CULT OF THE DEAD COW
   HOME

TheInfoList



OR:

Cult of the Dead Cow, also known as cDc or cDc Communications, is a computer
hacker A hacker is a person skilled in information technology who achieves goals and solves problems by non-standard means. The term has become associated in popular culture with a security hackersomeone with knowledge of bug (computing), bugs or exp ...
and DIY
media Media may refer to: Communication * Means of communication, tools and channels used to deliver information or data ** Advertising media, various media, content, buying and placement for advertising ** Interactive media, media that is inter ...
organization founded in 1984 in
Lubbock, Texas Lubbock ( ) is a city in the U.S. state of Texas and the county seat of Lubbock County. With a population of 272,086 in 2024, Lubbock is the 10th-most populous city in Texas and the 84th-most populous in the United States. The city is in the ...
. The group maintains a
weblog A blog (a Clipping (morphology), truncation of "weblog") is an informational website consisting of discrete, often informal diary-style text entries also known as posts. Posts are typically displayed in Reverse chronology, reverse chronologic ...
on its site, also titled " ult of the Dead Cow. New media are released first through the blog, which also features thoughts and opinions of the group's members.


Timeline

The group was formed in June 1984 at the Farm Pac
slaughterhouse In livestock agriculture and the meat industry, a slaughterhouse, also called an abattoir (), is a facility where livestock animals are slaughtered to provide food. Slaughterhouses supply meat, which then becomes the responsibility of a mea ...
by Grandmaster Ratte' (aka Swamp Ratte'), Franken Gibe, Sid Vicious, and three BBS
SysOp A sysop (, an abbreviation of system operator) is an administrator of a multi-user computer system, such as a bulletin board system (BBS) or an online service virtual community.Jansen, E. & James, V. (2002). NetLingo: the Internet dictionary. Ne ...
s. In the 1980s the Cult of the Dead Cow organized and maintained a loose collective of affiliated BBSs across the US and Canada. It was during this time that the cDc is credited with coining the term "31337" as an alternative spelling of " Eleet" or "Elite", an expression denoting skill or greatness in a person, place, or thing. In December 1990, cDc member Jesse Dryden (aka Drunkfux), the son of
Jefferson Airplane Jefferson Airplane was an American Rock music, rock band formed in San Francisco, California, in 1965. One of the pioneering bands of psychedelic rock, the group defined the San Francisco Sound and was the first from the San Francisco Bay Area, ...
drummer Spencer Dryden and grand nephew of
Charlie Chaplin Sir Charles Spencer Chaplin (16 April 188925 December 1977) was an English comic actor, filmmaker, and composer who rose to fame in the era of silent film. He became a worldwide icon through his screen persona, the Tramp, and is considered o ...
, created HoHoCon. It was the first modern
hacker conference A computer security conference is a Convention (meeting), convention for individuals involved in computer security. They generally serve as meeting places for System administrator, system and network administrators, hacker (computer security), hac ...
, which invites the participation of both
journalists A journalist is a person who gathers information in the form of text, audio or pictures, processes it into a newsworthy form and disseminates it to the public. This is called journalism. Roles Journalists can work in broadcast, print, advertis ...
and law enforcement. It is usually held in
Houston, Texas Houston ( ) is the List of cities in Texas by population, most populous city in the U.S. state of Texas and in the Southern United States. Located in Southeast Texas near Galveston Bay and the Gulf of Mexico, it is the county seat, seat of ...
