Cult of the Dead Cow, also known as cDc or cDc Communications, is a computer
hacker
A hacker is a person skilled in information technology who achieves goals and solves problems by non-standard means. The term has become associated in popular culture with a security hackersomeone with knowledge of bug (computing), bugs or exp ...
and
DIY media
Media may refer to:
Communication
* Means of communication, tools and channels used to deliver information or data
** Advertising media, various media, content, buying and placement for advertising
** Interactive media, media that is inter ...
organization founded in 1984 in
Lubbock, Texas
Lubbock ( )
is a city in the U.S. state of Texas and the county seat of Lubbock County. With a population of 272,086 in 2024, Lubbock is the 10th-most populous city in Texas and the 84th-most populous in the United States. The city is in the ...
. The group maintains a
weblog
A blog (a Clipping (morphology), truncation of "weblog") is an informational website consisting of discrete, often informal diary-style text entries also known as posts. Posts are typically displayed in Reverse chronology, reverse chronologic ...
on its site, also titled "
ult of the Dead Cow. New media are released first through the blog, which also features thoughts and opinions of the group's members.
Timeline
The group was formed in June 1984 at the Farm Pac
slaughterhouse
In livestock agriculture and the meat industry, a slaughterhouse, also called an abattoir (), is a facility where livestock animals are slaughtered to provide food. Slaughterhouses supply meat, which then becomes the responsibility of a mea ...
by
Grandmaster Ratte' (aka Swamp Ratte'), Franken Gibe, Sid Vicious, and three
BBS SysOp
A sysop (, an abbreviation of system operator) is an administrator of a multi-user computer system, such as a bulletin board system (BBS) or an online service virtual community.Jansen, E. & James, V. (2002). NetLingo: the Internet dictionary. Ne ...
s.
In the 1980s the Cult of the Dead Cow organized and maintained a loose collective of affiliated BBSs across the US and Canada. It was during this time that the cDc is credited with coining the term "31337" as an alternative spelling of "
Eleet" or "Elite", an expression denoting skill or greatness in a person, place, or thing.
In December 1990, cDc member Jesse Dryden (aka Drunkfux), the son of
Jefferson Airplane
Jefferson Airplane was an American Rock music, rock band formed in San Francisco, California, in 1965. One of the pioneering bands of psychedelic rock, the group defined the San Francisco Sound and was the first from the San Francisco Bay Area, ...
drummer
Spencer Dryden and grand nephew of
Charlie Chaplin
Sir Charles Spencer Chaplin (16 April 188925 December 1977) was an English comic actor, filmmaker, and composer who rose to fame in the era of silent film. He became a worldwide icon through his screen persona, the Tramp, and is considered o ...
, created
HoHoCon. It was the first modern
hacker conference
A computer security conference is a Convention (meeting), convention for individuals involved in computer security. They generally serve as meeting places for System administrator, system and network administrators, hacker (computer security), hac ...
, which invites the participation of both
journalists
A journalist is a person who gathers information in the form of text, audio or pictures, processes it into a newsworthy form and disseminates it to the public. This is called journalism.
Roles
Journalists can work in broadcast, print, advertis ...
and law enforcement. It is usually held in
Houston, Texas
Houston ( ) is the List of cities in Texas by population, most populous city in the U.S. state of Texas and in the Southern United States. Located in Southeast Texas near Galveston Bay and the Gulf of Mexico, it is the county seat, seat of ...
. In all, dFx hosted five annual HoHoCons.
In 1991, cDc was named "Sassiest Underground Computer Group" by ''
Sassy'' magazine. Also in 1991, the group began distributing music in the form of
cassette tape
The Compact Cassette, also commonly called a cassette tape, audio cassette, or simply tape or cassette, is an analog audio, analog magnetic tape recording format for Sound recording and reproduction, audio recording and playback. Invented by L ...
albums sold through its
post office box
A post office box (commonly abbreviated as P.O. box, or also known as a postal box) is a uniquely addressable lockable box located on the premises of a post office.
In some regions, particularly in Africa, there is no door-to-door delivery ...
