Joke Collection Website - Blessing messages - What is a hacker?

What is a hacker?

What is a hacker?

The word "Hacker" comes from English hacker, which originally refers to computer experts who are enthusiastic about computer technology and have a high level, especially programmers.

But today, the word "hacker" has been used to refer to those who use computers to sabotage or play pranks. The correct English name of these people is Cracker, which translates as "hacker"

The fundamental difference between hackers and hackers is that hackers build and hackers destroy.

Hacking rules:

Rule 1: Don't maliciously destroy any system, which will only bring you trouble. Malicious destruction of other people's software will lead to legal criminal responsibility. If you just use the computer, it's just illegal use! Note: Never destroy other people's software or data!

Article 2: Do not modify any system files. If it is modified in order to enter the system, please answer the purpose and change it back to the original state.

Rule 3: Don't tell friends you don't trust the website you want to hack easily.

Article 4: Don't talk about anything about you being hacked on bbs.

Article 5: Don't use your real name in posts and articles.

Article 6. Don't leave the computer at will when invading.

Article 7. Don't invade or destroy the mainframe of government agencies.

Article 8. Don't talk about anything about your hacking on the phone.

Article 9. Put your notes in a safe place.

What qualities should a real hacker have?

I think friends who can read this article must be familiar with the word hacker. But it is not easy to really understand this word thoroughly. Here I want to say some different views, not to explain anything, but to tell you that there are many aspects of things, and there may be many different answers to one thing from different angles. For example, Lanke honker is very popular in the domestic network community. Personally, I think this is a disrespect for hackers and hacker spirit, and it also shows that they don't know much about the word "hacker".

"hacker" is a foreign word, which is the Chinese translation of hacker. Actually, it doesn't mean anything. The original meaning refers to some people who are keen on computer and network technology. These people are fascinated by the computer and network world, and they will study any interesting problems. Their spirit is beyond the comprehension of ordinary people. Such a "hacker" is a compliment and beyond reproach. But everyone wants to be a hero. Slowly, someone did a lot of disgraceful things under the banner of hacking. Hackers call them hackers. They are ashamed of them and don't want to be friends with them. In fact, there is no clear boundary between hackers and hackers. They all hacked into the network and cracked the password. But from their starting point, there are essential differences: hackers invade for network security and to improve their own technology. Free is the ideal of hackers. The online world they dream of is a free world with no conflicts of interest, no money transactions and full enjoyment. Hackers, in order to achieve their own selfish desires, enter other people's systems and wreak havoc. For a few pocket money cracking software. Hackers try to improve the network and make it more secure. Hackers are also studying. They are trying to become the ruler of the network world and the god of the network world. This is a terrible idea. Modern society relies more and more on the Internet. If there is no hacker to protect our network, our network will be used by hackers with ulterior motives and become a dark world.

These are the differences between hackers and hackers. Now let's talk about China's unique honker and Michelle. Maybe China people don't like the word "black" since ancient times, and when they think of it, they think of some filthy racket. Maybe the first hacker in China was not a good person and didn't do anything good, so it didn't have a good influence on everyone for the first time. So many network experts now don't want to have anything to do with hackers, but pretend to be honker and Michelle. Why? Hackers don't deserve you, or you don't deserve this title. This is not taekwondo, leucorrhea, yellow belt, blue belt, first class, and finally to the black belt. In my opinion, in the online world, there is only a struggle between hackers, one is just and the other is evil. Nothing else is useful. Do you really want to do something for the internet? Ok, be a hacker, devote yourself wholeheartedly and make unremitting efforts all your life. There will always be gains, even if you don't be a hacker, you will feel at ease if you work hard. Michelle did not use honker, but deluded himself.

I'm not targeting at some organizations, I just want to express my views. I always feel that even my friends in the online world are distracted and clamoring for separation. It is natural for the public to vilify hackers. Dare to be a hacker, even if misunderstood by others. They don't understand, well, prove themselves with practical actions and tell others what a real hacker is like with practical actions. Cracking a QQ number with a small software and dropping a bomb are not hackers. When everyone really knows what a hacker is, those self-righteous people will become the laughing stock of everyone, there will be no such stealing on the Internet, and everyone will concentrate on technology. This kind of network world will develop, and this kind of network world is the most ideal home we yearn for.

