Joke Collection Website - Blessing messages - What is a hacker?

What is a hacker?

What is a hacker?

He can be traced back to the time when the first time-sharing minicomputers were born and the ARPAnet experiments were just launched decades ago. At that time, there was a group of programming experts and network celebrities with the characteristics of sharing. cultural community. Members of this culture coined the term "hacker." Hackers built the Internet. Hackers invented the UNIX operating system in use today. Hackers make Usenet work. Hackers make the WWW work. If you are part of this culture, if you contribute to this culture, and other members of this community know you and call you a hacker, then you are a hacker.

The hacker spirit is not limited to the hacker culture of software. There are people who approach other things, like electronics and music, with a hacker attitude -- in fact, you can find it at the highest levels of any scientific or artistic endeavor. Software-savvy hackers admire their counterparts in other fields and call them hackers - some claim that hackers' nature is absolutely independent of the specific field in which they work. But in this document, we focus our attention on the skills and attitudes of software hackers, and on the cultural tradition of enjoyment that coined the word "hacker."

There is a group of people who loudly claim to be hackers, but they are not. They are people (mainly teenagers) who deliberately damage computer and phone systems. Real hackers call these people "crackers" and disdain to associate with them. Most real hackers think crackers are lazy, irresponsible, and not very talented. Acting specifically for the purpose of breaking someone else's security doesn't make you a hacker any more than using wire to steal a car makes you an automotive engineer. Unfortunately, many journalists and writers tend to mistake "hackers" for hackers; this practice continues to annoy real hackers.

The fundamental difference is: hackers engage in construction, while hackers engage in destruction.

What is a hacker?

The term hacker originates from the English Hacker, which originally refers to a highly skilled computer expert, especially a programmer, who is enthusiastic about computer technology.

But today, the term hacker has been used to refer to those who specialize in using computers to cause damage or mischief. The correct English name for these people is Cracker, which some people translate as "hacker".

The fundamental difference between hackers and hackers is: hackers build, while hackers destroy.

Hacker Code:

Article 1: Do not maliciously damage any system, doing so will only cause you trouble. Malicious destruction of other people's software will result in legal penalties. If you are just using a computer, it is only illegal use! Note: Never destroy other people's software or data!

Article 2: Do not modify anything System file, if you modify it to enter the system, please change it back to its original state after achieving the purpose.

Article 3: Don’t easily tell friends you don’t trust about the site you want to hack.

Article 4: Don’t talk about anything about your Hack on bbs.

Article 5: Do not use your real name when posting articles.

Article 6. Do not leave your computer while intrusion is in progress

Article 7. Do not invade or damage the host of a government agency.

Article 8. Don’t talk about anything about your Hack on the phone.

Article 9. Keep your notes in a safe place.

What qualities should a real hacker have?

I think friends who can read this article must be familiar with the word hacker. But it is not easy to truly and thoroughly understand this word. I am going to give you some different views here, not to explain anything, but to tell you that there are many aspects to things, and there may be many different answers to one thing from different angles. For example, Hongke and Lanke are very popular in the domestic Internet industry. Personally, I think this is disrespectful to hackers and the hacker spirit, and it also means that they don't know much about the word "hacker".

“Hacker” is a foreign word, which is the Chinese translation of hacker.

In fact, it has no special meaning. The original meaning refers to people who are keen on computers and network technology. These people are crazy about computers and the Internet world, and will study any interesting problem. Their spirit is something that ordinary people cannot understand. It goes without saying that "hacker" is a compliment. But everyone is willing to be a hero. Gradually, some people took the banner of hackers and did many disgraceful things. Hackers call them "crackers" and are ashamed of them and don't want to be friends with them. In fact, there is no very clear boundary between hackers and hackers. They all hack into networks and crack passwords. But judging from their starting points, they are essentially different: hackers invade for the sake of network security and to improve their own technology. Free is the ideal of hackers. The online world they dream of is a free world with no conflicts of interest, no money transactions, and complete enjoyment. As for hackers, in order to achieve their own selfish desires, they enter other people's systems and wreak havoc. Hacking software for a few pocket bucks. Hackers are working hard to improve the network and make it more secure. Hackers are also studying in order to become the rulers of the online world and the gods of the online world. What a terrible idea this is. Modern society is increasingly dependent on the Internet. If there are no hackers to protect our network, our network will be used by hackers with ulterior motives and become a dark world.

