this post was submitted on 07 Jun 2024
327 points (99.7% liked)

196

16801 readers
3063 users here now

Be sure to follow the rule before you head out.

Rule: You must post before you leave.

^other^ ^rules^

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 172 points 7 months ago (6 children)

Being a hacker in the early days of computers must have been so fun and accessable

[–] [email protected] 56 points 7 months ago (2 children)

Leader: "Alright, while he's working on breaking into their system, we'll--"

Hacker: "I'm in."

Leader: "That fast? Did you find some zero-day to exploit?"

Hacker who just tried username "admin", password "password": "Yyyyeeeeeees?"

[–] [email protected] 26 points 7 months ago* (last edited 7 months ago)

To this day, database hacks (top 1000 most popular passwords) and reverse hacks (a few popular passwords on a few thousand accounts) still often result in successful penetrations.

The weakest security link is between chair and keyboard.

[–] [email protected] 16 points 7 months ago

I mean, technically, that is a zero-day exploit

[–] KISSmyOSFeddit 47 points 7 months ago

Until your mom grounded you for hogging the phone line.

[–] [email protected] 24 points 7 months ago

It would’ve been amazing to be part of the culture back in the days of phreaking.

[–] [email protected] 17 points 7 months ago

It was fun, indeed. People knew so little about the implications and possibilities of connecting two systems, that even if you didn’t hack anything worthwhile, it was easy to feel like a genius simply by war-dialing into another local nerd’s own Commodore 64.

[–] frankgrimeszz 8 points 7 months ago

The door was basically left wide open. You could do whatever you wanted with ease.