How to become a hacker full series of instructions page 1/2

Source: Internet
Author: User

What is a hacker?
Jargon file contains a lot of definitions about the term "hacker", most of which are highly technical and eager to solve problems and surpass the limit.
. But if you only want to know how to be a hacker, there are only two things that are related. This can be traced back to the first place decades ago
A time-sharing mini-computer was born, and the ARPANET experiment was just launched. Program Composed of design experts and network celebrities,
Cultural Communities with sharing characteristics. Members of this culture have created the term "hacker. Hackers have established the internet. Black
Hackers have invented the UNIX operating system in use. Hackers make Usenet work, and hackers make WWW work. If
You are part of this culture. If you contribute to this culture and other members of this community know you and call you
Hacker, then you are a hacker. The hacker spirit is not limited to the hacker culture of software. Someone treats others with a hacker's attitude
Love, such as electronics and music-in fact, you can discover it in any of the highest levels of scientific and artistic activities. Software hackers
They appreciate their peers in other fields and call them "hackers"-some people claim that hackers are a specific nature that is absolutely independent of their work
. However, in this document, we focus on the technology and attitude of software hackers and the co-occurrence of the term "hacker ".
Enjoy the distinctive cultural traditions. A group of people shouted that they were hackers, but they were not. They (mainly teenagers
) Is someone who deliberately damages the computer and telephone system. The real hackers call these people "Cracker" rather
Wu. Most real hackers think that hackers are too lazy and irresponsible to do anything. Specifically for the purpose of undermining others' Security and
You cannot be a hacker, just as stealing a car with wire does not make you a car engineer. Unfortunately, many reporters and
Writers often mistakenly regard "hackers" as hackers. Such practices have always annoyed real hackers.

The fundamental difference is that hackers are engaged in construction and hacking.

If you want to be a hacker, read it. If you want to be a hacker, read the alt.2600 newsgroup and
Unlike the smart ones I imagined, I went to jail five to ten times. I just want to say so much about hackers.

Hacker's attitude
Hackers solve problems and build things, while advocating free and selfless two-way help. To be recognized by others as a hacker, your behavior
It seems that you have such an attitude. If you want to do a good job like you have such an attitude, you have to stick to it. However
If you think that cultivating hacker attitudes is just a way to be recognized in the hacker culture circle, then it is a big mistake. Become possessed of these features
Quality people are very important to you-they help you learn and provide you with continuous motivation. Same as all creative art 1
The most effective way to become a master is to imitate the spirit of the master-not only intelligence, but also emotional imitation. Maybe, next
In front of this modern Zen poem, I explained this meaning well:

To follow the path :( follow this path :)
Look to the master ,)
Follow the master, (follow Master ,)
Walk with the master, (pass with the master ,)
See through the master, (Insight master ,)
Become the master. (become a master .)

Well, if you want to be a hacker, read the following things until you believe them:

1. The world is full of fascinating issues to be resolved.
Being a hacker has a lot of fun, but it takes a lot of effort to get fun. These efforts require motivation. Successful Athletes
Get motivation from the pleasure of exercising and exceeding the limits of yourself. Similarly, as a hacker, you must be able to solve problems, hone your skills, and exercise your knowledge.
Get Basic fun. If you are not a natural hacker and want to be a hacker, you must try to become such a hacker. Otherwise, you will find that
Hackers will be swallowed up by other distracting things, such as money, sex, and social virtual names. (Similarly, you must be able to learn from yourself.
Build confidence-believe that, even if you have almost no idea about a problem, you will eventually understand and solve it as long as you experiment and study.
Determine it .)

