ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Confessions of a Retired White Hat Hacker

Updated on November 16, 2013
Good vs Evil
Good vs Evil | Source

Good vs Evil

Computers and their programming started as early as the Babbage machine from the 1820's era when Charles Babbage proposed the first computer called a "Difference Machine". More practical programming became a necessity when the ENIAC machine was developed in 1946 as a ballistics computer for the military. This new science called programming required a mind that could delve into new and as yet unexplored processes in order to make a computer operate at it's most efficient state. This processing or programming if you will, always took on innovative techniques that usually went beyond conventional methods used in the sciences prior to the computing age. Keep in mind that early programming wasn't as simple as pasting some HTML code into your web site, early programming had total control over what the computer would or could do, so the sky was the limit in those days.

This programming style breeded an engineer with a unique dimension to his character. It was not uncommon to try techniques that seemed odd to the conventional engineer, and so they carried a stigma about their persona that they were quite different. A simple example that would drive any mathematician crazy was a common programming technique to increment a variable by one each time the program issued this instruction. The mathematical equivalent of this program step was A = A + 1. The computer would take the old value of (A) and add one to it, then store the new value back into (A) again.

Programmers in the early days were unconventional experimenters. Unfortunately some would choose the dark side or Black Hats and others would choose a good side or White Hats. This is a story of White Hat hackers and their need to be innovative and attempting to correct wrongs done against them, or simply to discover what would the computer do "If I did this to it?".

It is quite unfortunate that the Evil Hacker has proliferated over that last decade or so, and the term White Hat hacker has been all but forgotten. So with a bit of a boyish grin on our face, let's take a look at some actual cases of White Hat hacking from the old days.

Late 1970's Disk Drive

Washing Machine Sized Disk Drive
Washing Machine Sized Disk Drive | Source

Programming Electronic Hardware

Early first and second generation of computers were supported by hardware that was huge by comparison to today's equipment. Today you can store many gigabytes of data on a USB drive the size of a dime. Old hard drives from the 60's and 70's were as big as washing machines and could only store a fraction of data in the 100's of kilobytes. These multi-platter drives were very heavy and were operated by large electromagnetic servos. You could hear the drive heads moving across the disk looking for the data that the program asked for.

During those times, a diagnostic engineer would write a program to test all the functions of these large cumbersome machines. They could move the heads back and forth with a specific rhythm to the test. The heads and servo drives weigh upwards around 20 to 30 pounds. So visible drive movement was not uncommon. At this point the innovative white hat hacker would speculate, "What would happen if I programmed the heads to move at a frequency that was resonant with the mass of the whole drive?

Well, first attempts at resonance yielded the washing machine like drives happily humming away with a note around low 'C' on the piano scale. But a few number changes in the program yielded chaos in the computer room. In those days, all computer equipment was contained in an environmentally stable room, if only some of these engineers were as stable as those rooms.

The next test yielded an earthquake like vibration that shook the room, knocking desk items to the floor and a wildly rocking bouncing disk drive jumping across the floor and headed for other engineers at their desks. With people running in different directions, raucous laughter broke out in the lab at the site of this disk drive "Coming Alive!". Needless to say the management didn't think it was very funny. We couldn't stop laughing for days.

A modern day version of this bouncing disk drive would be the Stuxnet Virus that was released on the Iranian nuclear facilities centrifuges. It is believed that Israel and Americans developed this virus to infiltrate the Iranian centrifuges in order to destroy the devices. The virus would force the machines into an uncontrolled spin, rendering them as junk in only a short period of time.


Vintage Dumb Terminal
Vintage Dumb Terminal

Please Don't Spy on Me.

Engineering management style has evolved over the years to a more modern tolerant relationship with the working staff. Gone are the days of child labor or management standing over you on catwalks making sure you are working at 150% capacity. This behavior was demeaning and irritating to say the least. Sadly, this style shows up today in a more modern form.

Computer program development during the 1980's used networked servers, like the Digital Equipment's VAX series computers. The age of individual PC's was only just beginning and all businesses had this networked style of computing in the office. The system consisted of one large computer that could run programs from a number of users all at the same time. This central computer would then communicate with the user by the use of the Dumb Terminal. The dumb terminal was nothing more that a CRT screen showing text information and a keyboard to get typed text from the user. These dumb terminals did not have any computing hardware in the device and were very limited in their programming ability.

The central processing, multi-user style meant that all users programs and data were contained in one computer which made it easy to be able to see what the computer (users) were working on at any point in time. Unfortunately so could the unscrupulous manager of our team see what we were doing at work.

The scene is now a room full of engineers all working at different programs all contained in one central computer. There are manager's who have dumb terminals on their desks as well. Most managers use the computer to write their progress reports or draft other important documentation related to their project. Sadly though, some managers have a domination complex in their personality that drives them to use the computers power to spy on the workers without their knowledge. Most computers at that time had programs to watch other system processes primarily for diagnostic reasons. One manager would watch the progress of his workers in order to control their work habits as well and create a 'God' like environment in his mind.

One engineer discovered this spying by the manager and decided that it had to stop. Any claims of spying would be denied and might result in unfavorable treatment by the manager over the engineer, so the solution had to be clandestine. This was a difficult white hat maneuver that had to be stealthy but yet give a message that it isn't nice to spy on people without their knowledge.

The trick was to pull the manager off of the system if it was noted that he was watching the engineers incandescently. A difficult task indeed. The dumb terminals had a feature that would reply to a simple command to identify itself when commanded to from an outside task. This ID could in fact be a computer control command. By programming his terminal to log him off of the system, we engineers could then bump him off at any time we thought appropriate.

He grew impatient with the strange behavior of the system and he filed a bug report with the computer manufacturer, the bug never did get resolved.

All Is Well.

No managers or any other people were harmed during this period. Integrity was maintained and the only embarrassment suffered was deserved. A white hat hacker is not out to make trouble or to steal anything, but the hackers of that time were only trying to understand technology at a time of greatest development of the computer.

Hope you enjoyed these stories, keep looking for further "uh-hum" confessions.

> logout....


working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)