Personally, I think there are several basic elements to be a hacker:

First of all, if you want to be a hacker, you must first learn to respect the internet. Some people leave false information everywhere on the Internet, and their registered names and ages are all false. On the one hand, this is done for safety. But this has insulted the internet. You can compare it to your lover. What you say to your lover is not true. Does this mean that you really love her? Now almost all regular websites will protect users' data to some extent. There is no need to worry that the network will leak. Besides, you are not Clinton or Bush. What are ordinary netizens afraid of? As the saying goes, "I am a gangster, who am I afraid of?" . (The above does not include the case that you must leave a pseudonym. )

Secondly, it is unthinkable to be a hacker without understanding the network and the corresponding computer knowledge. Every hacker has an extraordinary research spirit and is very good at learning. The times are progressing, and so is technology. Only by studying can we fall behind, and only by constantly learning can we get ahead of others. If you want to make a name for yourself in the internet, you have to learn something. Network foundation, as its name implies, is the most primitive rule in the network world. If you don't even know the rules of the game, how can you play? TCP/IP is the most popular network protocol, which is used to complete most of the work on the network. There are many more, so I won't say much here.

Have you ever studied programming? How is your study? What have you achieved? Programming is as important to a computer or web workers as the right hand. If not, learn quickly! I suggest learning more programming languages to prepare for different situations. Here I recommend several: assembly language, which I personally think is the most useful programming language. Although it is a bit complicated, it is an assembly language, which is closer to computer hardware than a high-level language. It is superior to high-level language in some problems. I prefer Delphi to high-level language. Everyone doesn't say, "Real programmers use VC, smart programmers use Delhpi, and those who use VB are not programmers." Delphi is simple in structure and powerful in function, which is why I like it. If you want to be an excellent programmer, learn VC. I will be happy for you, but at the same time, you should be prepared to suffer. VC is not as cute as you think. In the network era, many network programming languages have become everyone's new favorites, among which I still recommend a relatively basic HTML language. First of all, it is relatively basic, and secondly, it has been recognized by everyone, and many people have mastered it. If you don't know, you can ask, which is very helpful to your study.

Now, maybe our personal computers are all equipped with Microsoft products. However, in the real network server, there are various network operating systems, because everyone has different requirements for network security. Windows 2000, UNIX, Liunx and Sun OS are all popular network operating systems. In my opinion, these are all things that we should master. At least have a general understanding, and then study it in depth. Understand its history, working principle, characteristics and loopholes. In this way, we will not be in a hurry when we meet them.

In fact, being a hacker has requirements for people themselves. Smart and studious aside, it is unbearable for ordinary people to try password cracking for a long time. Moreover, there is not much difference between a hacker and a hacker, and it is often between thoughts. After several years of hard work, I became a hacker because of the difference of ideas. Everyone is definitely unwilling to do it, but sometimes they just can't help themselves. Therefore, we should practice patience, be indifferent to freedom and wealth, and only think about freedom.

In addition, friends who are not very good at English should learn English well. I think one of the reasons for the slow development of hacking technology in China is that our English level is not high. Unlike hackers in Europe and America, they can have technical exchanges. Many technical articles and funnel reports are published in English for the first time and are being translated into Chinese. Maybe the article was translated by some lame people who are not computer majors. This has caused the lag and distortion of technology. Some people may say that they are too busy to study. I said, why don't we stop talking about computers and the internet for three months and concentrate on learning English? Sharpen the knife first, and sharpen it so as not to miss the woodcutter. When you learn English well, read the technical articles in English. You will feel bright at the moment and learn more easily.

These are some requirements for being a hacker, and articles like this are everywhere on the Internet. What I want to say next is that our hacker organization is not perfect, which also slows down our progress in some ways.

Hacker organization is a very strict organization, and the division of labor within the organization is clear and meticulous. This organization, like the famous hacker organization DAY0, is a hacker organization focusing on software cracking. They are divided into many departments: purchasing department, which buys genuine software (mostly trial version) for cracking department. Cracking department, core department, cracking software password. The testing department tests the software and immediately informs the cracking department to correct the BUG. The distribution department is responsible for uploading software for other netizens to download. The information department collects information and accepts information feedback from netizens. Members of these departments may be distributed in different corners of the earth, but they have a clear division of labor and will carry out the tasks as soon as they receive them.

In my opinion, hackers can probably have the following kinds of division of labor:

Programming: The hacker software we use now is written by such people, and there are those hateful viruses. Most of them are programmers who are not familiar with the network. But they all have solid computer skills and excellent programming skills, and they are great computer talents. They will use their own advantages to write a lot of useful software, enrich our online world and make our invasion easier.

Cracking: This is a branch formed a long time ago. The main job of these people is to crack the password of the trial version of the software, so as to make the software really free. In fact, these people have mastered the technology of programming and have more experience in cracking passwords and decompiling. The essence of hacking spirit is embodied in the work of these people, turning any software into free software and sharing it for free download.

