"Hugo Cornwall "The Hacker's handbook"" - читать интересную книгу автораusing packet-switching. All the computer communications so far
described have taken place either on the phone (voice-grade) network or on the telex network. In Chapter 7 we will look at packet-switching and the opportunities offered by international data networks. We must now specify hackers' equipment in more detail. CHAPTER 3 Hackers' Equipment You can hack with almost any microcomputer capable of talking to the outside world via a serial port and a modem. In fact, you don't even need a micro; my first hack was with a perfectly ordinary viewdata terminal. hat follows in this chapter, therefore, is a description of the elements of a system I like to think of as optimum for straight-forward asynchronous ASCII and Baudot communications. What is at issue is convenience as much as anything. With kit like this, you will be able to get through most dial-up ports and into packet-switching through a PAD -- a packet assembler/ disassembler port. (It will not get you into IBM networks, because these use different and incompatible protocols; we will return to the matter of the IBM world in chapter 10.) In other words, given a bit of money, a bit of knowledge, a bit of help from friends and a bit of luck, what is described here is the sort of equipment most hackers have at their ou will find few products on the market labelled 'for hackers'; you must select those items that appear to have 'legitimate' but interesting functions and see if they can be bent to the hacker's purposes. The various sections within this chapter highlight the sort of facilities you need; before lashing out on some new software or hardware, try to get hold of as much publicity and documentation material as possible to see how adaptable the products are. In a few cases, it is worth looking at the second-hand market, particularly for modems, cables and test equipment. lthough it is by no means essential, an ability to solder a few connections and scrabble among the circuit diagrams of 'official' products often yield unexpectedly rewarding results. The Cmputer lmost any popular microcomputer will do; hacking does not call upon enormous reserves of computer power. Nearly everything you hack will come to you in alphanumeric form, not graphics. The computer you already have will almost certainly have the essential qualities. However the very cheapest micros, like the ZX81, whilst usable, require much more work on the part of the operator/hacker, and give him far less in the way of instant facilities. (In fact, as the ZX81 doesn't use ASCII internally, but a Sinclair-developed variant; you will need a software or firmware fix |
|
|