Ticker

6/recent/ticker-posts

What do I Need In Order to Hack? Beginners Hacking Series

 


What do I Need In Order to Hack?

 

Beginners' Series #1 


You may wonder whether hackers need expensive computer equipment and a shelf full of technical manuals. The answer is NO! Hacking can be surprisingly easy! Better yet, if you know how to search the Web, you can find almost any computer information you need for free.  
 
In fact, hacking is so easy that if you have an online service and know how to send and read email, you can start hacking immediately. The Beginners Hacking' Series #2 will show you where you can download special hacker-friendly programs for Windows that are absolutely free. And we'll show you some easy hacker tricks you can use them for. 

 
Now suppose you want to become an elite hacker? All you will really need is an inexpensive "shell account" with an Internet Service Provider. In the Beginners Hacking' Series #3 we will tell you how to get a shell account, log on, and start playing the greatest game on Earth: Unix hacking! Then in Beginners Hacking series you will get Unix hacking seriously.  
 
You can even make it into the ranks of the Uberhackers without loading up on expensive computer equipment. In Part II we introduce Linux, the free hacker-friendly operating system. It will even run on a 386 PC with just 2 Mb RAM!  Linux is so good that many Internet Service Providers use it to run their systems.  
 
In Part III we will also introduce Perl, the shell programming language beloved of Uberhackers. We will even teach some seriously deadly hacker "exploits" that run on Perl using Linux. OK, you could use most of these exploits to do illegal things. But they are only illegal if you run them against someone else's computer without their permission. You can run any program in this series of Guides on your own computer, or your (consenting) friend's computer - if you dare! Hey, seriously, nothing in this series of Guides will actually hurt your computer, unless you decide to trash it on purpose.  
 
We will also open the gateway to an amazing underground where you can stay on top of almost every discovery of computer security flaws. You can learn how to either exploit them -- or defend your computer against them!  

 

About the Guides to (mostly) Harmless Hacking  

 
We have noticed that there are lots of books that glamorize hackers. To read these books you would think that it takes many years of brilliant work to become one. Of course we hackers love to perpetuate (Keep Going) this myth because it makes us look so incredibly Cool.

But how many books are out there that tell the beginner step by step how to actually do this hacking stuph? None! Seriously, have you ever read _Secrets of a Superhacker by The Knightmare (Loomponics, 1994) or Forbidden Secrets of the Legion of Doom Hackers by Salacious Crumb (St. Mahoun Books, 1994)? They are full of vague and out of date stuph.  
 
And if you get on one of the hacker news groups on the Internet and ask people how to do stuph, some of them insult and make fun of you.  OK, they all make fun of you.  
 
We see many hackers making a big deal of themselves and being mysterious and refusing to help others learn how to hack. Why? Because they don't want you to know the truth, which is that most of what they are doing is really very simple!  
 
Well, we thought about this. We, too, could enjoy the pleasure of insulting people who ask us how to hack. Or we could get big egos by actually teaching thousands of people how to hack. 😂😂😂😂.  
 

How to Use the Guides to (mostly) Harmless Hacking  

 
If you know how to use a personal computer and are on the Internet, you already know enough to start learning to be a hacker. You don't even need to read every single Guide to (mostly) Harmless Hacking in order to become a hacker.  
 
You can count on anything in Part I, II and III being so easy that you can jump in about anywhere and just follow instructions.  

 
But if your plan is to become "elite," you will do better if you read all the Guides, Then Continue with Us, There will be a post Daily on Hacking, Also Subscribe us.
 
If your goal is to become an Uberhacker, the Guides will end up being only the first in a mountain of material that you will need to study. However, we offer a study strategy that can aid you in your quest to reach the pinnacle of hacking.  
 

How to Not Get Busted  

 
One slight problem with hacking is that if you step over the line, you can go to jail. We will do our best to warn you when we describe hacks that could get you into trouble with the law. But we are not attorneys or experts on cyberlaw.  In addition, every state and every country has its own laws. And these laws keep on changing. So you have to use a little sense.  
 
However, we have a Guide to (mostly) Harmless Hacking Computer Crime Law Series to help you avoid some pitfalls.  
 
But the best protection against getting busted is the Golden Rule. If you are about to do something that you would not like to have done to you, forget it. Do hacks that make the world a better place, or that are at least fun and harmless, and you should be able to keep out of trouble.  
 
So if you get an idea from the Guides to (mostly) Harmless Hacking that helps you to do something malicious or destructive, it's your problem if you end up being the next hacker behind bars.  Hey, the law won't care if the guy whose computer you trash was being a d***. It won't care that the giant corporation whose database you filched shafted your best buddy once. They will only care that you broke the law.  

To some people it may sound like phun to become a national sensation 😎 in the latest hysteria over Evil Genius hackers 👿. But after the trial, when some reader of these Guides ends up being the reluctant "girlfriend" of a convict named Spike, how happy will his news clippings make him?  
 

Conventions Used in the Guides  

 
You've probably already noticed that we spell some words funny, like "kewl (Cool)" and "phun." These are hacker slang terms. Since we often communicate with each other via email, most of our slang consists of ordinary words with extraordinary spellings. For example, a hacker might spell "elite" as "3l1t3," with 3's substituting for e's and 1's for i's. He or she may even spell "elite" as "31337. The Guides sometimes use these slang spellings to help you learn how to write email like a hacker.  

 
Of course, the cute spelling stuph we use will go out of date fast. So we do not guarantee that if you use this slang, people will read your email and think, "Ohhh, you must be an Evil Genius! I'm sooo impressed!"  
 
Take it from us, guys who need to keep on inventing new slang to prove they are "k-rad 3l1t3" are often lusers and lamers. So if you don't want to use any of the hacker slang of these Guides, that's OK by us. Most Uberhackers don't use slang, either.  
 

Who Are You? 

 
 We've made some assumptions about who you are and why you are reading these Guides:  
 
  • You own a PC or Macintosh personal computer.
  • You are on-line with the Internet.
  • You have a sense of humor and adventure and want to express it by hacking.
  • Or -- you want to impress your friends and pick up chicks (or guys) by making them think you are an Evil Genius. 
 
So, does this picture fit you? If so, OK, d00dz, start your computers. Are you ready to hack?


Comment below about this.


Post a comment

0 Comments