Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Cyber Culture :: fuck022.htm

How to be an evil computer hacker



Hacker Scene

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
=   F.U.C.K. - Fucked Up College Kids - Born Jan. 24th, 1993 - F.U.C.K.   =
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

                      How To Be An Evil Computer Hacker
                      ---------------------------------

People are always asking me "Voyager, How do *I* become an evil computer
hacker like you?"  I almost always give them the straight truth, and
they very seldom believe me.

The secret to being a successful Evil Computer Hacker (tm-TNo(1991)) is
understanding systems.  To expolit a system, you must first understand
how that system works, both conceptually and practically.  Over 2500 years
ago, Sun Tzu wrote "If you know the enemy and you know yourself, you
need not fear the result of a hundred battles."  Make yourself knowledgable
about systems, and assess your knowledge fairly.  Do this and you will
not be defeated.

Here are a few tips on becoming an Evil Computer Hacker:

Read at least one book a week.

        Dilbert books don't count.  This week I've read _An AIX
        Companion_, _AIX RS/6000 System and Administration Guide_ and
        _AFS Users Guide_.  I'm working on _Troubleshooting
        Internetworks_ today.  Select books that are just a bit above
        your current skill level.  Books below your current skill level
        won't help you, nor will books too far above your current skill
        level.  Select books that interest you.  If a topic does not
        arouse your interest, you will not retain the information you
        are studying.  With every new fact you read, try to fit it into
        place with the facts you currently posess.  Look at the new fact
        and try to imagine a situation where you could put it to use.
        Personalize the knowledge and it will stay around for a long
        time.  As always, take good notes.  Review your notes when you
        finish the book.  Review your notes one day later and also one
        week later.

Keep up with periodicals in your field.

        Books are your best source for comprehensive information, but
        the lead time for a book to go to press means that books are out
        of date before they hit the shelves.  Periodicals are required
        to round out your knowledge base.  Public libraries subscribe to
        many periodicals.  Many industry periodicals are available free
        to qualified subscribers.  Remember, Evil Computer Hackers are
        _always_ qualified subscribers.  Do not ignore online
        periodicals like Phrack, CoTNo, The Infinity Concept and FEH.

Wander the Web.

        When you come across a new concept, term, phrase, vendor,
        product or technology -- head to the World Wide Web.  Visit one
        or more of the WWW search engines (my personal favorite is
        http://www.yahoo.com) and search for references.  Each time you
        find a link to something that sounds interesting, follow that
        link.  An excellent way to expand our horizons is to find
        information that we were not _originally_ looking for.

Practice, Practice, Practice.

        Reading Is Fundamental, but reading isn't everything.  Practice
        is required to cement your recently obtained knowledge into
        place.  Practice everything that you can practice.  Build
        cables. Build circuits.  Code software.  Execute commands.
        Explore systems.  Without practice you are only a voyeur, not a
        voyager.

Find a job in the field.

        The best way to practice is to get paid for it.  This method
        also has the advantage of helping you to avoid time in the
        Penalty Box.  Although prison can be an interesting and learning
        experience, I really cannot reccommend it as a good step toward
        becoming an Evil Computer Hacker.  In addition, you come into
        contact with systems you simply can't get into by traditional
        hacker methods.  I may be able to remotely access the NSA's
        Cray's, but I certaintly cannot remotely access their biometric
        security devices.  As an employee (or contractor), I will be
        able to access these systems every day.

Do a good job at work.

        Become the wizard at the office.  Learn _everything_ about
        _every_ system in the building, even that horrid PRIME 9950 that
        no one wants to learn to use.  Be the person people come to with
        questions.  Every time someone comes to you with a question,
        they bring useful information with them.  Repeat after me "Sure,
        I'll take a look at the problem for you. I'll need an account on
        the system though."

Switch jobs regularly, but not too regularly.

        Switching jobs regularly is required to keep your skills up to
        date.  Not that long ago, three years was considered the
        shortest acceptable time to hold a position.  Today, it's two
        years and falling.

Teach others.

        When we teach a subject, we organize and clarify that subject in
        our mind.  We find (and fill) the gaps in our understanding of
        the subject matter.  Our conceptualization of the system
        improves, and our understanding of the system deepens.


There are no secrets to becoming an Evil Computer Hacker.  There are no
short cuts.  Sure, there are a thousand lamers with 31337 sUp3R s3Kr3t
r00t X-pL01tS, but they are still lamers.  They pretend to be Evil
Computer Hackers, but when their particular toy exploit is patched, they
are back to begging for scripts on #hack.

One more note: Avoid IRC, it's a pit from which few escape.

-Voyager

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
= Questions, Comments, Bitches, Ideas, Rants, Death Threats, etc etc...   =
= Internet : jericho@dimensional.com                 (Mail is welcomed)   =
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
=                  gote land            +27.31.441115                     =
=                  Arrested Development +31.77.3547477                    =
=                  Global Chaos         +61.2.681.2837                    =
= Chemical Persuasion  203.324.0894    Undrgrnd Indust/Inc. 207.490.2158  =
= Damnation            212.861.0580    that stupid place    215.985.0462  =
= Hacker's Haven       303.343.4053    PheedbacK            303.782.0893  =
= E.L.F.        (NUP)  314.272.3426    Misery               318.625.4532  =
= Dungeon Sys. Inc.    410.263.2258    Psykodelik Images    407.834.4576  =
= Paradise Lost        414.476.3181    Black SunShine       513.891.3465  =
= underworld_1995.com  514.683.1894    Digital Fallout      516.378.6640  =
= PSYCHOSiS            613.836.7211    Bad Trip             615.870.8805  =
= Plan 9               716.881.3663    suicidal chaos       718.592.1083  =
= Damaged              801.944.7353    The Death Star Bar   805.872.3151  =
= Purple Hell          806.791.0747    Atrocity Exhibition  905.796.3385  =
= Phoenix Modernz      908.830.8265    The Keg              914.234.9674  =
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
= Files through Anon FTP  FTP.DIMENSIONAL.COM/users/jericho/FUCK          =
=                         FTP.PRISM.NET/pub/users/mercuri/zines/fuck      =
=                         FTP.WINTERNET.COM/users/craigb/fuck             =
=                         FTP.GIGA.OR.AT/pub/hackers/zines/FUCK           =
=                         ETEXT.ARCHIVE.UMICH.EDU - /pub/Zines/FUCK       =
=                         FTP.DIMENSIONAL.COM - /users/rage/zines/fuck    =
= Files through WWW: http://www.dimensional.com/~jericho                  =
=                    http://command.com.inter.net  (DisordeR's User Page) =
=                    http://www.prism.net/zineworld/fuck/                 =
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=



TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH