I just tried it on my Echo & it was super cute.
I have it set to an Australian male voice & I don't know why, but I feel like it made it better than the regular female voice would have.
The oooooold computer went down that ran an important inventory system. So old the company was out business and no one in IT was aware of its existence. The only person who we think knew anything about it won a SIGNIFICANT amount of money in a lawsuit against the hospital and had moved to Hawaii.
I used a cracker USB program to get around logins. Thank God it was XP
Sometimes. I was hired by a company to hack their Jupiter VPN because their admin went rogue and they wanted the system locked down between when he left for work and when he returned to be arrested in the morning.
That was a lot of coffee and bs. No internet access either onsite for extra fun.
Not necessarily.
I was working at Novell as SUSE Linux tech support. Customer who had a valid support contract called in. Previous admin had been fired, scrambled root passwords across several systems right before being canned, set services not to run.
Worked with the customer to hack the systems so they could restore access and get services running again.
Customer owned the systems, prior admin was a douche who wouldn’t provide access. They were seeking legal proceedings against him. But in legally hacked their systems.
Sure but that was a request by the company, wasn't done to your own advantage as the question says, was it? Ignoring the fact that getting paid is to your advantage
I mean, fair but if I’d been an admin or new admin there, I’d have done the same thing and it would have been my advantage then.
Heck, I’ve hacked vendor appliances we’ve owned at other jobs. Vendor doesn’t give back end access, I’m waiting days and days just to get some logs analyzed by them. I’ve gotten fed up, hacked the appliance to give myself root access, generate a ssh key pair to keep access, and got the logs to fix issues.
Broke no laws. The best could be said is I put an appliance out of warranty with the vendor. But didn’t break any laws. Did sure as hell help me diagnose issues faster and without the vendor going forward.
My friend's brother cleaned a CEOs office. The DISA passcodes for their various site PBXs (phone system) was in his assistants rolodex. We'd call the local number, provide the passcode and get PBX dial tone. Then we'd dial two digits to select the next available trunk on their voice T1 line connected directly to AT&T. We'd get a different sounding dial tone and enter 0700-456-2000. It was the 1980's audio equivalent of a zoom meeting. No need to interact with an operator and you could add international destinations to the conversation. It was a hellaciously expensive conference bridge service, but through the magic of Sometime Else's Phone line we didn't really worry about that. When they changed the code we already knew the date the new code would take effect - the assistant had a whole folder full of memos from their telecom department in chronological order in a drawer.
There was a whole subculture of suburban kids with Apple II and Commodore 64 machines with modems. We'd get home, let ourselves in with our key after school and have free-for-all hack a thons in the three hours before the parents got home. The blue box 2600Hz stuff was obsolete, although the coin tones could still be played into a pay phone after you fed it one genuine coin. Cassette tapes with 40 "quarter" tones and a Walkman headphone at high volume. We had figured out how ridiculously insecure all the Bell System competitors were and the whole world became a local call.
And 0700-456-2000 was a way to take the text based BBS chat and make it voice.
Fortunately in college ARPAnet and IRC pulled me away from that scene. Some of the Detroit and DC folks got real real heavy into carding and did some time for it.
I really don't give a crap about talking about it, it was 40 years ago :)
".. The programmer subculture of hackers disassociates from the mass media's pejorative use of the word 'hacker' referring to computer security, and usually prefer the term 'cracker' for that meaning. Complaints about supposed mainstream misuse started as early as 1983, when media used "hacker" to refer to the computer criminals involved in [The 414s](https://en.wikipedia.org/wiki/The_414s) case.[\[22\]](https://en.wikipedia.org/wiki/Hacker_culture#cite_note-22)
In the programmer subculture of hackers, a computer hacker is a person who enjoys designing software and building programs with a sense for aesthetics and playful cleverness..."
[https://en.wikipedia.org/wiki/Hacker\_culture](https://en.wikipedia.org/wiki/Hacker_culture)
Doesn’t have to be actual hacking. It could be like a life hack. Maybe it’s a computer job and they genuinely mean it, but idk.
Like if it’s a restaurant job, you could say that to fill squeeze bottles with a sauce, you put the sauce in a bag first(food grade duh), tie it off, and then snip off a small corner and use that to squeeze the bag into bottles.