. Many of these albums are now available online in their entirety.
October 1994 saw the creation of the cDc's
Usenet
Usenet (), a portmanteau of User's Network, is a worldwide distributed discussion system available on computers. It was developed from the general-purpose UUCP, Unix-to-Unix Copy (UUCP) dial-up network architecture. Tom Truscott and Jim Elli ...
newsgroup
A Usenet newsgroup is a repository usually within the Usenet system for messages posted from users in different locations using the Internet. They are not only discussion groups or conversations, but also a repository to publish articles, start ...
, alt.fan.cult-dead-cow. It was thus the first hacking group to have its own Usenet newsgroup. In November of that year, the group claimed responsibility for giving
Ronald Reagan
Ronald Wilson Reagan (February 6, 1911 – June 5, 2004) was an American politician and actor who served as the 40th president of the United States from 1981 to 1989. He was a member of the Republican Party (United States), Republican Party a ...
Alzheimer's disease
Alzheimer's disease (AD) is a neurodegenerative disease and the cause of 60–70% of cases of dementia. The most common early symptom is difficulty in remembering recent events. As the disease advances, symptoms can include problems wit ...
, claiming to have done so in 1986 with a
blowgun
A blowgun (also called a blowpipe or blow tube) is a simple ranged weapon consisting of a long narrow tube for shooting light projectiles such as darts. It operates by having the projectile placed inside the pipe and using the force created by ...
.
The cDc declared war on the
Church of Scientology
The Church of Scientology is a group of interconnected corporate entities and other organizations devoted to the practice, administration and dissemination of Scientology, which is variously defined as a cult, a business, or a new religiou ...
in 1995 during the
alt.religion.scientology controversy, stating
In 1997, the cDc began distributing original
MP3
MP3 (formally MPEG-1 Audio Layer III or MPEG-2 Audio Layer III) is a coding format for digital audio developed largely by the Fraunhofer Society in Germany under the lead of Karlheinz Brandenburg. It was designed to greatly reduce the amount ...
-format music on its website.
In August 1998, they presented their popular
Back Orifice tool at
DEF CON 6.
In February 2000, the cDc was the subject of an 11-minute
documentary
A documentary film (often described simply as a documentary) is a nonfiction Film, motion picture intended to "document reality, primarily for instruction, education or maintaining a Recorded history, historical record". The American author and ...
short titled "Disinformation". Also in February 2000, cDc member
Mudge briefed President
Bill Clinton
William Jefferson Clinton (né Blythe III; born August 19, 1946) is an American politician and lawyer who was the 42nd president of the United States from 1993 to 2001. A member of the Democratic Party (United States), Democratic Party, ...
on Internet security.
cDc communications
cDc communications is the parent organisation of Cult of the Dead Cow, one of three groups that fall under cDc communications. The other two are the
Ninja Strike Force and
Hacktivismo.
Ninja Strike Force
In 1996, the cDc announced the birth of its Ninja Strike Force, a group of "
ninja
A , or was a spy and infiltrator in pre-modern Japan. The functions of a ninja included siege and infiltration, ambush, reconnaissance, espionage, deception, and later bodyguarding.Kawakami, pp. 21–22 Antecedents may have existed as ear ...
" dedicated to achieving the goals of the cDc, an intervention task force both online and offline. The cDc opened the NSF Dojo in 2004. An "NSF Dojo" Member also operates a streaming radio station, which features recordings of
hacker con presentations and other educational programming in addition to a wide range of musical styles and artists.
Membership in the NSF is granted by the cDc to those individuals who stand out in their support of the cDc and its ideals. Members are recognized for their abilities, capabilities, and being the best of the best in their skills.
In 2006 the Ninja Strike Force launched its own
microsite
A microsite is an individual web page or a small cluster of pages which are meant to function as a discrete entity (such as an iFrame) within an existing website or to complement an offline activity. The microsite's main landing page can have its ...
.