2. A problem should not be solved twice.
Smart heads are precious and limited resources. When the world is still filled with a lot of interesting new problems to be resolved, they should not be wasted in
Re-invent things like wheel. As a hacker, you must believe that the time for other hackers to think is precious-therefore, sharing information,
Solving the problem and releasing the result to other hackers is almost moral, so that others can solve the new problem rather than constantly busy
Pay for old problems. (You do not have to think that all your inventions and creations must be published, but the hackers who do so are the ones who win everyone's respect.
. Selling money to support your family, renting a house, buying a computer, or even making a fortune is also compatible with hacking values, as long as you don't forget that you are a hacker.
)

3. Boring and boring work is evil.
Hackers (generally creative people) should never be troubled by stupid repetitive labor because when such a thing happens, it means
They are not doing what only they can do-solving new problems. This waste hurts everyone. So boring and boring
The work is not only uncomfortable, but also evil. As a hacker, you must firmly believe this and try to put as much boring work as possible
Automation not only for you, but also for others (especially other hackers ). (This is an obvious exception. Hackers sometimes
Do some repetitive or boring work in the eyes of others for "mental rest", or for some skill or division
Special experience beyond this. But this is voluntary-people with brains should not be forced to do boring work .)

4. Long live freedom.
Hackers are born Anti-authoritarian. Anyone who can send commands to you can force you to stop solving the problems that keep you fascinated.
The general idea of a dictatorship is that he usually gives some extreme ignorance reasons. Therefore, wherever it is, any authoritarian approach, as long as it
If you oppress you and other hackers, you have to fight against them (this is not a challenge to all authorities. Children need to be monitored and criminals need to be taken care.
If the command is executed to get something that saves more time than other methods, hackers can agree to accept some form of authority. However
It is a limited and intentional transaction. You should not agree to give the kind of personal obedience that the Authority wants .) Authoritative reviews and confidentiality
. They do not trust voluntary cooperation and information sharing-they only like the so-called "cooperation" controlled by them ".

Therefore, as a hacker, you must review, keep it confidential, and use force or deception to oppress people with the ability to do so.
Yes. At the same time, you must be willing to fight for this belief.

5. Attitudes cannot replace abilities.
As a hacker, you must cultivate these attitudes. However, having these attitudes does not make you a hacker or a hacker.
Athletes and rock stars. Being a hacker requires intelligence, practice, dedication, and hard work. Therefore, you must learn to doubt,
And respect all kinds of capabilities. Hackers will not waste time on people who do the same for their models, but they are very respectful-especially
The ability to engage in hacker work, but any ability is always good. These capabilities are especially good for few people.
Of course, it is best to involve mental, technical, and focused capabilities. Dear ability, you will enjoy the pleasure of improving your abilities-hard work
Work and dedication will turn into a high degree of entertainment rather than hard work. It is important to become a hacker.

Basic hacker skills
Hacker attitude is important, but technology is more important. Attitude cannot replace technology. Before you are called a hacker by other hackers, there are some basic technologies.
You must master. These basic technologies are slowly changing with the emergence of new technologies and the expiry of old technologies. For example, the previous content includes
Programming Using machine language, and HTML was not included until recently. In general, the following technologies are mainly involved:

1. Learn how to program.
This is of course the most basic hacker skill. If you do not have anyProgramming Language, I suggest you start with python. It is clearly designed and documented
Full, suitable for beginners. It is a good entry language and not just a toy. It is very powerful, flexible, and suitable
Large projects. I have a python review to describe this in detail. A good tutorial can be found on the python website.

Java is also a good entry language. It is much harder than python, but the generatedCodeThe speed is also much faster. It is also an excellent computing
Machine language, not just for getting started. However, if you only use one or two languages, you will not be able to meet the technical level required by hackers.
It cannot reach the level of a programmer-you need to learn how to think about programming problems in an abstract way, independent of any language. To Do
As a real hacker, you need to learn to use some manuals within a few days to quickly master a new language based on what you know. This means
You should learn several completely different languages. If you want to do some important programming work, you will have to learn the C language, Unix core language
Statement. C ++ is very similar to C.
It should not be difficult to learn. However, these two types are not suitable for Programming beginners. In fact, the more you avoid using C programming, the more efficient you are.
Higher. C is very efficient and saves your machine resources. Unfortunately, the efficiency of C is that you manually perform a lot of underlying management (such as memory
. The underlying code is complex and prone to bugs, which will make you spend a lot of time debugging. Today's machines are so fast,
This is usually not worth the candle-it is wise to use a language that is slow and inefficient, but significantly saves your time. Because
Select python. Other important languages for hackers include Perl and lisp. Perl is practical and worth learning. It is widely used.
It is used for dynamic web pages and system management. Therefore, even if you never use Perl to write programs, you should at least learn to read them. Reasons why many people use Perl and
I suggest that you use python for the same reason, to avoid using C to do the work that does not require C efficiency. You will need to understand
.

