what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

fuck0206.html

fuck0206.html
Posted Aug 17, 1999

How to be an evil computer hacker (voyager)

tags | paper
SHA-256 | 102c0738aa299626704cd35e224b8bafec4a34f9eaf23a6e5bcebe590c3204c7

fuck0206.html

Change Mirror Download
<!DOCTYPE HTML PUBLIC "html.dtd">
<HTML>
<HEAD><TITLE>Hacker Scene</TITLE>
</HEAD>
<BODY BGCOLOR="#000000" VLINK="#C0C0C0" TEXT="#FFFFFF" LINK="#FF0000" ALINK="#FF0000">

<PRE>

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
= F.U.C.K. - Fucked Up College Kids - Born Jan. 24th, 1993 - F.U.C.K. =
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

How To Be An Evil Computer Hacker
---------------------------------

People are always asking me "Voyager, How do *I* become an evil computer
hacker like you?" I almost always give them the straight truth, and
they very seldom believe me.

The secret to being a successful Evil Computer Hacker (tm-TNo(1991)) is
understanding systems. To expolit a system, you must first understand
how that system works, both conceptually and practically. Over 2500 years
ago, Sun Tzu wrote "If you know the enemy and you know yourself, you
need not fear the result of a hundred battles." Make yourself knowledgable
about systems, and assess your knowledge fairly. Do this and you will
not be defeated.

Here are a few tips on becoming an Evil Computer Hacker:

Read at least one book a week.

Dilbert books don't count. This week I've read _An AIX
Companion_, _AIX RS/6000 System and Administration Guide_ and
_AFS Users Guide_. I'm working on _Troubleshooting
Internetworks_ today. Select books that are just a bit above
your current skill level. Books below your current skill level
won't help you, nor will books too far above your current skill
level. Select books that interest you. If a topic does not
arouse your interest, you will not retain the information you
are studying. With every new fact you read, try to fit it into
place with the facts you currently posess. Look at the new fact
and try to imagine a situation where you could put it to use.
Personalize the knowledge and it will stay around for a long
time. As always, take good notes. Review your notes when you
finish the book. Review your notes one day later and also one
week later.

Keep up with periodicals in your field.

Books are your best source for comprehensive information, but
the lead time for a book to go to press means that books are out
of date before they hit the shelves. Periodicals are required
to round out your knowledge base. Public libraries subscribe to
many periodicals. Many industry periodicals are available free
to qualified subscribers. Remember, Evil Computer Hackers are
_always_ qualified subscribers. Do not ignore online
periodicals like Phrack, CoTNo, The Infinity Concept and FEH.

Wander the Web.

When you come across a new concept, term, phrase, vendor,
product or technology -- head to the World Wide Web. Visit one
or more of the WWW search engines (my personal favorite is
http://www.yahoo.com) and search for references. Each time you
find a link to something that sounds interesting, follow that
link. An excellent way to expand our horizons is to find
information that we were not _originally_ looking for.

Practice, Practice, Practice.

Reading Is Fundamental, but reading isn't everything. Practice
is required to cement your recently obtained knowledge into
place. Practice everything that you can practice. Build
cables. Build circuits. Code software. Execute commands.
Explore systems. Without practice you are only a voyeur, not a
voyager.

Find a job in the field.

The best way to practice is to get paid for it. This method
also has the advantage of helping you to avoid time in the
Penalty Box. Although prison can be an interesting and learning
experience, I really cannot reccommend it as a good step toward
becoming an Evil Computer Hacker. In addition, you come into
contact with systems you simply can't get into by traditional
hacker methods. I may be able to remotely access the NSA's
Cray's, but I certaintly cannot remotely access their biometric
security devices. As an employee (or contractor), I will be
able to access these systems every day.

Do a good job at work.

Become the wizard at the office. Learn _everything_ about
_every_ system in the building, even that horrid PRIME 9950 that
no one wants to learn to use. Be the person people come to with
questions. Every time someone comes to you with a question,
they bring useful information with them. Repeat after me "Sure,
I'll take a look at the problem for you. I'll need an account on
the system though."

Switch jobs regularly, but not too regularly.

Switching jobs regularly is required to keep your skills up to
date. Not that long ago, three years was considered the
shortest acceptable time to hold a position. Today, it's two
years and falling.

Teach others.

When we teach a subject, we organize and clarify that subject in
our mind. We find (and fill) the gaps in our understanding of
the subject matter. Our conceptualization of the system
improves, and our understanding of the system deepens.


There are no secrets to becoming an Evil Computer Hacker. There are no
short cuts. Sure, there are a thousand lamers with 31337 sUp3R s3Kr3t
r00t X-pL01tS, but they are still lamers. They pretend to be Evil
Computer Hackers, but when their particular toy exploit is patched, they
are back to begging for scripts on #hack.

One more note: Avoid IRC, it's a pit from which few escape.

-Voyager

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
= Questions, Comments, Bitches, Ideas, Rants, Death Threats, etc etc... =
= Internet : jericho@dimensional.com (Mail is welcomed) =
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
= gote land +27.31.441115 =
= Arrested Development +31.77.3547477 =
= Global Chaos +61.2.681.2837 =
= Chemical Persuasion 203.324.0894 Undrgrnd Indust/Inc. 207.490.2158 =
= Damnation 212.861.0580 that stupid place 215.985.0462 =
= Hacker's Haven 303.343.4053 PheedbacK 303.782.0893 =
= E.L.F. (NUP) 314.272.3426 Misery 318.625.4532 =
= Dungeon Sys. Inc. 410.263.2258 Psykodelik Images 407.834.4576 =
= Paradise Lost 414.476.3181 Black SunShine 513.891.3465 =
= underworld_1995.com 514.683.1894 Digital Fallout 516.378.6640 =
= PSYCHOSiS 613.836.7211 Bad Trip 615.870.8805 =
= Plan 9 716.881.3663 suicidal chaos 718.592.1083 =
= Damaged 801.944.7353 The Death Star Bar 805.872.3151 =
= Purple Hell 806.791.0747 Atrocity Exhibition 905.796.3385 =
= Phoenix Modernz 908.830.8265 The Keg 914.234.9674 =
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
= Files through Anon FTP FTP.DIMENSIONAL.COM/users/jericho/FUCK =
= FTP.PRISM.NET/pub/users/mercuri/zines/fuck =
= FTP.WINTERNET.COM/users/craigb/fuck =
= FTP.GIGA.OR.AT/pub/hackers/zines/FUCK =
= ETEXT.ARCHIVE.UMICH.EDU - /pub/Zines/FUCK =
= FTP.DIMENSIONAL.COM - /users/rage/zines/fuck =
= Files through WWW: http://www.dimensional.com/~jericho =
= http://command.com.inter.net (DisordeR's User Page) =
= http://www.prism.net/zineworld/fuck/ =
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=


</PRE>
</BODY>
</HTML>

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close