Hacktivismo
In late 1999, the cDc created Hacktivismo, an independent group under the cDc communications umbrella dedicated to the creation of anti-
censorship
Censorship is the suppression of speech, public communication, or other information. This may be done on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient". Censorship can be conducted by governmen ...
technology in furtherance of
human rights
Human rights are universally recognized Morality, moral principles or Social norm, norms that establish standards of human behavior and are often protected by both Municipal law, national and international laws. These rights are considered ...
on the
Internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
. The group's beliefs are described fully in The Hacktivismo Declaration, which seeks to apply the
Universal Declaration of Human Rights
The Universal Declaration of Human Rights (UDHR) is an international document adopted by the United Nations General Assembly that enshrines the Human rights, rights and freedoms of all human beings. Drafted by a UN Drafting of the Universal D ...
and the
International Covenant on Civil and Political Rights
The International Covenant on Civil and Political Rights (ICCPR) is a multilateral treaty that commits nations to respect the civil and political rights of individuals, including the right to life, freedom of religion, freedom of speech, freedom ...
to the
Internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
. Among Hacktivismo's beliefs include access to information as a basic
human right
Human rights are universally recognized moral principles or norms that establish standards of human behavior and are often protected by both national and international laws. These rights are considered inherent and inalienable, meaning t ...
. The organization partially shares
Critical Art Ensemble's (CAE) belief in the value of secrecy, but challenges both with CAE and many
hacktivist
Hacktivism (or hactivism; a portmanteau of '' hack'' and ''activism''), is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. A form of Internet activism with roo ...
s on the subject of civil disobedience. The cDc model is, instead, one of disruptive compliance.
[Wardrip-Fruin, Noah and Nick Montfort, ed (2003). The New Media Reader. pp.782. The MIT Press. .] Disruptive, in this case, refers to disruptive technology; compliance refers back to the Internet and its original intent of constructive free-flow and openness. Hacktivismo has also authored its own
software license
A software license is a legal instrument governing the use or redistribution of software.
Since the 1970s, software copyright has been recognized in the United States. Despite the copyright being recognized, most companies prefer to sell lic ...
agreement, the
Hacktivismo Enhanced-Source Software License Agreement, which is source available (but not
open source
Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use and view the source code, design documents, or content of the product. The open source model is a decentrali ...
). Their work focuses on the development of software that empowers conduct forbidden by repression, rather than enabling (private or public) attacks on repressors.
In general cDc hopes that open code can become the
lingua franca
A lingua franca (; ; for plurals see ), also known as a bridge language, common language, trade language, auxiliary language, link language or language of wider communication (LWC), is a Natural language, language systematically used to make co ...
of a
hacktivism
Hacktivism (or hactivism; a portmanteau of ''hack'' and ''activism''), is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. A form of Internet activism with roots ...
that seeks to wage peace, not war. While the term isn't used, the software described in cDc's "Waging of Peace on the Internet" would create a set of connections between dissidents that sound in technoliberationist terms,
rhizomatic.
Crossover associations with other groups

In addition to the obvious associations between Cult of the Dead Cow, Hacktivismo, and the Ninja Strike Force, the cDc also has crossover associations with several other organizations. These include the
L0pht; founding members White Knight and Count Zero and final members
Dildog and
Mudge are all members of cDc. Additionally, The Nightstalker was a member of
Youth International Party Line/Technology Assistance Program.
Lord Digital, one of the founders of
Mindvox, is a former member of
LOD/H and a current member of the
Sacrament of Transition. Red Knight was a member of the
Masters of Deception. Also,
RaD Man, a member of the Ninja Strike Force, is one of the founders of
ACiD Productions. Another NSF member, Mark Hinge, is a founding member of the British hacker group The Syndicate Of London. Flack, another Ninja Strike Force member, was a co-founder of the horror "lit group"
Soulz at Zero.
Mudge later went on to program manage the
CINDER
Cinder or Cinders may refer to:
In general
* Ember, also called cinder
* Ash, also called cinder
* Scoria, or cinder, a type of volcanic rock
In computing
* Cinder (programming library), a C++ programming library for visualization
*Cinder, Ope ...
program at DARPA, which aimed to detect 'insider threats' like the
WikiLeaks
WikiLeaks () is a non-profit media organisation and publisher of leaked documents. It is funded by donations and media partnerships. It has published classified documents and other media provided by anonymous sources. It was founded in 2006 by ...
sources.
