Jump to content
xisto Community
Sign in to follow this  
longtimeago

So U Wanna Be A Hacker?

Recommended Posts

Most of us want to be a hacker... Die Hard 4.0, Neo, Trinity... all sound familiar right... Most of us got inspired to become hackers on seeing these movies... Or probably by jus hearing about hackers... But truly speaking... Who is a hacker??? Is he someone who gains access to your bank account and swindles money? or is he the guy who stole your hotmail and gmail passwords? or is he that guy who launched a DoS(Denial of Service) of attack on you? Most of us have wrong notions of who a hacker is. Hacking means, doing something different out of what is present... Even using a software or your PC properly makes you a hacker... Or is it? The world is flooded these days with "hackers"... But think, does stealing your friends credit card details to buy some stuff makes you cool? or does defaming that poor classmate of yours make u cool? Is this what hacking is all about... I disagree, I would rather term these guys as Cyber Terrorists... People who write viruses, steal networks, passwords, all come under the name Cyber Terrorists... There are Ethical Hackers, whom we prefer calling as Computer experts who are working hard to keep us safe from the clutches of these vicious Terrorists... And just for your information, most hackers are from places like Pakistan, Afghanistan and most of them are from terrorist organizations... For your trivia the first virus ever was written by two Pakistani Brothers...I don't recollect the name... And Y2K was not a virus, and just a bug that software coders thought would cause a huge damage as they did not anticipate 2000. Meaning the computers would jump to 00 after 99. Anyways, back to our topic of discussion... Hacking is not an activity that deals with causing others harm... You might do it just for fun... But the consequences are severe... hacking is just, using what you use to the fullest and in the best way you can... So technically speaking... All of us Netizens out here ought to be hackers... Provided we know what we do and it's consequences... Lets hope that one day this world goes free of viruses and Cyber Terrorists...

Share this post


Link to post
Share on other sites

Lets hope that one day this world goes free of viruses and Cyber Terrorists...

This is very unlikely.

In my opinion, hacking can mean many things and can be done in different ways.
A simple hack can be a tweak or change to an operating system.
Or you can steal credit card details. for people who break the law :)

Now, in my opinion I class legal hacking as software only,
And hardcore hacking as software and hardware.

Final thought:
Viruses and Hackers will never seize to exist until technology does.

Share this post


Link to post
Share on other sites

You are taking one often-misconstrued term and, well, passing on a one-sided definition that makes "hacker" a derogatory word.A hacker is, by definition, someone who uses something for a purpose that the object isn't intended to do. Mostly, we relate to hackers as malicious cyber-terrorists or whatnot... when in reality, you are hacking something if you are exploiting code, changing things around, or using software to do something that it was not intended to do. Think of tweaking the user interface in Windows by changing values in the registry, editing code in configuration files, or changing splash screens or boot images. Think of using an empty box that you would normally throw away and turning it into a useful container with dividers to store your scrapbooking supplies. Think of do-it-yourself articles on just about anything. You are hacking, and for the most part, just about everyone is a hacker.Now, if you want to limit the realm to the computer field, we have three categories that you can throw hackers into. White-hat hackers are those who exploit code, penetrate security measures, and the like to benefit the technological field by implementing counter-measures and improving security. (You may have heard of computer security specialists or analysts. Also, think of programmers that assist in creating firewall software or the folks down at Microsoft that help build these hotfixes. The people who find these exploits are hackers. The hotfixes sprout from exploits that are found by white hats, or exploits by black hats that customer feedback provides.) Black-hat hackers are those that OP speaks of: the cyber-terrorists that penetrate through security measures to obtain sensitive information like credit card numbers, company secrets, and identification items (like social security numbers, birthdates, and whatnot for successful identity theft) for their own nefarious usage. And of course, there's the gray area... appropriately-termed "gray-hat hackers," who do a little bit of both.Nirmaldaniel has his facts straight. OP and others on that bandwagon might have to look at things in a different light before asking the question of whether you want to be a hacker or not. :)