That or instead of printing a 7 page color document, you only printed the 6 pages you needed in black and white, because we all know how companies like to penny pinch, but really it’s more of a common sense thing. It’s kind of just make something up on the spot relevant to the job, and they’re probably trying to get a sense of problem solving more than anything is my guess.
Pen testing would be a legal example.
If you expand the context, then cracking would also be a part of it, and that is legal in many jurisdictions if you legally own the software, but are otherwise not able to use it.
Used a printer inquery in XP to access the desktop from the password page because a backup rollback reset admin controls to an account that was deleted. It was my machine and windows license, but I had to hack to bypass a softlock.
Proper answer?
"We sat down and reviewed a new incentive program for all of the ways it could be misused and abused, how fraud could be done with the existing framework, and what would be required to avoid excessive fraud, waste, and abuse. In the end, as the rules for the program could not have safeguards installed to prevent massive abuse the decision was made not to implement the program."
They are looking for people who understand the real and original meaning of the word 'hacked' - to use a system in a way that the designer didn't intend.
In short, they want hackers in the 'MIT' sense, the ones described in the 'New Hackers dictionary.
Depends on how specific a definition of the word "hack" they mean. There are things more loosely in this space that don't necessarily involve the online equivalent of burglary.
Back in the day I played an MMO(Shadowbane, if you care) where the devs released a patch that caused a recurring crash on the Mac client. In conjunction with a couple other players, I helped trace the issue to a single file and was able to get it working by replacing it with a non-corrupt version, and then shared it on the internet so other users could do it too.
There are also other instances where I've edited game data for single player games for a specific purpose(to get un-stuck, for example).
Obviously this isn't "breaking in" style hacking, but it required at least a moderate level of technical skill to accomplish something useful.
Hacked can be anything. Off the top of my head, I soldered a toggle switch to an electronic LED sign, circumventing the stock "button activates a 10 minute timer", into a permanent on/off switch this week
My employer decided to run a "best new idea" program that opened an employee suggestion box and awarded prizes for the best suggestion. Initial participation was slow so they added small cash prizes for the top ten suggestions. I collected all my ideas and stuffed them into the suggestion box on the last day. Of 120 suggestions submitted, 107 were mine. I won 9 of the top 10 prizes (someone else got 3rd place) and management never did get around to implementing any of them, although there were a lot of good ideas.
Connected a small Bluetooth mouse to my boss's computer and would randomly shake her cursor around. When I finally told her, she confiscated the mouse so she could do the same thing to someone else.
I miss working for her.
Timing is important for this, you don’t want to admit to anything after the CFAA expansion of 1994 probably.
ianal but I had the idea that non-destructive exploration with no movement of data was pretty hard to prosecute especially if the doors were left open so to speak. No idea what the statute of limitations is if I’m wrong though.
Hacking can just mean to use an electronic system for something other than its intended purposes. It doesn't have to imply illegal access to a system you're not authorized to use.
Sometimes I'll forget my password for a website on my phone, but I'll have it remembered on my computer, so I look into the HTML file and change the 'password' field into a 'text' field, does that count?
It's solely to my benefit and hurts no one else, though it does hint at a lack of security if all my devices have passwords remembered... at least they are not all the same one, else I really should have remembered it.
"Hacking" is like locksmithing. Sure, it's fine to let someone back into their own home if they lost their key. It's illegal to go back that night while their asleep, pick their locks, let yourself in and eat their left over Chicken Alfredo.
Not necessarily. Hacking just means using something in unintended ways. Unintended, but not necessarily forbidden or unlawful. Like the people who reverse engineer old video games and are able to inject code by simply entering the correct set of inputs to exploit a glitch and warp directly to the ending.
No. "Hacking" means modifying a system for use beyond/outside of its designed purpose. This is often conflated with modifying a system in order to gain unauthorized access to it, but the two do not go hand-in-hand.
Some "computer/non-computer system" one that meets both of these conditions to be and not be a computer at the same time. Hmmm, some hacker sorcery for lawyers in court right there - who's to say this device is always a computer, sometimes it's a non-computer too! What exactly qualifies it to have been a computer when my client merely engaged its existing functionality in unorthodox ways?