[Darpa’s Star Hacker Looks to WikiLeak-Proof Pentagon]
, Spencer Ackerman, Wired, August 31, 2010, retr 2011 12 5
Electronic publication
During the 1980s, the cDc was well known throughout the
BBS scene for their
underground ezine, also called ''Cult of the Dead Cow''. The group claims to have invented the
ezine
An online magazine is a magazine published on the Internet, through bulletin board systems and other forms of public computer networks. One of the first magazines to convert from a print magazine format to an online only magazine was the computer ...
.
The Cult of the Dead Cow has been credited with coining the term "elite" as used in the hacker scene/computer underground in cDc textfiles of the 1980s.
The ezine has led to some criticism of the group over the years; in a 1994 episode of ''Geraldo'' entitled "Computer Vice,"
Geraldo Rivera
Geraldo Rivera (born Gerald Rivera; July 4, 1943) is an American journalist, attorney, author, and political commentator who worked at the Fox News Channel from 2001 to 2023. He hosted the tabloid talk show '' Geraldo'' from 1987 to 1998. He g ...
referred to the group as "a bunch of sickos" for having published an article called "Sex with Satan," originally published in 1988.
Hacktivism
In 1996, cDc member Omega coined the term "
hacktivism
Hacktivism (or hactivism; a portmanteau of ''hack'' and ''activism''), is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. A form of Internet activism with roots ...
" in an email to other group members. The group has been active in hacktivist causes since that time.
Hong Kong Blondes Hoax
In 1997, the cDc claimed to have worked with a group of Chinese dissidents called "The Hong Kong Blondes," and through a series of public statements and media coverage created a narrative about an activist group operating within the
People's Republic of China
China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
that could disrupt computer networks within that country in order to allow citizens to access censored content online. In time, it emerged that the group was, in fact, fictitious, though the story about its capabilities and aims briefly took on a life of its own.
The cDc first spoke about the Hong Kong Blondes publicly in a presentation at the 1997
Beyond HOPE Conference held at The
Puck Building
The Puck Building is a mixed-use building at 295–309 Lafayette Street in the SoHo, Manhattan, SoHo and Nolita neighborhoods of Manhattan in New York City, New York, U.S. The building was designed by Albert Wagner (architect), Albert Wagner i ...
in
New York City
New York, often called New York City (NYC), is the most populous city in the United States, located at the southern tip of New York State on one of the world's largest natural harbors. The city comprises five boroughs, each coextensive w ...
. Members claimed to have advised the group on
strong encryption techniques. In remarks and an interview with
Wired
Wired may refer to:
Arts, entertainment, and media Music
* ''Wired'' (Jeff Beck album), 1976
* ''Wired'' (Hugh Cornwell album), 1993
* ''Wired'' (Mallory Knox album), 2017
* "Wired", a song by Prism from their album '' Beat Street''
* "Wired ...
, the cDc claimed that the Hong Kong Blondes had 20 members, including "three highly placed technicians" as well as some government bureaucrats in Beijing, and was led by a dissident physicist living in Toronto. They further claimed, without offering evidence, that the Blondes had temporarily disabled a Chinese communications satellite as a way of "introducing itself" to authorities. The claims were all sourced to the cDc's Foreign Minister,
Oxblood Ruffin.
In 1998, Ruffin published a transcript of a purported interview with Blondie Wong claiming that the Blondes were forming an affiliate group of hackers and activists based in North America and Europe, aiming to support the cause of human rights in China. The contents of the interview were covered by Wired and by
Naomi Klein
Naomi Klein (born May 8, 1970) is a Canadian author, social activist, and filmmaker known for her political analyses; support of ecofeminism, organized labour, and criticism of corporate globalization, fascism and Criticism of capitalism, ca ...
, then a journalist for The Toronto Star. Later in 1998, the cDc issued a statement in which it claimed to have formally severed ties with the Hong Kong Blondes.