. In all, dFx hosted five annual HoHoCons. In 1991, cDc was named "Sassiest Underground Computer Group" by '' Sassy'' magazine. Also in 1991, the group began distributing music in the form of
cassette tape The Compact Cassette, also commonly called a cassette tape, audio cassette, or simply tape or cassette, is an analog audio, analog magnetic tape recording format for Sound recording and reproduction, audio recording and playback. Invented by L ...
albums sold through its
post office box A post office box (commonly abbreviated as P.O. box, or also known as a postal box) is a uniquely addressable lockable box located on the premises of a post office. In some regions, particularly in Africa, there is no door-to-door delivery ...
. Many of these albums are now available online in their entirety. October 1994 saw the creation of the cDc's
Usenet Usenet (), a portmanteau of User's Network, is a worldwide distributed discussion system available on computers. It was developed from the general-purpose UUCP, Unix-to-Unix Copy (UUCP) dial-up network architecture. Tom Truscott and Jim Elli ...
newsgroup A Usenet newsgroup is a repository usually within the Usenet system for messages posted from users in different locations using the Internet. They are not only discussion groups or conversations, but also a repository to publish articles, start ...
, alt.fan.cult-dead-cow. It was thus the first hacking group to have its own Usenet newsgroup. In November of that year, the group claimed responsibility for giving
Ronald Reagan Ronald Wilson Reagan (February 6, 1911 – June 5, 2004) was an American politician and actor who served as the 40th president of the United States from 1981 to 1989. He was a member of the Republican Party (United States), Republican Party a ...
Alzheimer's disease Alzheimer's disease (AD) is a neurodegenerative disease and the cause of 60–70% of cases of dementia. The most common early symptom is difficulty in remembering recent events. As the disease advances, symptoms can include problems wit ...
, claiming to have done so in 1986 with a
blowgun A blowgun (also called a blowpipe or blow tube) is a simple ranged weapon consisting of a long narrow tube for shooting light projectiles such as darts. It operates by having the projectile placed inside the pipe and using the force created by ...
. The cDc declared war on the
Church of Scientology The Church of Scientology is a group of interconnected corporate entities and other organizations devoted to the practice, administration and dissemination of Scientology, which is variously defined as a cult, a business, or a new religiou ...
in 1995 during the alt.religion.scientology controversy, stating In 1997, the cDc began distributing original
MP3 MP3 (formally MPEG-1 Audio Layer III or MPEG-2 Audio Layer III) is a coding format for digital audio developed largely by the Fraunhofer Society in Germany under the lead of Karlheinz Brandenburg. It was designed to greatly reduce the amount ...
-format music on its website. In August 1998, they presented their popular Back Orifice tool at DEF CON 6. In February 2000, the cDc was the subject of an 11-minute
documentary A documentary film (often described simply as a documentary) is a nonfiction Film, motion picture intended to "document reality, primarily for instruction, education or maintaining a Recorded history, historical record". The American author and ...
short titled "Disinformation". Also in February 2000, cDc member Mudge briefed President
Bill Clinton William Jefferson Clinton (né Blythe III; born August 19, 1946) is an American politician and lawyer who was the 42nd president of the United States from 1993 to 2001. A member of the Democratic Party (United States), Democratic Party, ...
on Internet security.