Share this post


Link to post
Share on other sites

Was that something copied from a site? I seem to....how shall I say...recognize that post from somewhere. I just can't think where I read it from. Posted Image

Share this post


Link to post
Share on other sites

Was that something copied from a site? I seem to....how shall I say...recognize that post from somewhere. I just can't think where I read it from. Posted Image

My post or OP's post? Usually I select a long phrase and use Google to search for that exact phrase (using quotation marks) to check for plagiarism. OP looks legit. If you mean me, I might have posted something similar on a topic about hackers... can't remember. (I don't look for my previous posts and copy-and-paste, you have my word on that. Not like I'm going to take the effort to peruse my own previous posts anyway... :) )

 

I use common sense and type out my own words. If I've repeated myself in some way, someone's going to have to rat me out because apparently, I can't remember what I post. If I "sound" like an article... well, I'm going to want a fanbase so that I can blog and try ad revenue to bolster my economic stability like SM does. :P

Share this post


Link to post
Share on other sites

Most of us want to be a hacker... Die Hard 4.0, Neo, Trinity... all sound familiar right... Most of us got inspired to become hackers on seeing these movies... Or probably by jus hearing about hackers...

 

But truly speaking... Who is a hacker??? Is he someone who gains access to your bank account and swindles money? or is he the guy who stole your hotmail and gmail passwords? or is he that guy who launched a DoS(Denial of Service) of attack on you? Most of us have wrong notions of who a hacker is. Hacking means, doing something different out of what is present... Even using a software or your PC properly makes you a hacker... Or is it? The world is flooded these days with "hackers"... But think, does stealing your friends credit card details to buy some stuff makes you cool? or does defaming that poor classmate of yours make u cool? Is this what hacking is all about...

 

I disagree, I would rather term these guys as Cyber Terrorists... People who write viruses, steal networks, passwords, all come under the name Cyber Terrorists... There are Ethical Hackers, whom we prefer calling as Computer experts who are working hard to keep us safe from the clutches of these vicious Terrorists... And just for your information, most hackers are from places like Pakistan, Afghanistan and most of them are from terrorist organizations... For your trivia the first virus ever was written by two Pakistani Brothers...

 

I don't recollect the name... And Y2K was not a virus, and just a bug that software coders thought would cause a huge damage as they did not anticipate 2000. Meaning the computers would jump to 00 after 99. Anyways, back to our topic of discussion... Hacking is not an activity that deals with causing others harm... You might do it just for fun... But the consequences are severe... hacking is just, using what you use to the fullest and in the best way you can... So technically speaking... All of us Netizens out here ought to be hackers... Provided we know what we do and it's consequences...

 


Lets hope that one day this world goes free of viruses and Cyber Terrorists...


 

Wrong, Not everyone wants to be a hacker and as a role model to be one from a film or TV program,

 

Also try googling what a hacker is:

 

 

 



Hacker may refer to:

 

 

Computing and technology

Hacker (computer security), someone involved in computer security/insecurity[1]

Hacker (programmer subculture), a programmer subculture originating in the US academia in the 1960s, which is nowadays mainly notable for the free software/open source movement

Hacker (hobbyist), an enthusiastic home computer hobbyist

See Hacker (computing) for an overview of different kinds of computer hackers and the relationships between these groups.

 

Similar meanings in other fields are:

 

Mathematics hacker, a type of reality hacker (or hacker of numbers beyond reals), but focused on math--quite likely also in a computer science (or other) context

Media hacker, someone who uses the media in new ways

Reality hacker, similar to a computer hacker, but hacks the "real world"

Wetware hacker, one who experiments with biological materials


 

And the world will always have hackers to screw up the world, Rules are made to be broken that my motto, Like other peoples who have a job there's may be "*BLEEP* Health and safety!"