Despite having offered no verifiable evidence of any hacking activity within China, or even the existence of any members of the Hong Kong Blondes, the claims garnered media attention from outlets including Wired,
The Los Angeles Times
The ''Los Angeles Times'' is an American daily newspaper that began publishing in Los Angeles, California, in 1881. Based in the Greater Los Angeles city of El Segundo since 2018, it is the sixth-largest newspaper in the U.S. and the larges ...
,
U.S. News & World Report and
The Toronto Star
The ''Toronto Star'' is a Canadian English-language broadsheet daily newspaper. It is owned by Toronto Star Newspapers Limited, a subsidiary of Torstar Corporation and part of Torstar's Daily News Brands division.
The newspaper was establis ...
. The coverage caught the attention of
National Security Advisor Richard A. Clarke. In a private
White House
The White House is the official residence and workplace of the president of the United States. Located at 1600 Pennsylvania Avenue Northwest (Washington, D.C.), NW in Washington, D.C., it has served as the residence of every U.S. president ...
meeting with Clarke and President
Bill Clinton
William Jefferson Clinton (né Blythe III; born August 19, 1946) is an American politician and lawyer who was the 42nd president of the United States from 1993 to 2001. A member of the Democratic Party (United States), Democratic Party, ...
in 2000, Clarke asked about the group. Mudge admitted, "We made them up." In social media post in 2015, Oxblood conceded that the Hong Kong Blondes amounted to publicity campaign the point of which was to create cover for the extraction of seven Chinese pro-democracy activists, though he offered no evidence that such an operation occurred.
Cyberwar
On January 7, 1999, the cDc joined with an international coalition of hackers to denounce a call to cyberwar against the governments of
China
China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
and
Iraq
Iraq, officially the Republic of Iraq, is a country in West Asia. It is bordered by Saudi Arabia to Iraq–Saudi Arabia border, the south, Turkey to Iraq–Turkey border, the north, Iran to Iran–Iraq border, the east, the Persian Gulf and ...
.
Milošević trial
When questioning
Patrick Ball during his
International War Crimes Tribunal in 2002,
Slobodan Milošević
Slobodan Milošević ( sr-Cyrl, Слободан Милошевић, ; 20 August 1941 – 11 March 2006) was a Yugoslav and Serbian politician who was the President of Serbia between 1989 and 1997 and President of the Federal Republic of Yugos ...
asked Ball about his relationship with the cDc. Ball had given a talk and been a member of a cDc-sponsored panel on hacktivism at
DEF CON
DEF CON (also written as DEFCON, Defcon, or DC) is a Computer security conference, hacker convention held annually in Las Vegas Valley, Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include comp ...
9 in 2001.
Goolag campaign
In early 2006, the cDc launched the "Goolag" (a play on
gulag
The Gulag was a system of Labor camp, forced labor camps in the Soviet Union. The word ''Gulag'' originally referred only to the division of the Chronology of Soviet secret police agencies, Soviet secret police that was in charge of runnin ...
, Soviet forced labour camps) campaign in response to
Google
Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
's decision to comply with
China's Internet censorship policy and
censor search results in the
mainland-Chinese version of its search engine. The campaign consists primarily of the use of a parody of Google's logo which reads "Goolag: Exporting censorship, one search at a time." The group encouraged readers to make t-shirts and other merchandise and donate any proceeds from their sale to
Human Rights in China
Human rights in the People's Republic of China are poor, as per reviews by international bodies, such as human rights treaty bodies and the United Nations Human Rights Council's Universal Periodic Review. The Chinese Communist Party (CCP), th ...
.
Students for a Free Tibet held an anti-Google rally in
Dharamsala,
India
India, officially the Republic of India, is a country in South Asia. It is the List of countries and dependencies by area, seventh-largest country by area; the List of countries by population (United Nations), most populous country since ...
on February 14, 2006, employing the logo in a variety of ways. The cDc then issued a press release about the campaign, wherein it described
Microsoft
Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
,
Yahoo!
