ad info




[an error occurred while processing this directive]
CNN.com
MAIN PAGE
WORLD
ASIANOW
U.S.
LOCAL
POLITICS
WEATHER
BUSINESS
SPORTS
TECHNOLOGY
computing
personal technology
space
NATURE
ENTERTAINMENT
BOOKS
TRAVEL
FOOD
HEALTH
STYLE
IN-DEPTH

custom news
Headline News brief
daily almanac
CNN networks
CNN programs
on-air transcripts
news quiz

CNN WEB SITES:
CNN Websites
TIME INC. SITES:
MORE SERVICES:
video on demand
video archive
audio on demand
news email services
free email accounts
desktop headlines
pointcast
pagenet

DISCUSSION:
message boards
chat
feedback

SITE GUIDES:
help
contents
search

FASTER ACCESS:
europe
japan

WEB SERVICES:
COMPUTING

Hackers - Insurgency on the Internet
Main Page | Bracing for Cyberwar | Hacking Primer | Scenes from the 'Hacker Underground' | Hacking: Two Viewpoints | Timeline | Gallery | News Archive | Discussion | Related Sites

DefCon '99 draws security experts from both sides

July 13, 1999
Web posted at: 8:41 a.m. EDT (1241 GMT)

by Andrew Brandt

From...
PC World
defcon convention
"Mojo" talks about various ways to hack into Microsoft programs during the seventh annual DefCon convention in Las Vegas

ALSO:
Hackers throw antivirus software makers a new challenge

LAS VEGAS (IDG) -- For their seventh year, mohawk-coiffed teenage hackers, pony-tailed industry security experts, and buzz-cut government agents have gathered here to swap exploits, ideas, and code at the annual DefCon hacking convention.

One hacker who calls himself Mojo says he comes every year "to teach new hackers--and the information security business--how to hack where you don't break any laws."

"We can distribute information freely among the hacker community and show off our new stuff," says Mojo, who sports a mohawk made of eight 12-inch-tall spikes. He drew a mixed crowd of more than 300 listeners to his one-hour talk about hacking the Windows Registry file.

The weekend event, based at the casino-free Alexis Park Hotel just off the Strip, features talks by well-known members of the hacking community, as well as conferences with legal experts and military officials. The topics range from specific training sessions (such as how to set up a firewall) to more general discussions of ethics, morality, and legality of hacking.

Pseudonyms and tech talk

Organized by hackers, the convention offers a revealing glimpse into a world few people understand and which more than a few fear. Most of the participants identify themselves with pseudonyms such as Cyber or Ghost. The event's founder and primary organizer goes by the moniker Dark Tangent.

MORE COMPUTING INTELLIGENCE
IDG.net IDG.net home page
PC World home page
FileWorld find free software fast
Make your PC work harder with these tips
Reviews & in-depth info at IDG.net
* IDG.net's desktop PC page
IDG.net's portable PC page
IDG.net's Windows software page
IDG.net's personal news page
Year 2000 World
Questions about computers? Let IDG.net's editors help you
Subscribe to IDG.net's free daily newsletter for computer geniuses (& newbies)

But despite the ominous sounding names, the mostly teen-to-twentysomething attendees were no more intimidating than the average high school student. Piercings and mohawk haircuts seem the exception instead of the rule, and many of the participants in the weekend's events offer technical assistance freely and cheerfully.

It's also a place to gather tools for both sides of the trade. A hacker group called the Cult of the Dead Cow is distributing an update to its Black Orifice program, which lets users remotely control their victims' desktops. Zero Knowledge Systems, which got Intel's attention by posting information on how to hack the Pentium III's ID feature, is here. Its representatives are signing up beta testers for Freedom, an encryption technology.

For most of the people who showed up on the first day, the convention was a kind of homecoming, a place to congregate with others who share similar interests and a desire to learn more about the way computers work.

It was also a place to buy more than twenty different hacker- and programmer-oriented T-shirts, the latest secure operating systems, and low-grade pizza at two bucks per slice.


SPECIAL:
Insurgency on the Internet

RELATED STORIES:
New and improved Back Orifice targets Windows NT
July 7, 1999
FBI on offensive in 'cyber war,' raiding hackers' homes
June 24, 1999
Hack-proof your system the hardware way
June 23, 1999
Hackers spar over cyber war on Iraq, China
January 13, 1999

RELATED IDG.net STORIES:
DefCon 99: Games hackers play
(PC World Online)
BackOrifice 2000 released with great fanfare at DefCon
(InfoWorld Electric)
Convicted hacker gives advice at DefCon
(InfoWorld Electric)
2,500 hackers gather in Las Vegas for DefCon
(InfoWorld Electric)
Hacker tool targets Windows NT
(PC World Online)
Note: Pages will open in a new browser window
External sites are not endorsed by CNN Interactive.

RELATED SITES:
DefCon
Cult of the Dead Cow
Zero Knowledge Systems
Note: Pages will open in a new browser window
External sites are not endorsed by CNN Interactive.
LATEST HEADLINES:
SEARCH CNN.com
Enter keyword(s) go help

Back to the top 2001 Cable News Network. All Rights Reserved.
Terms under which this service is provided to you.
Read our privacy guidelines.