If there’s a Facebook in heaven…

Buddha statue

If there’s a Facebook in heaven….. well, mom, I know that you’re following me. (Hello, I can see my followers). With that being said, I think it’s only right that I be the first one to tell you feliz cumpleanos, mamita’. Happy Birthday! We love and miss you. I’m sure that you have a lot of partying ahead of ya when you guys get out of church this morning so I’ll let you get back to it. Tell everyone that I said, “what’s up?”. Ya me voy. Las nietas se despiertan. Besos…..

Will exam results decide our fate?

What started as an assignment for my Public Speaking course turned into an opportunity for me to quote what I feel is one of the most inspirational spoken word pieces of our generation. For short it’s called Exam Results by Suli Breaks. This is a message that speaks to and for an entire generation of students of all walks and ages who struggle with the stress of trying to make the grade, feeling that otherwise they’re future and place in society is useless. On the other hand, it also addresses the society and parents who hold these unrealistic standards over their children’s head. Enjoy….

The Three Jewels

The pot, the soil, and the water.

These are the three components that are crucial to the overall growth and development of the plant. The pot is the plants underlying temporary environment. The place where it is to be molded and shaped into what it will become. The soil is important because it holds the roots that provide support and store nutrients. And just as water is the life-blood of all living things, this is equally important to the plant. Without the proper amount of water it is impossible for the plant to grow and develop successfully. Now, if I were to draw upon a synonym (hence, symbology) and liken my life to a plant that needs the pot, the soil, and the water. I can see clearly how these three components are crucial to my overall development and have been in the past.

The pot, the soil, and the water.

The pot is a container. This container for me is representative of the communities that I have been fortunate enough,
or rather,
unfortunate enough to be molded by.
Unfortunately these containers were by far, NO PLACE IDEAL
to nurture and foster the growth and development of a healthy individual.
But fortunately,
these pots have taught me some of the greatest lessons that I have sustained,
and helped me navigate through this minefield of a maze that I call a chapter in life…..
The lessons on what NOT to do.

The pot, the soil, and the water.

The soil represents my relationships. Relationships have been the soil in which I’ve grown intellectually and psychologically. I’ve had soil around me of poor quality which has only served to stunt my growth. But on the other hand….
I’ve been in the midst of a lot of good sand which has helped me grow stronger and more mature as a man.
Thus, I’m a firm believer that there can be NO REAL GROWTH,
intellectually, psychologically or otherwise without good relationships. Bad relationships are poisonous soil.

The pot, the soil, and the water.

The water represents my flexibility. Just as the plant cannot survive without water,
I know that it is impossible for me to grow and continue to strive without being flexible.
The water represents my persistence.
Just as the plant cannot grow without a persistent flow of water,
I know that it is my long term persistence to my goals that will play out and prevail in the end.
For me,
slow and steady always wins the race.

The pot, the soil, and the water.

My community.
My relationships and my persistence.
These are the three jewels which nurture my overall development. Peace….

Kung-Fu Hacking: Defining Aims & Objectives (Part 2)

  • He who hacks for blood soon finds it dripping from his own terminal.
  • He who hacks for fame and glory never stays free long enough to hear his songs of  victory sung.
  • He who hacks for gold is already blinded by the glitter and glare of his own greed, all too soon led astray by all things shiny.
  • He who hacks for sport seldom finds the network administrators in a sporting mood.
  • He who hacks for the love of  it must leave what he loves the most behind so he can dance with the one he hates the most.— The Federal Correctional System
  • But he who hacks for security cannot be led astray.

( The above is what I call “ The Hackers Six Movers ”

First of all, it must be borne in mind that training for Kung-Fu Hacking is very demanding, calling for great discipline; and discipline in this field is defined more by what you do not do rather than what you do. This art calls for great endurance, perseverance, determination, as well as time and effort. Patience must be your greatest effort. Master Kung-Fu Hackers are not borne over night. As a matter of fact, some of the greatest hackers to date have been quoted as saying that it takes at least a minimum of 10 years before one becomes adept in the art. But the result is very rewarding, and the extent of your reward depends mainly on how much “ purposeful practice and training ” you have put in. Aimless training and practice, as was stated in part one of Kung-Fu Hacking, is a huge waste of time. It is therefore helpful to have some idea of your aims and objectives.

