"Hugo Cornwall "The Hacker's handbook"" - читать интересную книгу автора

using packet-switching. All the computer communications so far
described have taken place either on the phone (voice-grade) network
or on the telex network.
In Chapter 7 we will look at packet-switching and the
opportunities offered by international data networks. We must now
specify hackers' equipment in more detail.

CHAPTER 3
Hackers' Equipment

You can hack with almost any microcomputer capable of talking to
the outside world via a serial port and a modem. In fact, you don't
even need a micro; my first hack was with a perfectly ordinary
viewdata terminal.
hat follows in this chapter, therefore, is a description of the
elements of a system I like to think of as optimum for
straight-forward asynchronous ASCII and Baudot communications. What
is at issue is convenience as much as anything. With kit like this,
you will be able to get through most dial-up ports and into
packet-switching through a PAD -- a packet assembler/ disassembler
port. (It will not get you into IBM networks, because these use
different and incompatible protocols; we will return to the matter of
the IBM world in chapter 10.) In other words, given a bit of money, a
bit of knowledge, a bit of help from friends and a bit of luck, what
is described here is the sort of equipment most hackers have at their
command.
ou will find few products on the market labelled 'for hackers';
you must select those items that appear to have 'legitimate' but
interesting functions and see if they can be bent to the hacker's
purposes. The various sections within this chapter highlight the sort
of facilities you need; before lashing out on some new software or
hardware, try to get hold of as much publicity and documentation
material as possible to see how adaptable the products are. In a few
cases, it is worth looking at the second-hand market, particularly
for modems, cables and test equipment.
lthough it is by no means essential, an ability to solder a few
connections and scrabble among the circuit diagrams of 'official'
products often yield unexpectedly rewarding results.

The Cmputer

lmost any popular microcomputer will do; hacking does not call
upon enormous reserves of computer power. Nearly everything you hack
will come to you in alphanumeric form, not graphics. The computer
you already have will almost certainly have the essential qualities.
However the very cheapest micros, like the ZX81, whilst usable,
require much more work on the part of the operator/hacker, and give
him far less in the way of instant facilities.
(In fact, as the ZX81 doesn't use ASCII internally, but a
Sinclair-developed variant; you will need a software or firmware fix