cDc communications

cDc communications is the parent organisation of Cult of the Dead Cow, one of three groups that fall under cDc communications. The other two are the Ninja Strike Force and Hacktivismo.


Ninja Strike Force

In 1996, the cDc announced the birth of its Ninja Strike Force, a group of "
ninja A , or was a spy and infiltrator in pre-modern Japan. The functions of a ninja included siege and infiltration, ambush, reconnaissance, espionage, deception, and later bodyguarding.Kawakami, pp. 21–22 Antecedents may have existed as ear ...
" dedicated to achieving the goals of the cDc, an intervention task force both online and offline. The cDc opened the NSF Dojo in 2004. An "NSF Dojo" Member also operates a streaming radio station, which features recordings of hacker con presentations and other educational programming in addition to a wide range of musical styles and artists. Membership in the NSF is granted by the cDc to those individuals who stand out in their support of the cDc and its ideals. Members are recognized for their abilities, capabilities, and being the best of the best in their skills. In 2006 the Ninja Strike Force launched its own
microsite A microsite is an individual web page or a small cluster of pages which are meant to function as a discrete entity (such as an iFrame) within an existing website or to complement an offline activity. The microsite's main landing page can have its ...
.


Hacktivismo

In late 1999, the cDc created Hacktivismo, an independent group under the cDc communications umbrella dedicated to the creation of anti-
censorship Censorship is the suppression of speech, public communication, or other information. This may be done on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient". Censorship can be conducted by governmen ...
technology in furtherance of
human rights Human rights are universally recognized Morality, moral principles or Social norm, norms that establish standards of human behavior and are often protected by both Municipal law, national and international laws. These rights are considered ...
on the
Internet The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
. The group's beliefs are described fully in The Hacktivismo Declaration, which seeks to apply the
Universal Declaration of Human Rights The Universal Declaration of Human Rights (UDHR) is an international document adopted by the United Nations General Assembly that enshrines the Human rights, rights and freedoms of all human beings. Drafted by a UN Drafting of the Universal D ...
and the
International Covenant on Civil and Political Rights The International Covenant on Civil and Political Rights (ICCPR) is a multilateral treaty that commits nations to respect the civil and political rights of individuals, including the right to life, freedom of religion, freedom of speech, freedom ...
to the
Internet The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
. Among Hacktivismo's beliefs include access to information as a basic
human right Human rights are universally recognized moral principles or norms that establish standards of human behavior and are often protected by both national and international laws. These rights are considered inherent and inalienable, meaning t ...
. The organization partially shares Critical Art Ensemble's (CAE) belief in the value of secrecy, but challenges both with CAE and many
hacktivist Hacktivism (or hactivism; a portmanteau of '' hack'' and ''activism''), is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. A form of Internet activism with roo ...
s on the subject of civil disobedience. The cDc model is, instead, one of disruptive compliance.Wardrip-Fruin, Noah and Nick Montfort, ed (2003). The New Media Reader. pp.782. The MIT Press. . Disruptive, in this case, refers to disruptive technology; compliance refers back to the Internet and its original intent of constructive free-flow and openness. Hacktivismo has also authored its own
software license A software license is a legal instrument governing the use or redistribution of software. Since the 1970s, software copyright has been recognized in the United States. Despite the copyright being recognized, most companies prefer to sell lic ...
agreement, the Hacktivismo Enhanced-Source Software License Agreement, which is source available (but not
open source Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use and view the source code, design documents, or content of the product. The open source model is a decentrali ...
). Their work focuses on the development of software that empowers conduct forbidden by repression, rather than enabling (private or public) attacks on repressors. In general cDc hopes that open code can become the
lingua franca A lingua franca (; ; for plurals see ), also known as a bridge language, common language, trade language, auxiliary language, link language or language of wider communication (LWC), is a Natural language, language systematically used to make co ...
of a
hacktivism Hacktivism (or hactivism; a portmanteau of ''hack'' and ''activism''), is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. A form of Internet activism with roots ...
that seeks to wage peace, not war. While the term isn't used, the software described in cDc's "Waging of Peace on the Internet" would create a set of connections between dissidents that sound in technoliberationist terms, rhizomatic.


Crossover associations with other groups

In addition to the obvious associations between Cult of the Dead Cow, Hacktivismo, and the Ninja Strike Force, the cDc also has crossover associations with several other organizations. These include the L0pht; founding members White Knight and Count Zero and final members Dildog and Mudge are all members of cDc. Additionally, The Nightstalker was a member of Youth International Party Line/Technology Assistance Program. Lord Digital, one of the founders of Mindvox, is a former member of LOD/H and a current member of the Sacrament of Transition. Red Knight was a member of the Masters of Deception. Also, RaD Man, a member of the Ninja Strike Force, is one of the founders of ACiD Productions. Another NSF member, Mark Hinge, is a founding member of the British hacker group The Syndicate Of London. Flack, another Ninja Strike Force member, was a co-founder of the horror "lit group" Soulz at Zero. Mudge later went on to program manage the
CINDER Cinder or Cinders may refer to: In general * Ember, also called cinder * Ash, also called cinder * Scoria, or cinder, a type of volcanic rock In computing * Cinder (programming library), a C++ programming library for visualization *Cinder, Ope ...
program at DARPA, which aimed to detect 'insider threats' like the
WikiLeaks WikiLeaks () is a non-profit media organisation and publisher of leaked documents. It is funded by donations and media partnerships. It has published classified documents and other media provided by anonymous sources. It was founded in 2006 by ...
sources.Darpa’s Star Hacker Looks to WikiLeak-Proof Pentagon
, Spencer Ackerman, Wired, August 31, 2010, retr 2011 12 5