Share this post


Link to post
Share on other sites

hey i wanna be a hacker and i think for me an indian would be great named ankit fadiahe has hacked many sites and also rated as 2nd best hacking site by FBI

Share this post


Link to post
Share on other sites

Most of todays technology including the internet itself would not be here if it were'nt for all the old-school hackers coding and designing applications in software and hardware over the years that we all can use. For instance I am writing this post from a Linux operating system, thanks to Linus Torvalds. More than two thirds of servers on the planet run free open source software because it just kicks the *bottom* out of windoze.Progress and innovation only happens when people start to think outside of the box. What would happen if I use it this way? Or if I add these lines of code to this software I've been using, it makes it easier to use, or it can do something else. THAT'S HACKING.noobs will never understand.

Share this post


Link to post
Share on other sites

for me those person who do some malicious things into one system or software or anything i called them as cracker.. hackers are just accessing some systems and softwares without doing anything.. they just want to access it for fun.. not to change anything,,am i wrong?

Share this post


Link to post
Share on other sites

And just for your information, most hackers are from places like Pakistan, Afghanistan and most of them are from terrorist organizations... For your trivia the first virus ever was written by two Pakistani Brothers...

where do you get that information and btw even the first virus made from pakistani it doesnt mean most hacker came from pakistani and also first virus ever written are u sure with that?

Share this post


Link to post
Share on other sites

You are taking one often-misconstrued term and, well, passing on a one-sided definition that makes "hacker" a derogatory word.
A hacker is, by definition, someone who uses something for a purpose that the object isn't intended to do. Mostly, we relate to hackers as malicious cyber-terrorists or whatnot... when in reality, you are hacking something if you are exploiting code, changing things around, or using software to do something that it was not intended to do. Think of tweaking the user interface in Windows by changing values in the registry, editing code in configuration files, or changing splash screens or boot images. Think of using an empty box that you would normally throw away and turning it into a useful container with dividers to store your scrapbooking supplies. Think of do-it-yourself articles on just about anything. You are hacking, and for the most part, just about everyone is a hacker.

Now, if you want to limit the realm to the computer field, we have three categories that you can throw hackers into. White-hat hackers are those who exploit code, penetrate security measures, and the like to benefit the technological field by implementing counter-measures and improving security. (You may have heard of computer security specialists or analysts. Also, think of programmers that assist in creating firewall software or the folks down at Microsoft that help build these hotfixes. The people who find these exploits are hackers. The hotfixes sprout from exploits that are found by white hats, or exploits by black hats that customer feedback provides.) Black-hat hackers are those that OP speaks of: the cyber-terrorists that penetrate through security measures to obtain sensitive information like credit card numbers, company secrets, and identification items (like social security numbers, birthdates, and whatnot for successful identity theft) for their own nefarious usage. And of course, there's the gray area... appropriately-termed "gray-hat hackers," who do a little bit of both.

Nirmaldaniel has his facts straight. OP and others on that bandwagon might have to look at things in a different light before asking the question of whether you want to be a hacker or not. :P


I love you. Seriously. You hit the point of "hacking" dead-on.

This whole "hacking your gmail account" isn't a hack. They use one of two methods - either a keylogger (which could be part of a trojan) or a dictionary-cracker (AKA. Bruteforcer). This is weak crap and wouldn't pass in the "hacker world."

In terms of the software hacking, I've personally done both white-hat and black-hat. Did I do black-hat for reasons of destruction? No (although I have caused a lot of destruction...). I did it for knowledge. To me it's a game of cat-and-mouse. Think of it as being a sport. The people working to secure exploits/hacks are one team, hackers are another. The only difference is unlike sports you never know what the other side is going to toss out at you. Therefore it's an ever-evolving game.

And I'm going to be brutally honest with you. If anyone claims they can "teach you how to hack," it's pure nonsense. Due to the pure nature of it all there's no way to teach another person. It is all in your mindset. I could teach you all day long how to crash someone's PC by sending them an MSN instant message and withdrawing their IP from that and forcing a falsified network to their PC using certain ports and protocols, but that's only one thing. Most of these people wanting to learn couldn't fathom how much information there is to be learned.