The above is the difference between hackers and hackers. Now let’s talk about Hongke and Lanke, which are unique to China. Maybe the Chinese people have not liked the word "black" since ancient times. When they think of the word "black", they think of some messy things. Maybe China's first hacker was not a good person and did not do any good things, so the first impact he had on everyone was not very good. So much so that now there are many Internet experts who don’t want to have anything to do with hackers, but consider themselves red hackers and blue hackers. Why? The title of hacker is not worthy of you, or you are not worthy of this title. This is not Taekwondo, white belt, yellow belt, blue belt, level by level, and finally black belt. I believe that in the online world there is only a struggle between hackers and hackers, one good and one evil. Nothing else works. Do you really want to do something for the Internet? OK, become a hacker, devote yourself wholeheartedly, and work tirelessly throughout your life. There will always be gains. Even if you don't become a hacker, you will feel at ease after working hard. Instead of using Hongke, Lanke deceives himself and others.

I am not targeting certain organizations, I just want to express my opinion. I always feel that even friends in the Internet industry are not united and are clamoring for a separation. It is natural for the public to vilify hackers. Dare to be a hacker, even if you are misunderstood by others. They don't understand, well, use practical actions to prove yourself and use practical actions to tell others what a real hacker is like. Using small software to crack a QQ account and drop a bomb is not considered a hacker. When everyone truly knows what a hacker is, those self-righteous people will become everyone's laughing stock, and there will no longer be such sneaky things on the Internet, and everyone will concentrate on studying technology. Only this kind of online world will develop, and this kind of online world is the most ideal home that we yearn for.

In my personal opinion, there are several basic elements that a hacker must possess:

First of all, if you want to be a hacker, you must first learn to respect the Internet. Some people leave false information everywhere on the Internet, and their registered names and ages are all false. On the one hand, this is done for safety. But this insults the network. You can compare it to your lover. Nothing you say to your lover is true. Does this mean that you really love her? Nowadays, almost all formal websites will protect user information to a certain extent. Worrying about leaks on the Internet is a bit redundant. Besides, you are not Clinton or Bush. What are ordinary netizens afraid of? As the saying goes, "I am a gangster, who should I be afraid of?" (The above does not include the situation where a false name must be left)

Secondly, it is unimaginable to become a hacker without understanding the network and corresponding computer knowledge. Every hacker has an extraordinary research spirit and is very good at learning. The times are advancing, and technology is constantly improving. Only by learning can we not fall behind, and only by continuous learning can we stay ahead of others. If you want to make a name for yourself on the Internet, you have to learn some knowledge. Network basics, as the name suggests, are the most primitive rules in the online world. If you don't even understand the rules of the game, how can you play it? TCP/IP, this is the most popular network protocol on the current network. Most of the work on the network is completed using this network protocol. There are many more, which I won’t go into here.

Have you ever learned programming? How are you studying? What are your grades? Programming is as important to a computer or network worker as the right or left hand. If you don’t know how, learn it quickly! I suggest learning a few more programming languages ??to prepare for different situations. Here are a few I recommend: Assembly language. I personally think this is the most useful programming language. Although a bit complex, it is assembly language and is closer to computer hardware than a high-level language. Better than high-level languages ??on some issues. Among high-level languages, I prefer Delphi. Don't we all say, "Real programmers use VC, smart programmers use Delhpi, those who use VB are not programmers." Delphi has a simple structure and powerful functions, which I like it reason. If you want to aspire to become an excellent programmer, learn VC. I will be happy for you, but you must also be prepared to suffer a lot while making your vows. VC may not be as cute as you think. In the Internet era, many network programming languages ??have become everyone's new favorite. Among them, I still recommend a relatively basic HTML language. Firstly, because it is relatively basic, and secondly, it has been recognized by everyone, and many people have mastered it. If you don’t understand, you can ask, which is very helpful for your learning.