Aims are general in nature and long-term in perspective, whereas objectives are specific and immediate. How well we have achieved our aims calls for some subjective judgement, whereas the attainment of our objectives can be determined categorically.

A major aim of Kung-Fu Hacking training, for instance, is System Security- or more so being able to secure your own systems. This ability to defend ourselves is a general asset, and has long-term benefits as more and more vulnerabilities become exploitable to the general public. Generally we do not set a specific time frame for acquiring this aim; we adopt the attitude that as long as we keep on learning, practicing, and training, we will enhance our ability to defend ourselves. As the old adage goes: “ before one can protect others he must first be able to protect himself  ”. We are clear that if we fail to defend ourselves effectively in cyber-warfare, it means that we failed in our aim. Sometimes we may set a time frame for our aim, but the period is usually reckoned in years rather than months….all the while waiting for someone to try to successfully attack our systems. ( Unless of course we hire a professional penetration team to exploit our systems in order to see where we really stand overall in the realm of security. ) Otherwise it may not be easy for us to measure objectively how well we have achieved our aim. For example, we can say that we have achieved our aim of self-defense if we can effectively defend ourselves against a single attacker; but when we are faced with a group of attackers, let’s say, a Hactivist Group that targets our organization for “ whatever reason ” , we may falter.

Hack Cup, with Kung Fu Guy

On the other hand, we may set an objective to acquire the knowledge and skills to defend ourselves against web application attacks within six months. Or from an offensive security point of view we set the objective to acquire the skills to launch successful attacks against web applications in a six month time frame. Hence, our objective is specific: for the time being we limit ourselves to defending against these types of attacks or learning how to carry out these types of attacks…leaving other types of attacks to be covered by later objectives. We can go a step further and be more specific by deciding on the types of web application attacks we want to defend against or learn to carry out. As we have set a time frame of six months, our objective is also immediate: we are not pursuing this objective indefinitely. We can easily decide whether we have achieved our objective within our set time. For example, after six months of training we can ask a few fellow hacking buddies to try to exploit our web applications using the types of attacks we have defined; or we can conversely set up a vulnerable system of our own in a virtual lab and try out these attacks ourselves.

Above all, even though aims and objectives are closely related, an appreciation of the distinction contributes to our monitoring of our Kung-Fu Hacking practice and training. Aims and objectives provide us with direction and purpose in our Kung-Fu Hacking training, thus enabling us to achieve better results more quickly.

“ Test your systems with fire and ice, sand and sea, bile and blood….before your attackers do! ”

The Black Bin Laden

Conquest is easy. Control is not.—Khan Noonian Singh

Stay on the lookout for the terrorist Mr. L-O-C, all I need is some dip, and a couple o’ sticks of T.N.T. To bring this mutha fucker down like four flat tires, 86ing is my mission….dismissing tricks for hire. No mercy on the lives that got took off in that quake, diesel fuel and fertilizer, will make ah’ nigga block shake. Starting playing with nines, them moved to something bigger, now I’m working through the miz-ail…bombing on deliver.

Slightly seal the package, then I set the timer…I’m the SA-Town Assassin, worldwide Unabomber. Just a little off my rocker, conceived as a menace, I’m a loc until I die, til’ that day I’m never finished. Take my work to College Hills, perform it on your daughter..when I fall up out ya hood it’s gon’ look like Pearl Harbor. Bentwood and Pinehurst…you ho’s better run; C & C Estates, Southwest here I come!

vangogh+unabomber

Niggaz struggle in my hood, but y’all don’t give a fuck, so the whole Concho Valley…Tom Green better duck. Everybody with authority, get out my way- City Hall’s coming down when I have a bad day. The county jail and the courthouse is getting is done, when I get the extra time, I’m gon’ turn that bitch to crumbs.

Forensic sketch of the Unabomber, commissioned...

(Photo credit: Wikipedia)

I hooked up with this nigga straight out of the military, who gave me what I needed, to start me an obituary. Killer, killer, killer- killing on the cool…Westside lunatic, with the mind of a Damn Fool! I’m the one that told Koresh ( David Koresh ) to go out like a scout, had em’ all in that fort yelling, “ We Ain’t Coming Out ” ! [Waco.]

Mug shot of David Koresh.