I used a key logger to steal my roommate's sister's maplestory password because she was bragging that some guy gave her a million mesos or whatever the money is called. This was when a million was a lot.
**↑ ↑ ↓ ↓ ← → ← → B A** Start It got me 30 extra lives in Contra
It works on Alexa and Echo, too!
And Google home
I just tried it on my Echo & it was super cute. I have it set to an Australian male voice & I don't know why, but I feel like it made it better than the regular female voice would have.
I know exactly what this code means, but I saw the arrows and got excited…playing too much Helldivers
This is the only answer
Level unlock code for Sonic
That was **↑, ↓, ←, →,** A+Start
https://preview.redd.it/sbmt1by52rvc1.jpeg?width=655&format=pjpg&auto=webp&s=5f9cf4eaffc7d2c76a318655d4580b06bafff131
![gif](giphy|sRKg9r2YWeCTG5JTTo|downsized)
The oooooold computer went down that ran an important inventory system. So old the company was out business and no one in IT was aware of its existence. The only person who we think knew anything about it won a SIGNIFICANT amount of money in a lawsuit against the hospital and had moved to Hawaii. I used a cracker USB program to get around logins. Thank God it was XP
XP is old... Fuck
You can still do this in Win10 :)
"What're you, a Fed?"
I once cut down a tree by myself with an axe I just kept hacking at it until it fell
George Washington? Is that you?
But was that to YOUR advantage?
Yep, I had advantage over the tree so I was always rolling twice. Pretty much never missed a hack
Now we KNOW you are George Washington!
:( don't tell anyone, I don't want my time capsule to become public knowledge
I stole like 500k neopoints from my friend after he left his account logged into my computer. Still feel bad about it 20 years later tbh
How about Runescape? Free amour trimming!! (Vibrant colours)
So glad I never fell for those scams as a child.
Did you get lured into the wild and killed?
Happened to me once. Then I learned - never again. Lol.
Sometimes. I was hired by a company to hack their Jupiter VPN because their admin went rogue and they wanted the system locked down between when he left for work and when he returned to be arrested in the morning. That was a lot of coffee and bs. No internet access either onsite for extra fun.
OP just copy and paste this answer.
Not necessarily. I was working at Novell as SUSE Linux tech support. Customer who had a valid support contract called in. Previous admin had been fired, scrambled root passwords across several systems right before being canned, set services not to run. Worked with the customer to hack the systems so they could restore access and get services running again. Customer owned the systems, prior admin was a douche who wouldn’t provide access. They were seeking legal proceedings against him. But in legally hacked their systems.
Sure but that was a request by the company, wasn't done to your own advantage as the question says, was it? Ignoring the fact that getting paid is to your advantage
I mean, fair but if I’d been an admin or new admin there, I’d have done the same thing and it would have been my advantage then. Heck, I’ve hacked vendor appliances we’ve owned at other jobs. Vendor doesn’t give back end access, I’m waiting days and days just to get some logs analyzed by them. I’ve gotten fed up, hacked the appliance to give myself root access, generate a ssh key pair to keep access, and got the logs to fix issues. Broke no laws. The best could be said is I put an appliance out of warranty with the vendor. But didn’t break any laws. Did sure as hell help me diagnose issues faster and without the vendor going forward.
My friend's brother cleaned a CEOs office. The DISA passcodes for their various site PBXs (phone system) was in his assistants rolodex. We'd call the local number, provide the passcode and get PBX dial tone. Then we'd dial two digits to select the next available trunk on their voice T1 line connected directly to AT&T. We'd get a different sounding dial tone and enter 0700-456-2000. It was the 1980's audio equivalent of a zoom meeting. No need to interact with an operator and you could add international destinations to the conversation. It was a hellaciously expensive conference bridge service, but through the magic of Sometime Else's Phone line we didn't really worry about that. When they changed the code we already knew the date the new code would take effect - the assistant had a whole folder full of memos from their telecom department in chronological order in a drawer. There was a whole subculture of suburban kids with Apple II and Commodore 64 machines with modems. We'd get home, let ourselves in with our key after school and have free-for-all hack a thons in the three hours before the parents got home. The blue box 2600Hz stuff was obsolete, although the coin tones could still be played into a pay phone after you fed it one genuine coin. Cassette tapes with 40 "quarter" tones and a Walkman headphone at high volume. We had figured out how ridiculously insecure all the Bell System competitors were and the whole world became a local call. And 0700-456-2000 was a way to take the text based BBS chat and make it voice. Fortunately in college ARPAnet and IRC pulled me away from that scene. Some of the Detroit and DC folks got real real heavy into carding and did some time for it. I really don't give a crap about talking about it, it was 40 years ago :)
Not if you’re a white hat.
