New Posts  All Forums:Forum Nav:

Java question - Page 2

post #11 of 15
Wow you really need to get banned you hacker.
My System
(13 items)
 
  
CPUMotherboardGraphicsRAM
AMD Phenom II x6 1075t ASUS M4A89TD Pro USB3 EVGA GTX 460 Superclocked G.Skill Ripjaws 2x2GB DDR3-1600 
Hard DriveOptical DriveOSMonitor
WD 250GB ASUS Windows 7 64-bit ASUS 24" LCD HD 
KeyboardPowerCaseMouse
G15 OCZ 550w CoolerMaster Storm Scout G5 
Mouse Pad
SteelSeries 
  hide details  
Reply
My System
(13 items)
 
  
CPUMotherboardGraphicsRAM
AMD Phenom II x6 1075t ASUS M4A89TD Pro USB3 EVGA GTX 460 Superclocked G.Skill Ripjaws 2x2GB DDR3-1600 
Hard DriveOptical DriveOSMonitor
WD 250GB ASUS Windows 7 64-bit ASUS 24" LCD HD 
KeyboardPowerCaseMouse
G15 OCZ 550w CoolerMaster Storm Scout G5 
Mouse Pad
SteelSeries 
  hide details  
Reply
post #12 of 15
Thread Starter 
A hacker is someone who creates and modifies computer software and computer hardware, including computer programming, administration, and security-related items. - Wikipedia search Hacker

I'm not modifying the adminstration rights, just simply going around 'em. I'm not doing this to cause chaos but to see if I can truly launch a .exe from a java program cause I'm interested in it.
post #13 of 15
Well, circumventing security rules set in place is technically hacking
Burning Phoenix
(13 items)
 
  
CPUMotherboardGraphicsRAM
Intel Q9550 Gigabyte EP45-UD3P eVGA GTX 260 Core 216 SuperClocked 4GB G.Skill DDR2-1000 5-5-5-15 
Hard DriveOptical DriveOSMonitor
3 WD 80GB RAID0, Seagate 500GB, WD 1TB Caviar BLCK Lite-On LH-20A1S Windoze 7 Professional Dual Dell E207WFP 20.1" Widescreen LCD's 
KeyboardPowerCaseMouse
Logitech G15 Silverstone OP750 Lian-Li PC-A10B Logitech G5 
Mouse Pad
Harley Davidson 
  hide details  
Reply
Burning Phoenix
(13 items)
 
  
CPUMotherboardGraphicsRAM
Intel Q9550 Gigabyte EP45-UD3P eVGA GTX 260 Core 216 SuperClocked 4GB G.Skill DDR2-1000 5-5-5-15 
Hard DriveOptical DriveOSMonitor
3 WD 80GB RAID0, Seagate 500GB, WD 1TB Caviar BLCK Lite-On LH-20A1S Windoze 7 Professional Dual Dell E207WFP 20.1" Widescreen LCD's 
KeyboardPowerCaseMouse
Logitech G15 Silverstone OP750 Lian-Li PC-A10B Logitech G5 
Mouse Pad
Harley Davidson 
  hide details  
Reply
post #14 of 15
Thread Starter 
No it's not... I'm not changing or modifing any programs... So I don't see how it's hacking... And I'm just wondering how I can do this, if I can.
post #15 of 15
If you do a wiki search on cracker, you may find that that fits your idea of a "hacker". You may not want to change or modify code but by-passing(get around 'em) administration rights falls within the lines of hacking.
BlackMesa
(14 items)
 
  
CPUMotherboardGraphicsRAM
Phenom II x6 Gigabyte XFX RF460 16gb G.Skill 
Hard DriveHard DriveOSMonitor
OCZ Vertex2 Sata II Coorsair Force GS Sata III Debian (testing) Shimian 27" 
KeyboardMouse
Filco w/ blue cherries Who needs a mouse? 
  hide details  
Reply
BlackMesa
(14 items)
 
  
CPUMotherboardGraphicsRAM
Phenom II x6 Gigabyte XFX RF460 16gb G.Skill 
Hard DriveHard DriveOSMonitor
OCZ Vertex2 Sata II Coorsair Force GS Sata III Debian (testing) Shimian 27" 
KeyboardMouse
Filco w/ blue cherries Who needs a mouse? 
  hide details  
Reply
New Posts  All Forums:Forum Nav:
  Return Home
  Back to Forum: Application Programming