⚠️ Encyclopedia Dramatica is currently being restored by automated scripts ⚠️
There's been a lot of questions as to what's going on with the site and what comes next. So we have this (ordered) roadmap of what's being worked on and what's to come. This will be updated until the roadmap is complete as Æ has a lot of missing features and ideas that I'd like to fix in regards to its offerings before I implement big plans for the site's popularity and well-being in 2021.
Æ Roadmap
Content restoration (Mostly done, few things missing that will be restored sporadically)
Image restoration (Being run in background, nothing I can do cept wait)
Æ Imageboard (Currently being worked on)
Mediawiki upgrade and backend fixes
.onion domain for Tor-friendly editing and viewing
CSS overhaul (Fixing things like the videos on mobile, and overall a rehaul of the wiki's look to be more friendly to readers)
Paid bounty board for new articles (Won't be managed by me for legal reasons however I will ensure it runs smoothly)
Anonymous phone # service for those seeking ban evades from Twitter as well as a phone number not tied to their name (more details at launch)
Currently we are nearing our annual LLC renewal fee ($650) as well throwing the funds required for these other changes and aspects. If you would like to support Æ consider purchasing a copy of The Hustler's Bible or securing some Merch. Donating is also appreciated however I would rather give something back as per the two options above.
If you have any questions you can join our public Telegram chat to DM me privately or @ me in chat.
You can also email me via [email protected]
Merch notes: Thank you to all who have purchased merch. We will ship late January or mid February depending on our provider's speed.
Here's to setting the world on fire in 2021!
- aediot
Is Your Son a Computer Hacker?
Is Your Son a Computer Hacker? is the name of a eight year old magnificent essay on Adequacy.org. Written by a wonderful human being with many redeeming qualities, the lulzy article is infamous for exposing hackers for who they really are: 13 year old boys who aren't really hackers. However, anyone under the age of 18 knows that it's nothing more than the misinformed musings of a concerned parent. They were, of course, wrong and posted hate mail, proving themselves to be idiots. Also notice how the names are characters from the Brady Bunch.
Contents
Eleven signs little Billy is a computer hacker
- Child asks to change ISP's.
- Child installs programs which aren't AOL or Calculator as all others are Autorun.gen.
- Child wants to upgrade his computer.
- Child wants to read books without the words Playboy or Bible in the title.
- Child wants to waste more than 30 minutes on the computer.
- Child plays Quake.
- Child swears.
- Child installs Lunix.
- Child dresses differently from others.
- Child sucks at school.
- Child is a furry
Quotes
“ | I keep a fatherly eye on the CDs they listen to and the shows they watch, the company they keep and the books they read. You could say I'm a model parent. | „ |
“ | Most American families use trusted and responsible Internet Service Providers, such as AOL. | „ |
“ | Popular hacker software includes "Comet Cursor", "Bonzi Buddy" and "Flash". | „ |
“ | You can best ensure that you are buying legal, trustworthy hardware by only buying replacement parts from your computer's manufacturer. | „ |
“ | Any father who has had a seventeen year old daughter attempt to sneak out on a date wearing make up and perfume is well aware of the effect that improper influences can have on inexperienced minds. | „ |
“ | [...] If you find any of these hacking manuals in your child's possession, confiscate them immediately. You should also petition local booksellers to remove these titles from their shelves. You may meet with some resistance at first, but even booksellers have to bow to community pressure. | „ |
“ | They may also be used to break into people's stereos to steal their music, using the "mp3" program. | „ |
“ | Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to YouTube on the internet without using a telephone. | „ |
“ | If you see the word "LILO" during your windows startup (just after you turn the machine on), your son has installed lunix. In order to get rid of it, you will have to send your computer back to the manufacturer, and have them fit a new hard drive. Lunix is extremely dangerous software, and cannot be removed without destroying part of your hard disk surface. | „ |
“ | If your son is failing courses in school, or performing poorly on sports teams, he may be involved in a hacking group, such as the infamous "Otaku" hacker association. | „ |
Responses
—Anonymous Reader, [1] |
—Anonymous Reader, [2] |
—Anonymous Reader, [3] |
Is Your Daughter a Computer Hacker?
No.
External
- Original article (archived here)
Is Your Son a Computer Hacker? is part of a series on Security Faggots |
1337 h4x0rz Captain Crunch • Cult of the Dead Cow • David L. Smith • Gary McKinnon • GOBBLES • HD Moore • Jeff Moss • Kevin Mitnick • Lance M. Havok • Robert Morris • Theo de Raadt • weev • Woz
Try-Hards
2cash • AnonOps • Brian Salcedo • Fearnor • Fry Guy • Gadi Evron • g00ns • Hack This Site • Hacking Team • hann • Joanna Rutkowska • John Field • Joseph Camp • Lizard Squad • LulzSec • Mark Zuckerberg • MarshviperX • Masters of Deception • Michael Lynn • Krashed • Raven • r000t • Ryan • Steve Gibson • th3j35t3r • The Regime • Sabu • Zeekill
Related Shit
Avira • Ciscogate • Cloudflare • Conficker • CyberDefender • Defcon • The Gibson • The Great Em/b/assy Security Leak of 2007 • Heartbleed • I GOT NORTON! • Is Your Son a Computer Hacker? • Operation Sundevil • PIFTS.exe • Social engineering • Stylometry • SubSeven • Zone-H |
---|