If you want to learn, experiment. Read source code. Learn how programs operate, and learn how PC's operate. If your goal is to "hack" PC's through the internet (as opposed to intranet) then learn about the internet and how it works.

Share this post


Link to post
Share on other sites

Not to get uber-historical, or technical on you, BUTHacking is using the tools at hand to create something new.Cracking is being a jerk and breaking into something for malicious intent.First Gen v Third Gen via Steven Levy.Or you can cite Kevin Mitnick, Robert T. Morris, or any of the other great role models out there.NOT the lame LOD, or Kevin Poulson.I am a whitehat = fixing problems when I find them(and sometimes a greyhat) :ph34r:

Share this post


Link to post
Share on other sites

Only teenage kids wanting to be popular or be noticed wants to be a computer hacker. (computer hacker is what best describe what the OP was telling)Hacking is not something that you want but more on having a higher learning curve. The first hack that I have ever written was a hack for an overwriting virus (1991 at high school years). Way back then people are very afraid of viruses and yet was very careless with their disk and hard drives. There was a virus named 'Stoned' which locks up keyboard all input devices from being used by redirecting all input streams to device NULL (NULL means nothing). Since it literally means no device can be used as input then the computer locks up.People was trying to develop vaccine on that time but I noticed a very nice code on assembly language called NOP or the character 90Hex. Paired with a few jumps editing and viola, I manage to alter a virus to stop messing with files without removing it. Since the version of 'Stoned' virus local on our area was a 'NON-Overwriting' version (the virus copies the first parts of the infected program into the end of the file then appends itself at the front), the modification I made with the virus was carried over to the new infections and there was no damage code on this newer generation of the same virus. There was a limitation on the accidental success of the code hack, if the file extension of the infected file was a com like command.com or sys.com, the virus breaks apart. Today, you no longer need to worry about this type of viruses since they can't run anymore on modern operating system since they use legacy disk write commands which was way long obsolete.*********************On today's technology, ordinary people are just telling you what they want you to know but they always fail to realize that things can be used the other way around. 8 years ago while I was working as an 'Application Engineer' from a top 500 global company, I keep on telling people that it is possible to print sound clips on paper. I know people reading this post will say it is impossible but the fact it is possible to print audio clips on paper and then scan them back up and convert them into an audio clip.The process was called Stenography (http://en.wikipedia.org/wiki/Shorthand) or message hiding but this time the hidden message was an audio clip (something that I use to store voice phrases for my voice activated software) and the media is paper. You can literally convert a voice file into barcodes or matrix of dots. The success of the process is dependent on the following1. paper quality2. printer ink quality3. scanner device and software on the decoding side.Stenography is a technique to hide information used on ancient times to deliver messages without being noticed but no one ever tried to hide an audio file into a medium where it is least expected.As of today:The colleague's that I have on that company now enjoys handing cartoon images as a password list. The password was encoded inside the image itself by using bit flipping, voice activation command phrase was present on stickers holding an information enough for a 4 second sound clip.**************************For the first example, I am well aware of the 250 assembly instructions available at that time (today there are more than a thousand assembly commands for a single processor and device combination)For the second one, I was studying developing barcode dependent programs which where I get the idea of printing audio files on paper.The line that defines a 'good hacker' and a 'bad hacker' is pretty thin, don't expect that you can recognize them easily apart. A 'good' thing that a hacker may be doing can be 'bad' base on another person's perspective.As a nice tip, there are thousands of self proclaimed hackers that will lecture you on what a hacker was and how to be a hacker but lacks substance. Youtube and metacafe was the 2 best websites where you can find them and most self proclaimed hackers on this websites have the nerves to lecture my Cisco Security Engineer friend (he used to be my supervisor from a past job and the one that opens my eyes on linux tricks) about the best defense versus hackers and this is turning windows firewall on. Windows firewall on the other hand can be shutdown from a remote computer within 1-2minutes.

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  

×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.