Yahoo (, styled yahoo''!'' in its logo) is an American web portal that provides the search engine Yahoo Search and related services including My Yahoo, Yahoo Mail, Yahoo News, Yahoo Finance, Yahoo Sports, y!entertainment, yahoo!life, and its a ...
, Google, and
Cisco
Cisco Systems, Inc. (using the trademark Cisco) is an American multinational digital communications technology conglomerate corporation headquartered in San Jose, California. Cisco develops, manufactures, and sells networking hardware, s ...
as the "Gang of Four" due to their respective policies of compliance with the Beijing government's Internet policies. The
United States Congress
The United States Congress is the legislature, legislative branch of the federal government of the United States. It is a Bicameralism, bicameral legislature, including a Lower house, lower body, the United States House of Representatives, ...
was also called out on this issue in the release. This press release, originally entitled "Congress jerks off, gang of four reach for raincoats," was picked up by many news sources, as an abbreviated version of it was distributed by
PR Web (with the altered title of "Cult of the Dead Cow (cDc) Launches Campaign Against Internet Censorship in China").
Tools
The cDc has released several tools, for both hackers/
system administrator
An IT administrator, system administrator, sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user computers, such as Server (computing), servers. The ...
s and for the general public. Many of these are related to
computer security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
and are sometimes dubbed "hacker tools".
The Automated Prayer Project
The Automated Prayer Project, written by Javaman, is "a
VT420 connected to a
Sun
The Sun is the star at the centre of the Solar System. It is a massive, nearly perfect sphere of hot plasma, heated to incandescence by nuclear fusion reactions in its core, radiating the energy from its surface mainly as visible light a ...
Ultra5 via a
serial cable
A serial cable or RS-232 cable is a electrical cable, cable used to transfer information between two devices using a serial communication protocol. The form of connectors depends on the particular serial port used. A cable wired for connecting two ...
which displays the output of a continuously running program. The signaling rate is limited to 9600
baud
In telecommunications and electronics, baud (; symbol: Bd) is a common unit of measurement of symbol rate, which is one of the components that determine the speed of communication over a data channel.
It is the unit for symbol rate or modulat ...
. The program itself cycles through the
Rosary
The Rosary (; , in the sense of "crown of roses" or "garland of roses"), formally known as the Psalter of Jesus and Mary (Latin: Psalterium Jesu et Mariae), also known as the Dominican Rosary (as distinct from other forms of rosary such as the ...
, displaying a new individual prayer once every thirty seconds. Each individual prayer is then sent out via
UDP to a random machine on the Internet on a random port."
Back Orifice
Back Orifice (often shortened to BO) is a
computer program
A computer program is a sequence or set of instructions in a programming language for a computer to Execution (computing), execute. It is one component of software, which also includes software documentation, documentation and other intangibl ...
designed for remote system administration. It enables a user to control a computer running
Microsoft Windows
Windows is a Product lining, product line of Proprietary software, proprietary graphical user interface, graphical operating systems developed and marketed by Microsoft. It is grouped into families and subfamilies that cater to particular sec ...
operating system from a remote location. The name is a
pun
A pun, also known as a paronomasia in the context of linguistics, is a form of word play that exploits multiple meanings of a term, or of similar-sounding words, for an intended humorous or rhetorical effect. These ambiguities can arise from t ...
on
Microsoft BackOffice Server
Microsoft BackOffice Server is a discontinued computer software package featuring Windows NT Server and other Microsoft server products that ran on NT Server. It was marketed during the 1990s and early 2000s for use in branch operations and for ...
software. The program debuted at
DEF CON
DEF CON (also written as DEFCON, Defcon, or DC) is a Computer security conference, hacker convention held annually in Las Vegas Valley, Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include comp ...
6 on August 1, 1998. It was the brainchild of
Sir Dystic. According to the group, its purpose was to demonstrate the lack of security in Microsoft's operating system Windows 98.