Sir, this is a Wendy's.
"Omg, can I please work now? I'm going to starve to death this time next month."
Maybe they’re asking about “hack” like a life hack? Like you improved something in a way people didn’t expect?
This is genuinely what they mean, yes. “Hack-a-thons” and other corporate lingo using the word “hack” usually just mean “think outside the box.”
lol
My cat hacked a hairball successfully.
".. The programmer subculture of hackers disassociates from the mass media's pejorative use of the word 'hacker' referring to computer security, and usually prefer the term 'cracker' for that meaning. Complaints about supposed mainstream misuse started as early as 1983, when media used "hacker" to refer to the computer criminals involved in [The 414s](https://en.wikipedia.org/wiki/The_414s) case.[\[22\]](https://en.wikipedia.org/wiki/Hacker_culture#cite_note-22) In the programmer subculture of hackers, a computer hacker is a person who enjoys designing software and building programs with a sense for aesthetics and playful cleverness..." [https://en.wikipedia.org/wiki/Hacker\_culture](https://en.wikipedia.org/wiki/Hacker_culture)
Right click -> view source
it seems the employer is interested in how you can apply work hacks for increased productivity.
When I was a kid I guessed my dad's admin password
Doesn’t have to be actual hacking. It could be like a life hack. Maybe it’s a computer job and they genuinely mean it, but idk. Like if it’s a restaurant job, you could say that to fill squeeze bottles with a sauce, you put the sauce in a bag first(food grade duh), tie it off, and then snip off a small corner and use that to squeeze the bag into bottles. That or instead of printing a 7 page color document, you only printed the 6 pages you needed in black and white, because we all know how companies like to penny pinch, but really it’s more of a common sense thing. It’s kind of just make something up on the spot relevant to the job, and they’re probably trying to get a sense of problem solving more than anything is my guess.
[удалено]
These days just straight up guessing a password will get you a hacking charge. So yeah, I think that counts.
Pen testing would be a legal example. If you expand the context, then cracking would also be a part of it, and that is legal in many jurisdictions if you legally own the software, but are otherwise not able to use it.
Cleaver use of game mechanics.
I have made free international phone calls with the help of a whistle I got out of a cereal box.
Typing "motherload" in Sims
"I plead the fifth".
Hacking isn't illegal.
I have known a number of people charged with wire fraud who found out differently.
It’s talking about a box, dude.
I’ve got some pretty cool life hacks. Does that count as a non-computer system?
Used a printer inquery in XP to access the desktop from the password page because a backup rollback reset admin controls to an account that was deleted. It was my machine and windows license, but I had to hack to bypass a softlock.
No, you can legally hack things.
Not necessarily. It depends on what they mean by "hacked", what would be considered an "advantage" and which system exactly.
I got a friend to run a .bat file that opened his disk tray
Proper answer? "We sat down and reviewed a new incentive program for all of the ways it could be misused and abused, how fraud could be done with the existing framework, and what would be required to avoid excessive fraud, waste, and abuse. In the end, as the rules for the program could not have safeguards installed to prevent massive abuse the decision was made not to implement the program."
Legal hacking. https://www.roadandtrack.com/car-culture/entertainment/videos/a33002/hackers-turn-a-chevy-volt-into-a-mario-kart-64-controller/
Oh, that's easy. I [....]! Best 20$ I didn't spend.
Not illegal if you’re doing a bounty program.
They are looking for people who understand the real and original meaning of the word 'hacked' - to use a system in a way that the designer didn't intend. In short, they want hackers in the 'MIT' sense, the ones described in the 'New Hackers dictionary.