Electronic publication

During the 1980s, the cDc was well known throughout the BBS scene for their underground ezine, also called ''Cult of the Dead Cow''. The group claims to have invented the
ezine An online magazine is a magazine published on the Internet, through bulletin board systems and other forms of public computer networks. One of the first magazines to convert from a print magazine format to an online only magazine was the computer ...
. The Cult of the Dead Cow has been credited with coining the term "elite" as used in the hacker scene/computer underground in cDc textfiles of the 1980s. The ezine has led to some criticism of the group over the years; in a 1994 episode of ''Geraldo'' entitled "Computer Vice,"
Geraldo Rivera Geraldo Rivera (born Gerald Rivera; July 4, 1943) is an American journalist, attorney, author, and political commentator who worked at the Fox News Channel from 2001 to 2023. He hosted the tabloid talk show '' Geraldo'' from 1987 to 1998. He g ...
referred to the group as "a bunch of sickos" for having published an article called "Sex with Satan," originally published in 1988.


Hacktivism

In 1996, cDc member Omega coined the term "
hacktivism Hacktivism (or hactivism; a portmanteau of ''hack'' and ''activism''), is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. A form of Internet activism with roots ...
" in an email to other group members. The group has been active in hacktivist causes since that time.


Hong Kong Blondes Hoax

In 1997, the cDc claimed to have worked with a group of Chinese dissidents called "The Hong Kong Blondes," and through a series of public statements and media coverage created a narrative about an activist group operating within the
People's Republic of China China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
that could disrupt computer networks within that country in order to allow citizens to access censored content online. In time, it emerged that the group was, in fact, fictitious, though the story about its capabilities and aims briefly took on a life of its own. The cDc first spoke about the Hong Kong Blondes publicly in a presentation at the 1997 Beyond HOPE Conference held at The
Puck Building The Puck Building is a mixed-use building at 295–309 Lafayette Street in the SoHo, Manhattan, SoHo and Nolita neighborhoods of Manhattan in New York City, New York, U.S. The building was designed by Albert Wagner (architect), Albert Wagner i ...
in
New York City New York, often called New York City (NYC), is the most populous city in the United States, located at the southern tip of New York State on one of the world's largest natural harbors. The city comprises five boroughs, each coextensive w ...
. Members claimed to have advised the group on strong encryption techniques. In remarks and an interview with
Wired Wired may refer to: Arts, entertainment, and media Music * ''Wired'' (Jeff Beck album), 1976 * ''Wired'' (Hugh Cornwell album), 1993 * ''Wired'' (Mallory Knox album), 2017 * "Wired", a song by Prism from their album '' Beat Street'' * "Wired ...
, the cDc claimed that the Hong Kong Blondes had 20 members, including "three highly placed technicians" as well as some government bureaucrats in Beijing, and was led by a dissident physicist living in Toronto. They further claimed, without offering evidence, that the Blondes had temporarily disabled a Chinese communications satellite as a way of "introducing itself" to authorities. The claims were all sourced to the cDc's Foreign Minister, Oxblood Ruffin. In 1998, Ruffin published a transcript of a purported interview with Blondie Wong claiming that the Blondes were forming an affiliate group of hackers and activists based in North America and Europe, aiming to support the cause of human rights in China. The contents of the interview were covered by Wired and by
Naomi Klein Naomi Klein (born May 8, 1970) is a Canadian author, social activist, and filmmaker known for her political analyses; support of ecofeminism, organized labour, and criticism of corporate globalization, fascism and Criticism of capitalism, ca ...
, then a journalist for The Toronto Star. Later in 1998, the cDc issued a statement in which it claimed to have formally severed ties with the Hong Kong Blondes. Despite having offered no verifiable evidence of any hacking activity within China, or even the existence of any members of the Hong Kong Blondes, the claims garnered media attention from outlets including Wired,
The Los Angeles Times The ''Los Angeles Times'' is an American daily newspaper that began publishing in Los Angeles, California, in 1881. Based in the Greater Los Angeles city of El Segundo since 2018, it is the sixth-largest newspaper in the U.S. and the larges ...
, U.S. News & World Report and
The Toronto Star The ''Toronto Star'' is a Canadian English-language broadsheet daily newspaper. It is owned by Toronto Star Newspapers Limited, a subsidiary of Torstar Corporation and part of Torstar's Daily News Brands division. The newspaper was establis ...
. The coverage caught the attention of National Security Advisor Richard A. Clarke. In a private
White House The White House is the official residence and workplace of the president of the United States. Located at 1600 Pennsylvania Avenue Northwest (Washington, D.C.), NW in Washington, D.C., it has served as the residence of every U.S. president ...
meeting with Clarke and President
Bill Clinton William Jefferson Clinton (né Blythe III; born August 19, 1946) is an American politician and lawyer who was the 42nd president of the United States from 1993 to 2001. A member of the Democratic Party (United States), Democratic Party, ...
in 2000, Clarke asked about the group. Mudge admitted, "We made them up." In social media post in 2015, Oxblood conceded that the Hong Kong Blondes amounted to publicity campaign the point of which was to create cover for the extraction of seven Chinese pro-democracy activists, though he offered no evidence that such an operation occurred.