Mug shot of David Koresh. (Photo credit: Wikipedia)

F.B.I. tried to fade us, we put em’ on a freeze…left you pigs full of holes like a block of cottage cheese. You tried to burn us up, and thought you killed Koresh, but you didn’t cause he’s living deeply planted in my flesh. Schizophrenically insane, a

Charles Manson

Charles Manson (Photo credit: Wikipedia)

Charles Manson figure, the only difference is he’s a whacker…and I’m a real nigga! Daily chances for survival, is getting kinda slim, I’m the nation’s most wanted; BKA- double M. That lic that happened in that Luby’s in Killeen wasn’t it, but that Oklahoma bombing was the mutha fucking SHIT! When it comes to pulling murders, I’ll always hold the title, Jeffrey Dahmer

Jeffrey Dahmer during an interview for Datelin...

Jeffrey Dahmer (Photo credit: Wikipedia)

is my nigga,

JOIN THE CULT

JOIN THE CULT (Photo credit: wayneandwax)

Jim Jones is my idol. In the body form I’m one, personality I’m two, they tried to lock me up in Rush, they tried to lock me up in Skyview. But they couldn’t hold me, cause I was bringing noise…let my conscience get me crunk like the

Last photo of John Gotti, taken by the Bureau ...

Last photo of John Gotti (Photo credit: Wikipedia)

John Gotti Boys.

I’m hungry for destruction, that’s the reason why I’m agg, every prison in this country’s getting dropped to the slab. Hold a grudge against society, that’s how I am….a Young Nigga with a complex that doesn’t give a damn. Schizophrenically insane. Stay out of my path…I reach a natural high when I hear the devils laugh. If you living then you dying, there ain’t no pity…and don’t let it slip your mind what I done in New York City to the World Trade Center! I’m the SA-Town Assassin….bitch.

http://soundcloud.com/peta-loc/the-black-bin-laden-mastered

Reward all those wise enough to join you, utterly crush all who oppose you and do so in so savage a manner as to completely cower any others who might dream of resisting your will.

http://youtu.be/hAwmfKZZz50

Hacking-Kung Fu: Aims and Objectives

“ With the right information, you can attain in six months what uninformed students would not attain in many years ”

Part One

In this post the term “ Hacking-Kung Fu ” is being used to point out the similarities between Hacking and Kung Fu. Thus, one should read the term Hacking-Kung Fu with the understanding that the two words, Hacking and Kung Fu  are being used interchangeably across the two respective disciplines.

Getting Better Results in a Shorter Time

Kung Fu, like Hacking, ( or any other art for that matter ), is a practical affair, not just a question of gathering knowledge. In other words, one becomes proficient in both disciplines through hard, regular practice, not by reading about it. Nevertheless, some background information is not only useful but necessary; otherwise the student may waste a lot of time groping about in the dark.

While many people spend years practicing Kung Fu and achieve little, some spend only a third of the time and achieve a great deal. The main reason is that while the first group learn aimlessly, usually by acquiring more and more sets or exploits without improving their force or practical Hacking-Kung Fu skills, the second group know exactly what they want to get from Hacking-Kung Fu and pursue their objectives accordingly.

To be able to set the appropriate objectives for getting the most from your training, it is necessary to have a clear understanding of the scope and depth of Hacking-Kung Fu, including its history, philosophy and various styles. See here for a historical perspective of hacking and it’s philosophy:( http://www.catb.org/~esr/faqs/hacker-howto.html ) For example, if you are unaware of the four dimensions of Kung Fu – form, force, application and philosophy – you may carry on learning sets for many years, and perhaps also teach them, but your training will be incomplete. Likewise, if you are unaware of the phases of ethical hacking – Reconnaissance, Scanning and Enumeration, Gaining access, Maintaining access ( escalation of privileges ), and Covering your tracks – you may also carry on learning exploits for many years with the end result being an incomplete training. And since form is in many ways the least important aspect of Hacking or Kung Fu, you will at best achieve less than 28 per cent of what you could have done had you been more informed.

