from the hack-it-yourself-like-the-rest-of-us dept.
Noryungi writes "It seems as though a Republican Communications Director contacted Attrition.org, trying to hire hackers to improve his educational records. I don't know what is his dumbest move: (a) contacting Attrition in the first place, (b) using a real name Yahoo email address or (c) speaking at length about what he needed? Kudos to the Attrition crew for posting the whole email dialogue online! A sample from the conversation: 'Jericho: First, let's be clear. You are soliciting me to break the law and hack into a computer across state lines. That is a federal offense and multiple felonies. Obviously I can't trust anyone and everyone that mails such a request, you might be an FBI agent, right? So, I need three things to make this happen: 1. A picture of a squirrel or pigeon on your campus. One close-up, one with background that shows buildings, a sign, or something to indicate you are standing on the campus. 2. The information I mentioned so I can find the records once I get into the database. 3. Some idea of what I get for all my trouble.'"
How many Unix hacks does it take to change a light bulb?
Let's see, can you use a shell script for that or does it need a C program?