Cyberwar

On January 7, 1999, the cDc joined with an international coalition of hackers to denounce a call to cyberwar against the governments of
China China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
and
Iraq Iraq, officially the Republic of Iraq, is a country in West Asia. It is bordered by Saudi Arabia to Iraq–Saudi Arabia border, the south, Turkey to Iraq–Turkey border, the north, Iran to Iran–Iraq border, the east, the Persian Gulf and ...
.


Milošević trial

When questioning Patrick Ball during his International War Crimes Tribunal in 2002,
Slobodan Milošević Slobodan Milošević ( sr-Cyrl, Слободан Милошевић, ; 20 August 1941 – 11 March 2006) was a Yugoslav and Serbian politician who was the President of Serbia between 1989 and 1997 and President of the Federal Republic of Yugos ...
asked Ball about his relationship with the cDc. Ball had given a talk and been a member of a cDc-sponsored panel on hacktivism at
DEF CON DEF CON (also written as DEFCON, Defcon, or DC) is a Computer security conference, hacker convention held annually in Las Vegas Valley, Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include comp ...
9 in 2001.


Goolag campaign

In early 2006, the cDc launched the "Goolag" (a play on
gulag The Gulag was a system of Labor camp, forced labor camps in the Soviet Union. The word ''Gulag'' originally referred only to the division of the Chronology of Soviet secret police agencies, Soviet secret police that was in charge of runnin ...
, Soviet forced labour camps) campaign in response to
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
's decision to comply with China's Internet censorship policy and censor search results in the mainland-Chinese version of its search engine. The campaign consists primarily of the use of a parody of Google's logo which reads "Goolag: Exporting censorship, one search at a time." The group encouraged readers to make t-shirts and other merchandise and donate any proceeds from their sale to
Human Rights in China Human rights in the People's Republic of China are poor, as per reviews by international bodies, such as human rights treaty bodies and the United Nations Human Rights Council's Universal Periodic Review. The Chinese Communist Party (CCP), th ...
. Students for a Free Tibet held an anti-Google rally in Dharamsala,
India India, officially the Republic of India, is a country in South Asia. It is the List of countries and dependencies by area, seventh-largest country by area; the List of countries by population (United Nations), most populous country since ...
on February 14, 2006, employing the logo in a variety of ways. The cDc then issued a press release about the campaign, wherein it described
Microsoft Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
,
Yahoo! Yahoo (, styled yahoo''!'' in its logo) is an American web portal that provides the search engine Yahoo Search and related services including My Yahoo, Yahoo Mail, Yahoo News, Yahoo Finance, Yahoo Sports, y!entertainment, yahoo!life, and its a ...
, Google, and
Cisco Cisco Systems, Inc. (using the trademark Cisco) is an American multinational digital communications technology conglomerate corporation headquartered in San Jose, California. Cisco develops, manufactures, and sells networking hardware, s ...
as the "Gang of Four" due to their respective policies of compliance with the Beijing government's Internet policies. The
United States Congress The United States Congress is the legislature, legislative branch of the federal government of the United States. It is a Bicameralism, bicameral legislature, including a Lower house, lower body, the United States House of Representatives, ...
was also called out on this issue in the release. This press release, originally entitled "Congress jerks off, gang of four reach for raincoats," was picked up by many news sources, as an abbreviated version of it was distributed by PR Web (with the altered title of "Cult of the Dead Cow (cDc) Launches Campaign Against Internet Censorship in China").


