{"id":17407,"date":"2018-03-28T08:00:24","date_gmt":"2018-03-28T12:00:24","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=17407"},"modified":"2022-04-28T08:52:25","modified_gmt":"2022-04-28T12:52:25","slug":"april-fools-day-5-harmless-pranks-hackers-jokes","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/april-fools-day-5-harmless-pranks-hackers-jokes\/","title":{"rendered":"April Fools&#8217; Day &#8211; 5 Harmless Pranks by Hackers"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">April Fools\u2019 Day is a much-anticipated time for hackers who simply want to mess with someone\u2019s head without any malicious intent. While some hackers aim to scam unsuspecting people, some use their hacking abilities to help prevent these attacks. However, they occasionally they use their skills to prank someone for a quick laugh.<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/april-fools-hackers-attack\/\"><b>Hackers Attack With Invasive New Mobile Virus<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Here are the 5 best harmless pranks conducted by hackers over the years.<\/span><\/p>\n<p><b>A Prank from the Government<br \/>\n<\/b><span style=\"font-weight: 400;\">Dubbed \u201cOperation Cupcake,\u201d members of the British intelligence service MI6 <\/span><a href=\"https:\/\/www.geek.com\/geek-cetera\/the-11-funniest-hacker-attacks-1617998\/\"><span style=\"font-weight: 400;\">once did the world some good<\/span><\/a><span style=\"font-weight: 400;\"> with a prank that targeted terrorists who had nefarious intentions. They hacked a radical Muslim preacher\u2019s online magazine that included recipes on how to manufacture pipe bombs and replaced them with cupcake recipes from the Ellen DeGeneres show.<\/span><\/p>\n<p><b>Do You Love AC\/DC?<br \/>\n<\/b><span style=\"font-weight: 400;\">Fans of the Australian rock giants AC\/DC were probably thrilled about this next one, although it probably got old after a while. A worm made its way to the control systems of nuclear research facilities in Iran and it did unexpected things like activate workstations at night and blast the famous band\u2019s 1990 classic \u201cThunderstruck\u201d at maximum decibels. <\/span><\/p>\n<p><b>The Blue Screen of Death\u2026 as a Screensaver<br \/>\n<\/b><span style=\"font-weight: 400;\">Everyone dreads the idea of coming face-to-face with the blue screen of death, which basically means your computer is in dire need of technical support. In some cases, it may even be fried for good. But just for fun, pranksters <\/span><a href=\"https:\/\/lifehacker.com\/373817\/top-10-harmless-geek-pranks\"><span style=\"font-weight: 400;\">found a way to make light<\/span><\/a><span style=\"font-weight: 400;\"> of the blue screen of death by installing screensavers on their co-workers computers that displayed the blue screen of death when they were away, only to return and freak a bit before the prank was unveiled. <\/span><\/p>\n<p><b>Co-opting a Computer<br \/>\n<\/b><span style=\"font-weight: 400;\">Another popular prank is a technique that can take over someone\u2019s computer briefly. By installing a VNC &#8212; a computer remote control protocol &#8212; on a computer and attaining its IP address, the prankster can control the \u201cvictim\u2019s\u201d mouse functionalities and move it around in front of their face to cause panic. Until with great relief, the joke is revealed, and it\u2019s no hard feelings, right? <\/span><\/p>\n<p><b>How the Lizard Squad Overtook Lenovo<br \/>\n<\/b><span style=\"font-weight: 400;\">A group of hackers called the Lizard Squad performed plenty of hacks for the purpose of getting chuckles in 2014. One of their biggest scores was when they took down Lenovo\u2019s website and replaced it with a webcam feed of lackadaisical teenagers lounging around with the soundtrack of \u201cHigh School Musical\u201d playing in the background.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While we certainly don\u2019t condone these activities, since it\u2019s April Fools\u2019 Day, for one day a year we can admit that ethical hackers are allowed to have fun like the rest of us.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers can be fun people too. We\u2019ve covered everything from blasting AC\/DC to invoking a fake blue screen of death on co-workers.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[4451],"tags":[259],"class_list":["post-17407","post","type-post","status-publish","format-standard","hentry","category-dfndr-company-news","tag-hackers"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/17407","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=17407"}],"version-history":[{"count":1,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/17407\/revisions"}],"predecessor-version":[{"id":17638,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/17407\/revisions\/17638"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=17407"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=17407"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=17407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}