Inside the Wild Lifestlye of the Hackers Who Pulled Off History's Greatest Cybercrime

TechS

Memento mori
Nov 29, 2011
257
4
0
USA
Sex, Drugs, and the Biggest Cybercrime of All Time

The fast times & hard fall of three teenage friends with a knack for illegal code

Sex, Drugs, and the Biggest Cybercrime of All Time | Culture News | Rolling Stone
78b3690ad6d0d65837e5d8f529cf863f2f1a101c.jpg





 


NOVEMBER 11, 2010 6:01 PM ET

You read it?
It is a fucking unbelievable article and pretty relevant. IMO worthy of bringing up.

My question is how did these dudes do complex coding while high off their asses on every hallucinogen on the planet?
 
You read it?
It is a fucking unbelievable article and pretty relevant. IMO worthy of bringing up.

Yep. I read last year it as my field itself is Cyber Security. Worthy of bringing up though!

My question is how did these dudes do complex coding while high off their asses on every hallucinogen on the planet?

That's how most of the notorious hackers were.
 
You read it?
It is a fucking unbelievable article and pretty relevant. IMO worthy of bringing up.

My question is how did these dudes do complex coding while high off their asses on every hallucinogen on the planet?

Really beats me. I've known a lot of coders who say they perform best while on weed. I tried it once, no go. It's hard enough for me to concentrate while sober.

On second thought though, there is a huge difference in programming something you are deeply interested in, as opposed to something your only working on for compensation.

Maybe when your working on a project that you are obsessed with at a subconscious level, nothing can stop the flow of code, maybe it's on auto-pilot. The same way many people drive on auto-pilot in highway induced hypnosis.

In that case, letting your consciousness take a backseat to you subconsciousness would be the most efficient way to do things.

This story also sounds eerily similar to something that happened to a guy I use to chat. He was busted in a parking lot at the ATM also. He had fake ATM cards scattered on his front seat, but the reason the cop busted him was for the drug paraphernalia he also had in the car, in plain sight.
 
Biggest cyber crime? Kim Schmitz who owns Megaupload and other 'Mega' brands is still a free man and has made tens maybe even hundreds of millions of Euros from software pirating.

That guy is a fucking beast, and one of the few online crooks I do respect. That guy knows how to hustle and turn a coin, doesn't let anybody or any authority stand in his way.
 
Was enjoying it 'till i got to "Patrick's job was to probe corporate networks for vulnerabilities to a malware attack known as a "sequel injection," which overwhelms the victim's system with meaningless commands until the system gives up and defaults to using the malicious code"
 
Was enjoying it 'till i got to "Patrick's job was to probe corporate networks for vulnerabilities to a malware attack known as a "sequel injection," which overwhelms the victim's system with meaningless commands until the system gives up and defaults to using the malicious code"

ATFUd.png
 
Was enjoying it 'till i got to "Patrick's job was to probe corporate networks for vulnerabilities to a malware attack known as a "sequel injection," which overwhelms the victim's system with meaningless commands until the system gives up and defaults to using the malicious code"

If you are an expert on a subject you will always find glaring technical inaccuracies
in any article in a mass publication.

I just liked reading about how they were stackin paper and partying, I wasn't reading it as a case study.
 
Good read, thanks. It seemed like they were really trying to play up the whole rock star mentality but then again it is Rolling Stone.
 
If you are an expert on a subject you will always find glaring technical inaccuracies
in any article in a mass publication.

I just liked reading about how they were stackin paper and partying, I wasn't reading it as a case study.

The problem with that sentence though is not the SQL injection vs Sequel injection its also that SQL injection does not overwhelm the system with useless information, instead if grabs DB information since you are escaping the SQL command and insert your own and reverse engineer table names.
 
The problem with that sentence though is not the SQL injection vs Sequel injection its also that SQL injection does not overwhelm the system with useless information, instead if grabs DB information since you are escaping the SQL command and insert your own and reverse engineer table names.

You must have missed the fact that the article was written by a woman. They only need to know how to operate kitchen appliances, not the difference between SQL injection and DDoS or whatever the fuck that is..