Tools

The cDc has released several tools, for both hackers/
system administrator An IT administrator, system administrator, sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user computers, such as Server (computing), servers. The ...
s and for the general public. Many of these are related to
computer security Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
and are sometimes dubbed "hacker tools".


The Automated Prayer Project

The Automated Prayer Project, written by Javaman, is "a VT420 connected to a
Sun The Sun is the star at the centre of the Solar System. It is a massive, nearly perfect sphere of hot plasma, heated to incandescence by nuclear fusion reactions in its core, radiating the energy from its surface mainly as visible light a ...
Ultra5 via a
serial cable A serial cable or RS-232 cable is a electrical cable, cable used to transfer information between two devices using a serial communication protocol. The form of connectors depends on the particular serial port used. A cable wired for connecting two ...
which displays the output of a continuously running program. The signaling rate is limited to 9600
baud In telecommunications and electronics, baud (; symbol: Bd) is a common unit of measurement of symbol rate, which is one of the components that determine the speed of communication over a data channel. It is the unit for symbol rate or modulat ...
. The program itself cycles through the
Rosary The Rosary (; , in the sense of "crown of roses" or "garland of roses"), formally known as the Psalter of Jesus and Mary (Latin: Psalterium Jesu et Mariae), also known as the Dominican Rosary (as distinct from other forms of rosary such as the ...
, displaying a new individual prayer once every thirty seconds. Each individual prayer is then sent out via UDP to a random machine on the Internet on a random port."


Back Orifice

Back Orifice (often shortened to BO) is a
computer program A computer program is a sequence or set of instructions in a programming language for a computer to Execution (computing), execute. It is one component of software, which also includes software documentation, documentation and other intangibl ...
designed for remote system administration. It enables a user to control a computer running
Microsoft Windows Windows is a Product lining, product line of Proprietary software, proprietary graphical user interface, graphical operating systems developed and marketed by Microsoft. It is grouped into families and subfamilies that cater to particular sec ...
operating system from a remote location. The name is a
pun A pun, also known as a paronomasia in the context of linguistics, is a form of word play that exploits multiple meanings of a term, or of similar-sounding words, for an intended humorous or rhetorical effect. These ambiguities can arise from t ...
on
Microsoft BackOffice Server Microsoft BackOffice Server is a discontinued computer software package featuring Windows NT Server and other Microsoft server products that ran on NT Server. It was marketed during the 1990s and early 2000s for use in branch operations and for ...
software. The program debuted at
DEF CON DEF CON (also written as DEFCON, Defcon, or DC) is a Computer security conference, hacker convention held annually in Las Vegas Valley, Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include comp ...
6 on August 1, 1998. It was the brainchild of Sir Dystic. According to the group, its purpose was to demonstrate the lack of security in Microsoft's operating system Windows 98.