Back Orifice 2000

Back Orifice 2000 (often shortened to BO2k) is a computer program that is similar in function to Back Orifice. Back Orifice 2000 debuted on July 10, 1999 at DEF CON 7. The original code was written by
Dildog. Whereas the original Back Orifice was limited to the
Windows 95
Windows 95 is a consumer-oriented operating system developed by Microsoft and the first of its Windows 9x family of operating systems, released to manufacturing on July 14, 1995, and generally to retail on August 24, 1995. Windows 95 merged ...
and
Windows 98
Windows 98 is a consumer-oriented operating system developed by Microsoft as part of its Windows 9x family of Microsoft Windows operating systems. It was the second operating system in the 9x line, as the successor to Windows 95. It was Software ...
operating systems, BO2k also supports
Windows NT
Windows NT is a Proprietary software, proprietary Graphical user interface, graphical operating system produced by Microsoft as part of its Windows product line, the first version of which, Windows NT 3.1, was released on July 27, 1993. Original ...
,
Windows XP
Windows XP is a major release of Microsoft's Windows NT operating system. It was released to manufacturing on August 24, 2001, and later to retail on October 25, 2001. It is a direct successor to Windows 2000 for high-end and business users a ...
and
Windows 2000
Windows 2000 is a major release of the Windows NT operating system developed by Microsoft, targeting the server and business markets. It is the direct successor to Windows NT 4.0, and was Software release life cycle#Release to manufacturing (RT ...
. Some BO2k client functionality has also been implemented for *nix-systems. In addition, BO2k was released under the
GPL. As of 2012, BO2k is being actively developed.
Camera/Shy
Camera/Shy, originally called Peek-a-Booty, was the first Hacktivismo project released. It debuted in 2002 at the
H.O.P.E. 2k2 convention in
New York City
New York, often called New York City (NYC), is the most populous city in the United States, located at the southern tip of New York State on one of the world's largest natural harbors. The city comprises five boroughs, each coextensive w ...
. It is a
steganographic
Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the concealed information would not be evident to an unsuspecting person's examination. In computing/ ...
tool that scans for and delivers decrypted content directly from the world wide web.
[Einhorn, Bruce.]
Hackers to Beijing: Have a Cow!
." ''Business Week
''Bloomberg Businessweek'', previously known as ''BusinessWeek'' (and before that ''Business Week'' and ''The Business Week''), is an American monthly business magazine published 12 times a year. The magazine debuted in New York City in Septembe ...
'' online edition, August 5, 2002. Retrieved July 19, 2006.
NBName
NBName is a computer program that can be used to carry out
denial-of-service attack
In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host co ...
s that can disable
NetBIOS
NetBIOS () is an acronym for Network Basic Input/Output System. It provides services related to the session layer of the OSI model allowing applications on separate computers to communicate over a local area network. As strictly an API, Net ...
services on Windows machines. It was written by
Sir Dystic and released July 29, 2000 at the DEF CON 8 convention in Las Vegas.
ScatterChat
ScatterChat is an encrypted
instant messaging
Instant messaging (IM) technology is a type of synchronous computer-mediated communication involving the immediate ( real-time) transmission of messages between two or more parties over the Internet or another computer network. Originally involv ...
client based on
Gaim. It was written by J. Salvatore Testa II and released at the H.O.P.E. Number Six conference in New York City on July 22, 2006. It provides
encryption
In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
as well as integrated
onion routing
Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to the layers of an onion. The encrypted data is transmitted through a series o ...
with
Tor
Tor, TOR or ToR may refer to:
Places
* Toronto, Canada
** Toronto Raptors
* Tor, Pallars, a village in Spain
* Tor, former name of Sloviansk, Ukraine, a city
* Mount Tor, Tasmania, Australia, an extinct volcano
* Tor Bay, Devon, England
* Tor ...
, and secure file transfers. Various flaws in the software have been elaborated by researchers.
The Six/Four System
The Six/Four System is a
censorship
Censorship is the suppression of speech, public communication, or other information. This may be done on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient". Censorship can be conducted by governmen ...
-resistant
network proxy written by
Mixter, a member of both cDc and Hacktivismo. It works by using "trusted peers" to relay network connections over SSL encrypted links. Hacktivismo and the cDc further gained notoriety in 2003 when the Six/Four System became the first product of a hacker group to receive approval from the
United States Department of Commerce
The United States Department of Commerce (DOC) is an executive department of the U.S. federal government. It is responsible for gathering data for business and governmental decision making, establishing industrial standards, catalyzing econ ...
for export of strong encryption.