Now, perhaps our personal computers are all equipped with Microsoft products. But in real network servers, there are many kinds of network operating systems, because everyone has different requirements for network security. Windows 2000, Unix, Liunx, and SUN OS are all popular network operating systems on the Internet today. From my point of view, these are things we all need to master. At least you need to have a general understanding, and then do in-depth research on one or two types. Learn its history, how it works, its features, and its vulnerabilities. This way, we won’t be in a hurry when we encounter them.

In fact, being a hacker also has requirements for people themselves. Putting aside being smart and studious, it is unbearable for ordinary people just to wait for a long time to try passwords and crack the code without caring about the intrusion. Moreover, the difference between hackers and hackers is not big, it is often just a thought. After several years of hard work, I became a hacker just because of a thought. Everyone definitely doesn’t want to do it, but sometimes they just can’t control themselves. Therefore, we must practice to be patient, be indifferent to fame and fortune, and only think about FREE.

In addition, friends who are not very good at English should learn English well as soon as possible. I think one of the reasons why the development of hacker technology in China is so slow is because our English level is not high. Unlike hackers in Europe and the United States who can conduct technical exchanges, many technical articles and funnel reports are first published in English and then translated into Chinese. Maybe the article was translated by some crappy, non-computer-savvy person. This results in technical lag and distortion. Some people may say that they are too busy and have no time to learn. I said, why don’t we stop talking about computers or the Internet for three months and just focus on learning English. First sharpen your weapon, then sharpen your knife so that you won’t chop wood by mistake. After you have learned English well, and then read technical articles in English, you will feel that your eyes are brightened and you will learn more easily.

The above are some requirements for being a hacker. Such articles are everywhere on the Internet. What I want to say next is that our hacker organization is not perfect, which has also slowed down our progress in some aspects.

The hacker organization is a very strict organization with a clear division of labor and meticulous attention to detail. Like the well-known hacker organization DAY0, this organization is a hacker organization that focuses on software cracking. They are divided into many departments: the purchasing department, which buys genuine software (mostly trial versions) to provide cracking departments. The cracking department, the core department, cracks software passwords. The testing department tests the software and immediately notifies the cracking department to correct bugs if they find them. The distribution department is responsible for uploading software for other netizens to download. The Information Department collects information and accepts feedback from netizens. The members of these departments may be located in different corners of the earth, but they have a clear division of labor and execute tasks immediately after receiving them.

In my opinion, hackers can probably have the following divisions of labor:

Programming: The hacker software we use now are all written by these people, as well as those nasty viruses. Most of them are programmers and are not familiar with the Internet. But they all have solid computer skills and excellent programming skills, and are great computer talents. They will use their own advantages to write a lot of useful software to make our online world richer and make our intrusions easier.

Crack: This is a branch that was formed a long time ago. The main work of these people is to crack the password of the trial version of the software, thereby making the software truly free software. These people have actually mastered programming techniques, and they are more experienced in cracking passwords and decompiling. The best part of the hacker spirit is reflected in the work of these people, turning any software into free software and sharing it for everyone to download for free.

Intrusion: Many people understand hackers as people who invade, but they don’t know that intrusion is just a division of labor among hacker groups. Hackers intrude in order to better understand the network. They continue to intrude, discover vulnerabilities, and solve them. Although their actions were not approved by the server owner, their actions were for the sake of network security. Invasion is one of the most introduced hacker branches on the Internet. Everyone knows about it relatively well, so I won’t say anything more. But you should be careful when entering other people's hosts and never delete things you shouldn't delete in a hurry. Doing this will make real hackers look down on you, and may also cause unnecessary trouble.