Back Orifice 2000

Back Orifice 2000 (often shortened to BO2k) is a computer program that is similar in function to Back Orifice. Back Orifice 2000 debuted on July 10, 1999 at DEF CON 7. The original code was written by Dildog. Whereas the original Back Orifice was limited to the
Windows 95 Windows 95 is a consumer-oriented operating system developed by Microsoft and the first of its Windows 9x family of operating systems, released to manufacturing on July 14, 1995, and generally to retail on August 24, 1995. Windows 95 merged ...
and
Windows 98 Windows 98 is a consumer-oriented operating system developed by Microsoft as part of its Windows 9x family of Microsoft Windows operating systems. It was the second operating system in the 9x line, as the successor to Windows 95. It was Software ...
operating systems, BO2k also supports
Windows NT Windows NT is a Proprietary software, proprietary Graphical user interface, graphical operating system produced by Microsoft as part of its Windows product line, the first version of which, Windows NT 3.1, was released on July 27, 1993. Original ...
,
Windows XP Windows XP is a major release of Microsoft's Windows NT operating system. It was released to manufacturing on August 24, 2001, and later to retail on October 25, 2001. It is a direct successor to Windows 2000 for high-end and business users a ...
and
Windows 2000 Windows 2000 is a major release of the Windows NT operating system developed by Microsoft, targeting the server and business markets. It is the direct successor to Windows NT 4.0, and was Software release life cycle#Release to manufacturing (RT ...
. Some BO2k client functionality has also been implemented for *nix-systems. In addition, BO2k was released under the GPL. As of 2012, BO2k is being actively developed.


Camera/Shy

Camera/Shy, originally called Peek-a-Booty, was the first Hacktivismo project released. It debuted in 2002 at the H.O.P.E. 2k2 convention in
New York City New York, often called New York City (NYC), is the most populous city in the United States, located at the southern tip of New York State on one of the world's largest natural harbors. The city comprises five boroughs, each coextensive w ...
. It is a
steganographic Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the concealed information would not be evident to an unsuspecting person's examination. In computing/ ...
tool that scans for and delivers decrypted content directly from the world wide web.Einhorn, Bruce.
Hackers to Beijing: Have a Cow!
." ''
Business Week ''Bloomberg Businessweek'', previously known as ''BusinessWeek'' (and before that ''Business Week'' and ''The Business Week''), is an American monthly business magazine published 12 times a year. The magazine debuted in New York City in Septembe ...
'' online edition, August 5, 2002. Retrieved July 19, 2006.


NBName

NBName is a computer program that can be used to carry out
denial-of-service attack In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host co ...
s that can disable
NetBIOS NetBIOS () is an acronym for Network Basic Input/Output System. It provides services related to the session layer of the OSI model allowing applications on separate computers to communicate over a local area network. As strictly an API, Net ...
services on Windows machines. It was written by Sir Dystic and released July 29, 2000 at the DEF CON 8 convention in Las Vegas.


ScatterChat

ScatterChat is an encrypted
instant messaging Instant messaging (IM) technology is a type of synchronous computer-mediated communication involving the immediate ( real-time) transmission of messages between two or more parties over the Internet or another computer network. Originally involv ...
client based on Gaim. It was written by J. Salvatore Testa II and released at the H.O.P.E. Number Six conference in New York City on July 22, 2006. It provides
encryption In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
as well as integrated
onion routing Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to the layers of an onion. The encrypted data is transmitted through a series o ...
with
Tor Tor, TOR or ToR may refer to: Places * Toronto, Canada ** Toronto Raptors * Tor, Pallars, a village in Spain * Tor, former name of Sloviansk, Ukraine, a city * Mount Tor, Tasmania, Australia, an extinct volcano * Tor Bay, Devon, England * Tor ...
, and secure file transfers. Various flaws in the software have been elaborated by researchers.


The Six/Four System

The Six/Four System is a
censorship Censorship is the suppression of speech, public communication, or other information. This may be done on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient". Censorship can be conducted by governmen ...
-resistant network proxy written by Mixter, a member of both cDc and Hacktivismo. It works by using "trusted peers" to relay network connections over SSL encrypted links. Hacktivismo and the cDc further gained notoriety in 2003 when the Six/Four System became the first product of a hacker group to receive approval from the
United States Department of Commerce The United States Department of Commerce (DOC) is an executive department of the U.S. federal government. It is responsible for gathering data for business and governmental decision making, establishing industrial standards, catalyzing econ ...
for export of strong encryption.