SMBRelay and SMBRelay2
SMBRelay and SMBRelay2 are computer programs that can be used to carry out
SMB man-in-the-middle attack
In cryptography and computer security, a man-in-the-middle (MITM) attack, or on-path attack, is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communi ...
s on Windows machines. They were written by
Sir Dystic and released March 21, 2001 at the @lantacon convention in
Atlanta, Georgia
Atlanta ( ) is the List of capitals in the United States, capital and List of municipalities in Georgia (U.S. state), most populous city in the U.S. state of Georgia (U.S. state), Georgia. It is the county seat, seat of Fulton County, Georg ...
.
Torpark
XeroBank Browser (formerly known as Torpark) is a variant of the
Portable Firefox
Mozilla Firefox, Portable Edition (formerly known as Portable Firefox and commonly known as Firefox Portable) is a repackaged version of Mozilla Firefox created by John T. Haller. The application allows Firefox to be run from a USB flash driv ...
web browser
A web browser, often shortened to browser, is an application for accessing websites. When a user requests a web page from a particular website, the browser retrieves its files from a web server and then displays the page on the user's scr ...
with
Tor
Tor, TOR or ToR may refer to:
Places
* Toronto, Canada
** Toronto Raptors
* Tor, Pallars, a village in Spain
* Tor, former name of Sloviansk, Ukraine, a city
* Mount Tor, Tasmania, Australia, an extinct volcano
* Tor Bay, Devon, England
* Tor ...
built into it. Torpark is intended for use on
portable media such as a
USB flash drive
A flash drive (also thumb drive, memory stick, and pen drive/pendrive) is a data storage device that includes flash memory with an integrated USB interface. A typical USB drive is removable, rewritable, and smaller than an optical disc, and u ...
but it can also be used on any
hard disk drive
A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating hard disk drive platter, pla ...
. cDc/Hacktivismo co-released v.1.5.0.7 along with Steve Topletz on September 19, 2006.
Veilid
Veilid is a peer-to-peer network and application framework, described as "like
Tor
Tor, TOR or ToR may refer to:
Places
* Toronto, Canada
** Toronto Raptors
* Tor, Pallars, a village in Spain
* Tor, former name of Sloviansk, Ukraine, a city
* Mount Tor, Tasmania, Australia, an extinct volcano
* Tor Bay, Devon, England
* Tor ...
, but for apps". It was released on August 11, 2023 at
DEF CON
DEF CON (also written as DEFCON, Defcon, or DC) is a Computer security conference, hacker convention held annually in Las Vegas Valley, Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include comp ...
31 in Las Vegas.
Whisker
Whisker is a project authored by Rain Forest Puppy that is no longer in development. It checked for thousands of known security vulnerabilities in web servers.
Whisker Version 1.4 was co-released by the cDc at DEF CON 8 in 2000.
See also
* ''
2600: The Hacker Quarterly''
*
Chaos Computer Club
The Chaos Computer Club (CCC) is Europe's largest association of Hacker (computer security), hackers with 7,700 registered members. Founded in 1981, the association is incorporated as an ''eingetragener Verein'' in Germany, with local chapters ...
*
DEADBEEF
*
H.O.P.E.
*
Legion of Doom
The Legion of Doom is a group of supervillains who originated in '' Challenge of the Superfriends'', an animated series from Hanna-Barbera based on DC Comics' Justice League. The Legion of Doom has since been incorporated into the main DC Univers ...
*
Masters of Deception
*
Operation Cybersnare
*
Phrack
''Phrack'' is an e-zine written by and for Hacker (computer security), hackers, first published November 17, 1985. It had a wide circulation which included both hackers and computer security professionals.
Originally covering subjects related to ...
Notes
References
External links
*
{{Cult of the Dead Cow
Wikipedia articles with ASCII art
Organizations established in 1984
Hacker groups
1984 establishments in Texas