Maintenance: Where there is offense, there is defense. There is a type of person who is an expert in network maintenance. They are very familiar with hackers' attack methods, and patching vulnerabilities is their daily routine. It can be said that they are stronger than the intruders and know our network better. Because intruders can use one method to attack different sites and hosts. If one succeeds, his invasion is considered a success. Maintenance personnel have to guard against attacks from many hackers. If they fail once, it means failure. It's like the difference between a forward and a goalkeeper on a football field. Everyone wants to be the vanguard and attack the city. The goalkeeper stands silently in front of his own goal, protecting his goal, but usually the goalkeeper is the most physically fit in a team.

Different divisions of labor can be carried out in these four types of work, but it depends on your own situation, and I will not go into details here.

There is another type of person who is not conspicuous in the hacker community, but they have played a significant role in the development of hacker technology. They are writing articles, writing articles about everything they know, and imparting it to others selflessly. With their help, more and more people have entered the sacred group of hackers. And they are still writing silently, using their articles to depict real hackers and hacker spirit.

I hope that after reading my article, everyone will have another understanding of hackers and hacker spirit. This is my purpose. Hackers are not gods, nor are they a noble profession. Some hackers cannot even use their hacking skills to fill their stomachs. Hacking is just a hobby, just an interest. Many people have sacrificed their most precious things for this hobby and interest. And we must learn to respect the Internet and the hacker spirit. The hacker culture written by our predecessors cannot be tarnished by us.

Finally, I attach a piece of hacker code that has been circulating on the Internet for a long time. For those of you who have read it, please read it a few more times. Maybe you will feel that there is something in it that you have not seen before. For those who haven’t seen it, look carefully and memorize it if you can. It is more like a talisman in my eyes. People who don’t understand English should just learn English.

1 Never damage any system. This will only get you into trouble. Malicious damage to other people's software or systems will result in legal penalties. If you are just using a computer, it is only illegal use!! Note: Never damage other people's software or data!!

2 Never alter Never modify any of the systems files, except for those needed to insure that you are not detected, and those to insure that you have access into that computer in the future. The files you want to change are necessary to make it easier for yourself to enter the system again in the future.

3 Do not share any information about your hacking projects with anyone but those you''d trust. Do not share any information about your hacking projects with anyone but those you''d trust.

4 When posting on BBS''s (Bulletin Board Systems) be as vague as possible when describing your current hacking projects. BBS''s CAN be monitered by law enforcement. When you send relevant information to BBS (electronic bulletin board), be as vague as possible about the dirty things you are currently doing to avoid warning the BBS.

5 Never use anyone''s real name or real phone number when posting on a BBS.

6 Never leave your handle on any systems that you hack in to. If you hack into a system, never leave any clues. (Never leave a name or a nickname. At this time, the excessive desire for personal performance caused by the excitement of success will kill you.)

7 Do not hack government computers. Do not hack into or Destroy government agencies' hosts.

8 Never speak about hacking projects over your home telephone line.

9 Be paranoid. Keep all of your hacking materials in a safe place. Keep all of your hacking materials in a safe place.

10 To become a real hacker, you have to hack. You can''t just sit around reading text files and hanging out on BBS''s. This is not what hacking is all about. To become a hacker, you have to do what a hacker should do. You can't become a hacker just by sitting at home and reading articles about hackers or grabbing things from BBS. This is not a "hacker"

A real hacker What is a hacker? Someone who only uses tools to hack is called a hacker? Online name: Coolfire! Contact information: cool.fire@msa.hinet.net A Taiwanese hacker. The most famous ones are those 8 introductory articles on hacking, which have brought good news to many novices. At that time, it was still the early stage of the growth of Chinese hackers. This person is regarded as the first generation of hackers in China. Screen name: Xiaorong! Personal website: xeyes.org When people mention this name, they will think of streamers. This weapon that allowed rookies to invade countless hosts was made by Xiaorong. Xiaorong is a senior programmer, so she is proficient in software development and program production. Streamer, random knife, drowning and SQL injection...