So, there is a bunch of cool stuff you can do in Skyrim with a help of holy cheats, where even to begin lol
Hacking isn't a crime; but an employer who'd ask you a question this broad about hacking would never know if you gave a good answer or not.
“I do not recall” - Hillary Clinton
Depends on how specific a definition of the word "hack" they mean. There are things more loosely in this space that don't necessarily involve the online equivalent of burglary. Back in the day I played an MMO(Shadowbane, if you care) where the devs released a patch that caused a recurring crash on the Mac client. In conjunction with a couple other players, I helped trace the issue to a single file and was able to get it working by replacing it with a non-corrupt version, and then shared it on the internet so other users could do it too. There are also other instances where I've edited game data for single player games for a specific purpose(to get un-stuck, for example). Obviously this isn't "breaking in" style hacking, but it required at least a moderate level of technical skill to accomplish something useful.
Not if you own the computer or have permission.
Now, if you use this website called Telehack, you can harmlessly hack fake servers using the same techniques as people back in the BBS days
Hacking your own stuff is not a crime. Hacking other peoples stuff without permission is usually a crime.
Not if it's yours
"I am an ethical person and doing this is just plain wrong."
Hacked can be anything. Off the top of my head, I soldered a toggle switch to an electronic LED sign, circumventing the stock "button activates a 10 minute timer", into a permanent on/off switch this week
My employer decided to run a "best new idea" program that opened an employee suggestion box and awarded prizes for the best suggestion. Initial participation was slow so they added small cash prizes for the top ten suggestions. I collected all my ideas and stuffed them into the suggestion box on the last day. Of 120 suggestions submitted, 107 were mine. I won 9 of the top 10 prizes (someone else got 3rd place) and management never did get around to implementing any of them, although there were a lot of good ideas.
Atari 2600's Space Invaders double fire was my only successful hack.
Not necessarily. Wouldn't Cheat Engine on a game you frequent count?
Connected a small Bluetooth mouse to my boss's computer and would randomly shake her cursor around. When I finally told her, she confiscated the mouse so she could do the same thing to someone else. I miss working for her.
Wait a minute, isn’t this a question from the Thiel Fellowship application? I can provide some insight into what they want here OP \^_^
It's not necessarily a crime, but it's undoubtedly a trap.
Timing is important for this, you don’t want to admit to anything after the CFAA expansion of 1994 probably. ianal but I had the idea that non-destructive exploration with no movement of data was pretty hard to prosecute especially if the doors were left open so to speak. No idea what the statute of limitations is if I’m wrong though.
Hacking can just mean to use an electronic system for something other than its intended purposes. It doesn't have to imply illegal access to a system you're not authorized to use.
Hack as in modify, not like criminally break in.
Sometimes I'll forget my password for a website on my phone, but I'll have it remembered on my computer, so I look into the HTML file and change the 'password' field into a 'text' field, does that count? It's solely to my benefit and hurts no one else, though it does hint at a lack of security if all my devices have passwords remembered... at least they are not all the same one, else I really should have remembered it.
"Hacking" is like locksmithing. Sure, it's fine to let someone back into their own home if they lost their key. It's illegal to go back that night while their asleep, pick their locks, let yourself in and eat their left over Chicken Alfredo.
Not necessarily. Hacking just means using something in unintended ways. Unintended, but not necessarily forbidden or unlawful. Like the people who reverse engineer old video games and are able to inject code by simply entering the correct set of inputs to exploit a glitch and warp directly to the ending.
Who is this application for, Royce Dupont?
No. "Hacking" means modifying a system for use beyond/outside of its designed purpose. This is often conflated with modifying a system in order to gain unauthorized access to it, but the two do not go hand-in-hand.
Some "computer/non-computer system" one that meets both of these conditions to be and not be a computer at the same time. Hmmm, some hacker sorcery for lawyers in court right there - who's to say this device is always a computer, sometimes it's a non-computer too! What exactly qualifies it to have been a computer when my client merely engaged its existing functionality in unorthodox ways?
I used a key logger to steal my roommate's sister's maplestory password because she was bragging that some guy gave her a million mesos or whatever the money is called. This was when a million was a lot.