Owned by,
 
                                       SS$s                      
              S$$$         as'  $$$$  SS$$$$`4  s$$$$  `$Sssss$$ 
            $SS$$       $$$$'   $$$`sS4$'`'`$4  `$$$$$$ $S$$$$ 
            SSS$$      $$$$'    $$$$$$     `$$$  $$$$$$  $$$$   
           $sS$       $$$$      $$$$  _ . s`$$    $$$$$  $$P       
            $S        s$$$      $$$$$  ` .-sS     $$$$' s$$     
            $S `ko$ok0S$$        `$$$             $$$$ s$4$       
            $S       $$$$        $$c              $$$;$$$4$     
           $$$       $$$$$      $$$$s.           $4$$$$$4$$       
           $$$      s$$$$$       $$$$s           $$$$$$4$$      
          $$$       $$$$$$$     $$$$$'         s$$$$$$$$$$        
                             ,SS$$$P         .s$$$$$$$$$$  

Courtesy of Blakboot and r0tt0 -- .....

Masses,

Note to Sysadm:
Once we heard you were heading to the server, we went to your place to party. Don't worry man, after the cat clogged the toilet, we plunged that bad boy down, and pissed on the rest of the carpet so it'd match the water mess. We felt responsible man, ya know, so we made sure everything was in order.

PS: Don't worry, we won't tell anyone about all that bondage equip.; your secret's safe with us man.

Nah, I'm just messin' with you. Hey, in fact, we backed up everyones index ;) You've got to expect a little beating, because we did out-smart you. Hey look on the bright-side! If you were in China man, they'd like casturate you, and rename you Wong-Gon or something.

THINGS TO REMEMBER:

  • Guns don't *KILL* -- China *KILLS*.
  • The universal string for exceptance in a #hack*:
    "Me s0 h0rnY ... mE hax0r f0r p0rn f0r l0ng Tim3 !"


  • "The Message"
    ===========
    Ah, yes -- now I will sum up the transition hacking has made. Long ago, there were hackers, and they'd do what it took to get their kicks, learning along the way. Those hackers mature, start to seek legitimacy but refuse to drop there "hobby," so the few looked up upon, coax the entire community to strive to look legitimate in the eyes of general public. This aristocrasy is no more than hackers turned security consultants, concerned with this process:

    Find exploit - > Publish exploit - > Patch exploit [LOOP]

    That way they get the prestiege and maintain their "legitimacy."; I have no _real_ problem with this, but if you put actual implementation of exploits down, you blow goats. -- Hacking isn't about tracking down every bug for Joe Smoes software co. -- It's about having fun for our amusement, and satisfying the need to know `What's behind this?` End point, we're having fun, maybe you should too, if you're not already.

    Shout outs:

    Mf-man, Xcavator, Kynik, Echo8, Ajax, Orbitz, and everyone at The l0pht bbs. The L0pht bbs is a great place to express your opinions, exchange information, in an objective and mature atmosphere. -- Just PLEASE, FOR FUCKS SAKE! Fixthe chat overflow, please. =] ...and of course, you. You took the time to read this far, and that shows stamina, you've got what it takes to read an HPU rant, and that's talent, be proad.


    Disclaimer: In the long tradition of hacking 'zines/messages of taking responsiblity for Jack Shit, this is our zen-like disclaimer:

    "Sorry babe, It's yo prob., 'cus I gots ta stay'a pimp." -- HPU's metaphoric disclaimer.