SMBRelay and SMBRelay2

SMBRelay and SMBRelay2 are computer programs that can be used to carry out SMB
man-in-the-middle attack In cryptography and computer security, a man-in-the-middle (MITM) attack, or on-path attack, is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communi ...
s on Windows machines. They were written by Sir Dystic and released March 21, 2001 at the @lantacon convention in
Atlanta, Georgia Atlanta ( ) is the List of capitals in the United States, capital and List of municipalities in Georgia (U.S. state), most populous city in the U.S. state of Georgia (U.S. state), Georgia. It is the county seat, seat of Fulton County, Georg ...
.


Torpark

XeroBank Browser (formerly known as Torpark) is a variant of the
Portable Firefox Mozilla Firefox, Portable Edition (formerly known as Portable Firefox and commonly known as Firefox Portable) is a repackaged version of Mozilla Firefox created by John T. Haller. The application allows Firefox to be run from a USB flash driv ...
web browser A web browser, often shortened to browser, is an application for accessing websites. When a user requests a web page from a particular website, the browser retrieves its files from a web server and then displays the page on the user's scr ...
with
Tor Tor, TOR or ToR may refer to: Places * Toronto, Canada ** Toronto Raptors * Tor, Pallars, a village in Spain * Tor, former name of Sloviansk, Ukraine, a city * Mount Tor, Tasmania, Australia, an extinct volcano * Tor Bay, Devon, England * Tor ...
built into it. Torpark is intended for use on portable media such as a
USB flash drive A flash drive (also thumb drive, memory stick, and pen drive/pendrive) is a data storage device that includes flash memory with an integrated USB interface. A typical USB drive is removable, rewritable, and smaller than an optical disc, and u ...
but it can also be used on any
hard disk drive A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating hard disk drive platter, pla ...
. cDc/Hacktivismo co-released v.1.5.0.7 along with Steve Topletz on September 19, 2006.


Veilid

Veilid is a peer-to-peer network and application framework, described as "like
Tor Tor, TOR or ToR may refer to: Places * Toronto, Canada ** Toronto Raptors * Tor, Pallars, a village in Spain * Tor, former name of Sloviansk, Ukraine, a city * Mount Tor, Tasmania, Australia, an extinct volcano * Tor Bay, Devon, England * Tor ...
, but for apps". It was released on August 11, 2023 at
DEF CON DEF CON (also written as DEFCON, Defcon, or DC) is a Computer security conference, hacker convention held annually in Las Vegas Valley, Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include comp ...
31 in Las Vegas.


Whisker

Whisker is a project authored by Rain Forest Puppy that is no longer in development. It checked for thousands of known security vulnerabilities in web servers. Whisker Version 1.4 was co-released by the cDc at DEF CON 8 in 2000.


See also

* '' 2600: The Hacker Quarterly'' *
Chaos Computer Club The Chaos Computer Club (CCC) is Europe's largest association of Hacker (computer security), hackers with 7,700 registered members. Founded in 1981, the association is incorporated as an ''eingetragener Verein'' in Germany, with local chapters ...
* DEADBEEF * H.O.P.E. *
Legion of Doom The Legion of Doom is a group of supervillains who originated in '' Challenge of the Superfriends'', an animated series from Hanna-Barbera based on DC Comics' Justice League. The Legion of Doom has since been incorporated into the main DC Univers ...
* Masters of Deception * Operation Cybersnare *
Phrack ''Phrack'' is an e-zine written by and for Hacker (computer security), hackers, first published November 17, 1985. It had a wide circulation which included both hackers and computer security professionals. Originally covering subjects related to ...


Notes


References


External links

* {{Cult of the Dead Cow Wikipedia articles with ASCII art Organizations established in 1984 Hacker groups 1984 establishments in Texas