The reason for learning lisp is different-you will get a wealth of inspiration and experience when you finally master it. These experiences will make you
To become a better programmer, even if you actually seldom use lisp itself. Of course, you 'd better have five,
Java, C/C ++, Perl, and lisp ). Apart from being the most important hacker language, they also represent completely different programming ideas and methods,
Each type will benefit you a lot.

Here I cannot give you complete guidance on how to program-this is a complex skill. But I can tell you that books and classes are also
It cannot be done (many of the best hackers may be self-taught ). You can learn the characteristics of language from books-only
It is a bit of a fur, but to make the written knowledge into your own skills, you can only learn from others through practice and modestly. Therefore, to read the code (1)
(2) write code. Learning how to program is just like learning to write in beautiful natural languages. The best practice is to read some famous masters and try again.
Write something by yourself, read more, write more, read more, and write more ...... So reciprocating until yourArticleLet's see your example.
Is concise and powerful. In the past, it was difficult to find the code suitable for reading, because there were almost no large programsSource codeIt allows new users to practice.
This situation has changed dramatically; open source software, programming tools, and operating systems (all written by hackers) are now available
. Let's continue to discuss in the next topic ......

2. Get an open-source Unix and learn to use and run it.
I suppose you already have or can use a PC (today's children are so happy ). New users can learn hacker skills
The most basic step is to get a Linux or BSD-UNIX file, install it on your PC, and run it. Yes, this world
In addition to Unix, there are other operating systems in the world. But they are all released in binary form-you cannot read its source code, nor can you
Modify it. Trying to learn hacker technology on a computer running dos, windows, or MACOs is like dancing with your feet. In addition,
Unix or Internet Operating System. You can learn to access the Internet without knowing UNIX, but you cannot become an Internet without knowing UNIX.
Hacker. Therefore, today's hacker culture is largely Unix-centric. (This is not always true. Some very early hackers
This has always been unpleasant, but the connection between UNIX and the Internet is so strong that even Microsoft is helpless .)

Therefore, install a set of Unix-I personally like Linux but there are other types (yes, you can install Linux and
DOS/windows on the same computer ). Learn it, use it, and configure it. Use it to surf the Internet. Read its source code. Modify
Its source code. You will get better programming tools (including C, lisp, Python, and Perl) than Microsoft operating systems ). You will
I feel that you have an infinite amount of fun and learn more things that you cannot realize before you become a master. For more information about how to learn UNIX, visit
The loginataka.

I want to know how to get a copy of Linux and where to access Linux. The simplest way for Chinese readers
I did not go to the nearby D/genuine disc store .) You can find bsd unix help and other resources at www.bsd.org. I have write 1
This is an introductory article on UNIX and Internet basics. (Note: If you are a newbie, I do not recommend that you install Linux or
BSD. To install Linux, contact the local Linux User Group or open projects network. LISC maintains some
IRC channel, where you can get help .)

3. Learn how to use WWW and write HTML
Most of the things built by hacker culture play a role where you cannot see them, helping factories, offices, and universities run normally.
It is hard to see its impact on the lives of non-hacker ordinary people.

Web is a big exception. Even politicians agree that this dazzling hacking toy is changing the world. This is the reason (
There are many others), you need to learn to master the web.

This does not only mean how to use a browser (anyone can), but rather learns how to write HTML and web Markup languages. If you don't
program, writing HTML will teach you some habits that help you learn. Therefore, first complete a home page. (There are a lot of good tutorials on the Internet; this
is one .) However, only one home page cannot make you a hacker. Web pages are full of web pages. Most of them are meaningless.
zero-volume garbage-the interface is fashionable garbage. Note that the garbage level is similar. (For more information, visit the HTML hell page ).
to be valuable, Your webpage must have content-it must be interesting or helpful to other hackers. This is what is involved in the next topic ......

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.