Capitol times. (Middletown, Pa.) 1982-2013, March 28, 1985, Image 6

Below is the OCR text representation for this newspapers page. It is also available as plain text as well as XML.

    Page 6 Thursday, March 28, 1985 The Capitol Times
/ / 14
Computer hackers surface at Capitol
here at Capitol," said Andrew of hie file," he said. "You "Many of us know the a payroll file," said Phil. "And
By Joseph Michalsky (not his real name), a computer don't need to break in." system here as well as or better a friend at Lehigh left school
hacker here at Capitol. While Andrew and Phil admit- than the professional staff," because he got caught giving
Do computer hackers exist Computers fascinate many ted to being hackers, Dan (not said Andrew. "Most of us work passwords (his own) to me and
here at Capitol Campus? Are students who want to learn his real name) took a different at the center and provide about twenty other people
programs being unknowingly everything about them. approach. .. assistance to the less informed. - across the country."
altered or copied?
"I am a hacker, or more ap- "I resent your negative What Andrew dislikes about
"I imagine there are propriately, a human being usage," he said. "You give the the computer center here at
(hackers)," said Terry Majzlik, who happens to be obsessed term 'hacker' a negative con-
I Capitol is the reliance of first
the Operations Coordinator for with computers," said Andrew. notation by associating it with— 1 time users on the operators for
the computer center here on "I want to learn everything I computer crime. Many hackers r---11asi.
•' \ help.
campus. "I don't like to see it," can about computers." are simply interested people
she said and added that Another hacker, Phil (not his who are doing nothing illegal." \ "It becomes difficult for
~. well-known hakers to get any
although hackers do exist, there real name) admitted to the An example would be the .---- - ''' m°' --- --- : • 7 - ; work done in the computer
is really no way to determine simplicity of obtaining someone "video games in the arcades,"
who the culprits are. elses program. • 1.- - ~";---.."---;:---.- ,1 - .-
he said. "Those games are corn- -,-;.....-- -
___-
- - - - - - - - • ' - '- •-5 % '' ::;s center, as they are constantly
____----- accosted for help by neophytes,
puters, too. Those programs -.:,,r" ---=----_______--
casual users and even other
"Hackers are an essential "If I want a program from
were often written by young -------- hackers," said Andrew.
part of the computer center someone else, I just copy it out
hackers."
"It is an unfortunate fact
FRANKLY SPEAKING phil frank Phil explained how he uses Getting caught is not part of that many , of the professors
Penn State's mail functicip to the plan but, as Phil pointed here give erroneous instructions
IRA, I-it- fLuNmy THE COMI'O7ISIZ. send information across the out, it can happen. for using the system to their
CouRSF... •.r DUI' NE LEARNED MT country. classes," he said. "Most of
ROUGH IV TIVOISFEg 4 Thin) of "I almost got booted out for these people are using the com-
All T's FOURTH aAR'rER vAieNiN&S "I collect interesting phone printing instruction manuals, so puter for the first time and it
i NiTo ms BANK AccouNr numbers and if a password I'm • not even gonna' try to falls on the shoulders of the
comes around, I'll get in and break into anything," he said. operators and/or hackers to
look around. I have a sequen
tial phone dialer, like the one in "A friend of mine almost got shepherd them through the
./1 "Wargames," and I use it to kicked out of Muhlenberg for many pitfalls to reasonable
A , - 11 A / find modem lines," said Phil. being falsely accused of deleting computer literacy."
0.,
P•G &
"I have friends who send ran-
dam touch tones to MCI,
_ i . SPRINT, etc., in order to find ARIA'S
• io ' /
4 '2 other peoples long distance
( Ir7..s \ codes. Then we send the using RESTAURANT ,
,
, _ , o ll og mation across the country using ,
__
aillidalr- 8.8.5. s (computer bulletin
.....--= - ft , fig"sr— board systems) or across PSU'
( /*A PVF MI DIA SI KVI( IS Box i 455 Berkeley , ( A q 4705 using the mail function." Opening in April
Do these hackers consider .
'Easy Net '
aids research • their methods of unauthorized Homemade Subs
entry a crime?
O
i
Sandwiches _ A
the traditional reference ser- "It depends what was intend- . ,
By Annette Childs vices of the library. On-line ed," said Phil. "There is Pizza 0° ,
,
On 'April 5, 1985, the searching by trained library nothing wrong with getting in- .
Heindel Library will begin of- faculty will still be available to to a mainframe's games-file - #
fering students, faculty and faculty for research and to and playing "Hunt-the- .
staff a pay-as-you-go system graduate students for approved Wumpus," but if you get into ' Serving breakfast, lunch & dinner
called Easy Net. thesis research. the tactical air command to
Easy Net is a menu-driven, Easy Net is expected to speed start a nuclear war, then you open 7 a.m. 12 midnight
,
on-line retrieval system which the process of finding research should go to jail." .
Jamesway Plaza Middletown
gives users access to hundreds material. And just how well do these 1
of commercially available Filler stated, "The average hackers know the system here .
databases in business, science, search takes about fifteen at Capitol Campus? , 944-1481 ,
,
engineering, medicine, social minutes, and the only dif- / _
N," •• -/ - '
sciences, arts and humanities, ference is that, the user has to
news and entertainment. pay for the search."
According to Mary Ann The retrieval system bills you Pre g nant?
Filler, Senior Assistant through your credit card; Disappointed in the results
Librarian at the Heindel American Express, VISA, or
Library, "It is a simplified Master Card. Or you can & need help... of your
method of on-line searching for establish an account number
Birthright volunteers
end users and requires no pre- with Easy Net.
offer alternatives to
registration, password, or According to Filler, "There
women facing problem
previous training in on-line are. no requirements, anyone MID TERMS
searching-you just simply pick can receive an account number pregnancies:
a topic and the computer picks by simply applying for it."
Free Pregnancy testing
the database and translates it Orientations for those in
for you." terested in using Easy Net will
Counseling It's not too late to
With the introduction of be held Monday through
Easy Net into the ODIN (Online Thursday, April 1-4, for two
Referrals take advantage of the
Database Information Net- hours at 10 a.m., 2 p.m. and 7
work) Services at Heindel p.m. Persons who wish to at- Maternity & Layette campus tutoring service.
Library, on-line searching has tend an orientation session
been extended to meet the should see one of the reference Wear
research needs of faculty, staff, librarians. 545-2211 will put you in
undergraduate and graduate "The use of the Easy Net touch with someone . For further information contact:
students needing a limited system is entirely at the discres- who cares.
George Young
number of references on, a par- sion of the user, and the
Wrisber
ticulax topic. Heindel Library will not be IRTHRIGHT g Hall
Easy Net, as a part of the responsible for any charges in- 948-6271
ODIN system, will supplement curred," stated Filler.