our secret and secure private Chat Servers and
messages servers. Where we work to help each other solve complex software
and hardware engineering problems. Filtering our work and advancements in
Network security, Apache, FreeBSD and countless other projects through
non discript Nics and aliases. Remaining in the darkness, free from the
chatter of the wantabes, Posers, and Feds. When our darker splinter and
The 80's was definitely where it was at for technology. From MacGyver's duct
tape, to the subject of this weeks Retrolooks feature, K.I.T.T. from Knight
Rider, let us take a look back at the wonder car of the 80's and compare it to
the technological genius of Kimble's Megacar.
Here's a clip:
Wooo... we've certainly had our fair share of problems this past month. From Denial of Service attacks to routing problems, it goes without saying that I haven't been sleeping well. *grin*. But we've survived, and even managed to put in a couple of new features to the site as well... Top of the list would be the Who's Online Box as well as our redone AvantGO channel, so you can now pretty much get the headlines from our site from any wireless device, be it a Palm/WinCE machine or a WAP enabled handphone - we're right there in your face.
Okay, before I even get started with this, I know what I have to say in here is probrably going to piss quite a fair number of poeple off, but I'm
going to say it anyway. What's this going to be about you ask? Well pretty much on how the Malaysian IT industry (and the tertiary education system) is
going down the crapper and there really isn't very much anyone is willing to do about it. Or should I say it appears that there isn't anyone who actually
Who are you?
I started this series awhile back and due to distractions have not been able to follow up on it. In the last article I pointed out just how vulnerable we are to identity theft. In this article we explore just what identity means. And in the next just how others go about assuming yours. (Standard disclaimer) This is not a how-to guide as anybody with brains can either figure it out themselves or pull the information off the net. Ok now off we go…
It wasn't that long ago (about 7 years), that the scene was composed of a group of close friends. It was kept secret. To enter this world one had to personally know someone. It was close to impossible to simply stumble upon this hidden world. At that time most people didn't even know what warez or hacking was. There was no media hype, there were no publicized FBI raids ( except LoD). Only a group of people that loved computers so much that they wanted to know how everything worked.
January, 2001
Number of defacements reviewed this month: 803 (whew!)
After the first two part of the series and before I go into the details of the minimum physics you might need to know to understand the title of this article, I’d decided in this part to give you a list of subjects in physics that you should know to really understand the physics of this topic or anything else that’s involved. (See STATISTICAL PHYSICS AU NATUREL)
|This article is composed of some warez texts found on the net.|
1)What's warez
2)History
3)Warez sites
4)Warez people
4)Conclusion