Worse still, people with this superficial knowledge may be mistaken for Kung Fu Hacking masters, especially if they are elderly, simply on the basis that they have taught the art for many years and now hold various certifications on the subject. Even if they hide nothing from their students, there is not much the students can learn apart from ‘ flowery fists and embroidery kicks ’. Translated-> Script-Kiddies!  Such masters may, wittingly or unwittingly, give the impression that they know more than what they are teaching. If they are asked questions touching on the deeper aspects of Hacking-Kung Fu ( i.e., underground BlackHat tactics ), they would often give excuses to cover their lack of knowledge, such as that the answers are too profound or complex for “ beginning students ” to understand. If the students suggest sparring practice or actual demonstrations of exploiting a real system, the ‘ masters ’ may become angry and reprimand them, warning them that Hacking-Kung Fu is too dangerous for them to fool around with, or that they should practise it for their own intellectual health. Students who are uninformed will continue learning from these teachers, and they in turn will succeed them and teach only ‘ flowery fists and embroidered kicks ’. This is in fact what has been happening for at least a decade in the cyber-securities field, with the result that much of Kung Fu-Hacking today has been degraded into a merely demonstrative form.

Having a theoretical understanding of Kung Fu-Hacking enables you to realize that there is much more to it than merely learning form or exploits. Such an understanding will lead you, if you are still not able to confidently defend yourself in real world situations or compromise systems outside of lab environments, to ask why. The reasons can be traced to three factors, called the Three Requirements for Attainment, which will be explained in the next section.

The Three Requirements for Attainment

A shaolin student doing a kung fu moves. Shaol...

A shaolin student doing a kung fu move. Shaolin Kung Fu is more than just a martial art. (Photo credit: Wikipedia)

There are countless reasons why students fail to achieve their objectives in their Kung Fu-Hacking training, but to help us understand the factors that contribute to success, great masters have from their long years of study and experience, summarized them into what are called the Three Requirements for Attainment. If you have these three requirements, you will succeed in whatever you set out to do, in Kung Fu, Hacking , or any other field. These three requirements are:

  1. The Method
  2. The Teacher
  3. The Student

Obviously if you do not have the method you cannot even start training towards your objective. For example, you may like to acquire the art of Iron Palm or attacking Web Applications, but without the method you cannot practice. If you ever acquire Iron Palm or the art of attacking Web Applications on your own, it will be by sheer luck and will take a very long time. Moreover, the result is unlikely to be as good as that developed from the proper method, and you may have harmful side effects.

But more important than the method is the teacher. Nowadays one can read up on many Kung Fu-Hacking training methods from books, web sites, and blogs, but without the instruction of a competent teacher it is difficult – though not impossible – to get good results, especially in the more advanced inner arts. There are at least two reasons why a teacher is necessary. First the teacher can explain the finer points and overcome individual problems, both of which cannot be done adequately in books or blogs. The second reason is , more important, although it is less obvious. The teacher provides the confidence students need, so that they are assured that whatever happens the teacher is around to help, sometimes even save, them.

Taking time choosing a good teacher is highly recommended. Even if you have to pay a higher training fee, learning from a good teacher is always more cost – and time – effective. But what are the qualities we should look for in good teachers? Here are five guidelines.

  1. They must have achieved a reasonably high standard in the art they are teaching.
  2. They must be knowledgeable. If you ask how you can achieve your objectives or any other relevant questions, they should provide satisfactory answers.
  3. They should preferably be systematic and methodical, and have the means to help you accomplish your objectives.
  4. Even if they have all the other qualities, they must also be generous and willing to teach you, otherwise you must seek another teacher or try to overcome the obstacles that prevent them from teaching you.
  5. The most important quality, however , the quality that distinguishes true Kung Fu-Hacking masters, is that they teach and practice high moral values. http://www.hackerhighschool.org/ Also see: http://hackingdojo.com/   And especially see: http://www.elearnsecurity.com/

The most important requirement for attainment in any art, however, is not the teacher but the student. You may have the best method and the best teacher, but if you are unwilling or not ready, you will not achieve the objectives of your training. When you have the right method and a competent teacher, what you need to do is in theory is very simple: you merely have to practise regularly and persistently according to the method and teaching. But in reality, regular and persistent practice can be very difficult. Lack of practice, probably more than anything else, is the reason why many students fail in their objectives.

Stay tuned for Part 2….

My so humble bows go out to Master Wong Kiew Kit. I’m honored and grateful for the wisdom that you  bestow upon the Sangha.