Intrusion: Many people understand hackers as intruders, but they don't know that intrusion is just a division of labor among hackers. Hackers invade to learn more about the network. They keep invading, looking for loopholes and solving them. Although their actions are not recognized by the server owner, they are for the sake of network security. The intruder is one of the most introduced hacker branches on the network, and everyone knows him better, so I won't say much. However, you should pay attention to entering other people's hosts, and don't delete things that shouldn't be deleted because of the greed. Doing so will make real hackers look down upon it, and it may even cause unnecessary trouble.

Maintenance: attack must be defended. One kind of person is an expert who specializes in network maintenance. They are very familiar with the hacker's attack methods, and it is their daily work to fix the loopholes. It can be said that they are stronger than intruders and know our network better. Because intruders can attack different sites and hosts in one way. One of them succeeded. His invasion succeeded. The maintainer should guard against many hackers' attacks, and once it fails, it will fail. It's like the difference between a striker and a goalkeeper on a football field. Advance, attack the city and pull out the village, everyone wants to be. The goalkeeper stands silently in front of his own door, protecting his own goal, but usually the goalkeeper is the best in a team.

In these four types of work, different division of labor can be carried out, but depending on their own situation, I won't go into details here.

There is another kind of people, who are not conspicuous in the hacker group, but have played a significant role in the development of hacking technology. They are writing articles, writing everything they know and passing it on to others selflessly. With their help, more and more people have entered the sacred group of hackers. And they are still writing silently, using their articles to describe the real hacker and hacker spirit.

I hope that after reading my article, you will have another understanding of hackers and hacker spirit, which is also my purpose. Hackers are not gods, nor are they noble professions. Some hackers can't even fill their stomachs with their hacking skills. Hacking is just a hobby, just an interest. Many people have given their most precious things for this hobby and interest. And we should learn to respect the network and the hacker spirit. The hacker culture written by our predecessors cannot be defiled by us.

Finally, attach a hacker code that has been circulating on the Internet for a long time. Please watch it again. Maybe you'll think there's something you haven't seen in it. If you haven't seen it, look carefully and recite it if you can. In my eyes, it is more like an amulet. People who don't know English are considered to be learning English.

1 Never damages any system. This will only bring you trouble. Don't maliciously destroy any system, it will only bring you trouble. Malicious destruction of other people's software or systems will lead to legal and criminal responsibility. If you just use the computer, it's just illegal use! ! Note: Never destroy other people's software or materials! !

Never modify any system files, except to ensure that you are not found and that you can access that computer in the future. Never modify any system files unless you think you are absolutely sure of them, or you have to modify those files in order to facilitate your re-entry into the system in the future.

Don't share any information about your hacking project with anyone, but you should believe it. Don't share any information you have cracked with others unless this person can be trusted absolutely.

When posting on BBS (bulletin board system), describe your current hacking project as vaguely as possible. BBS can be monitored by law enforcement agencies. When you send relevant information to BBS (bulletin board system), be as vague as possible about what you are doing at present to avoid being warned by BBS.

Don't use anyone's real name or phone number when posting on BBS. Don't use your real name and phone number when posting articles on BBS.

Never leave any system you hacked. If you hack a system, don't leave any clues. Never leave a name or nickname, because the personal desire for over-expression caused by the excitement of success will kill you. )

7 Don't hack the government computer. Don't invade or destroy the mainframe of government agencies.

Never talk about hacking projects on the phone line at home. Don't talk about your hacking on the phone at home.

9 paranoia. Put all your hacking materials in a safe place. Put your hacker data in a safe place.

10 To be a real hacker, you have to know how to hack. You can't just sit there reading text files and hanging around on BBS. This is not the whole of hacking. If you really want to be a hacker, you must do what hackers should do with live ammunition. You can't become a hacker just by sitting at home and reading articles about hackers or stealing from BBS. This is not a hacker.

A real hacker. What is a hacker? Hackers are people who only use tools to invade? Screen name: Coolfire! Contact :cool.fire@msa.hinet.net, a hacker from Taiwan Province. The famous works are all those eight articles about hackers, which have brought good news to many novices. It was the initial stage of the growth of hackers in China. This person is regarded as the first generation hacker in China. Screen name: Xiao Rong! Personal Website: When xeyes.org mentions this name, people will think of streamer. This weapon that let the rookie invade countless hosts in those days came from Xiao Rong. Xiao Rong is a senior programmer, so he is proficient in software development and programming. Streaming, knife chaos, snow drowning and SQL injection ......