05.03.2013 Views

Data Hacking

Data Hacking

Data Hacking

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 11 — <strong>Hacking</strong> Geocaching<br />

2. Different listing sites have different rules, but there are a few commonsense rules that<br />

anyone placing a cache should follow. To avoid disappointment, make sure that your cache<br />

follows the rules of the listing site. Some of the most common rules include the following:<br />

■ No alcohol, tobacco, firearms, or drugs in the cache. If possible, try to populate the<br />

cache with “family-friendly” items.<br />

■ At the very least, your cache should contain a logbook and a pencil.<br />

■ No food or drink in the cache — animals will sniff it out and at best trash your<br />

cache; at worst, they may get stuck in it or become ill as a result.<br />

■ Get the landowner’s permission before placing the cache.<br />

■ Take care not to hide caches where many cachers coming to search for it might<br />

damage the environment. This also means no burying of caches.<br />

■ The person placing the cache assumes responsibility for maintaining it.<br />

3. The person placing the cache should accurately (or as accurately as possible) use a GPS<br />

to get the coordinates of the cache he or she places. The more accurate this reading is,<br />

the easier it will be to find the cache.<br />

4. The cache hider then registers the cache with a cache listing site (basic membership of<br />

the site is free). This involves filling in a form detailing the cache location. Some people<br />

also provide a short description of the cache or a clue as to where it is hidden. The clues<br />

are normally encrypted using a simple ROT 13 system whereby A = N, B = O, C = P . . .<br />

X = K, Y = L, Z = M. Don’t worry, though, you won’t have to encrypt the clue manually,<br />

as the system does that.<br />

You can also have the clue decrypted automatically too, either on the website or by one of<br />

the many geocaching software aids available.<br />

5. The cache will then be approved by the listing site (or declined with an explanation). It<br />

is at this stage that the cache details are made available for others to see.<br />

6. Other geocachers now visit the listing site, choose the geocaches they are interested in<br />

visiting, and download the details of the cache (or print out the information).<br />

7. The geocacher then loads the coordinates onto his or her GPS and sets off to try to find<br />

the cache. This might seem easy but trust me, geocachers can be clever when it comes to<br />

hiding.<br />

8. If the geocacher is successful in finding the cache, he or she fills in the logbook, swaps a<br />

trinket or two, and replaces the cache.<br />

9. When the finder comes home, he or she accesses the listing site and logs the find.<br />

That’s it! That’s geocaching! There are many different kinds of geocaches and many variations<br />

on the theme, but the overall idea is the same — to find a specific object hidden somewhere on<br />

the face of the planet and log it. Only the pinpoint accuracy of the GPS enables ordinary people<br />

to achieve such a level of precision. This level of accuracy goes well beyond what anyone<br />

could expect from a map and compass.<br />

259

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!