Every year, after spring break, the Tech department at our school sifts through all of the offenses on the machines. Every year, a legendary nerd is banned from PC use for the rest of the year.
I've only been caught ONCE by the administrators, and all I got was a slap on the wrist because I didn't do anything that sucked bandwidth nor was it malicious.
I have done more this year than I have any other year. Particularly, I've been using a VERY powerful proxy made by a certain massassian. On top of that, I extended the hacking of msword that we did last year to give me full root access to the school's server. Nothing really special, but it allows me to netsend and access any dos prompts I want to, and run it on ALL the machines. Something I only did once on someone else's account.
To FURTHER the damage, the last day of school last year, I took a startup admin-boot disk for the entire system from the system room of the library during a poetry reading. It contained all of the admin passwords, as well as each and every student's passwords for the next year.
I've EVEN used teacher accounts to switch files around between student folders so that I and a friend had direct access to eachother's files [Quick file sharing] as well as unlimited space. I've got a text document with 2000 blank space characters after a seemingly harmless section of text. If I copy and paste the end of that file into a .bat, I have a quick-exicutable that hard-restarts the machine and lets me work on the machine OFF of the network, then access the network, along with the admin panel. The .bat then deletes itself. I didn't write it, a friend did. In fact, he was last year's "legend."
Everyone who I've been helping this year thinks I'll be the one they nab this year. They've already blocked all of the secrets I'd used, deleted the second half of that .txt, and changed a bunch of the teacher passwords I was using. There's probably a blazed trail of "BSG logged off.... admin logged onto the same machine 5 minutes later..." log files.
So, how do you think I should get out of it? I don't really use the machines at school at all this year ANYWAY, but when I do, I like to use a MACHINE, not a half-priviledged node that can access portioned bandwidth and minimalized file storage.
JediKirby
I fixed your spelling... -y
I've only been caught ONCE by the administrators, and all I got was a slap on the wrist because I didn't do anything that sucked bandwidth nor was it malicious.
I have done more this year than I have any other year. Particularly, I've been using a VERY powerful proxy made by a certain massassian. On top of that, I extended the hacking of msword that we did last year to give me full root access to the school's server. Nothing really special, but it allows me to netsend and access any dos prompts I want to, and run it on ALL the machines. Something I only did once on someone else's account.
To FURTHER the damage, the last day of school last year, I took a startup admin-boot disk for the entire system from the system room of the library during a poetry reading. It contained all of the admin passwords, as well as each and every student's passwords for the next year.
I've EVEN used teacher accounts to switch files around between student folders so that I and a friend had direct access to eachother's files [Quick file sharing] as well as unlimited space. I've got a text document with 2000 blank space characters after a seemingly harmless section of text. If I copy and paste the end of that file into a .bat, I have a quick-exicutable that hard-restarts the machine and lets me work on the machine OFF of the network, then access the network, along with the admin panel. The .bat then deletes itself. I didn't write it, a friend did. In fact, he was last year's "legend."
Everyone who I've been helping this year thinks I'll be the one they nab this year. They've already blocked all of the secrets I'd used, deleted the second half of that .txt, and changed a bunch of the teacher passwords I was using. There's probably a blazed trail of "BSG logged off.... admin logged onto the same machine 5 minutes later..." log files.
So, how do you think I should get out of it? I don't really use the machines at school at all this year ANYWAY, but when I do, I like to use a MACHINE, not a half-priviledged node that can access portioned bandwidth and minimalized file storage.
JediKirby
I fixed your spelling... -y
ᵗʰᵉᵇˢᵍ๒ᵍᵐᵃᶥᶫ∙ᶜᵒᵐ
ᴸᶥᵛᵉ ᴼᵑ ᴬᵈᵃᵐ
ᴸᶥᵛᵉ ᴼᵑ ᴬᵈᵃᵐ