Skip to main content

How to become a hacker?


Disclaimer! All the information provided below are only for knowledge. 


If movies have taught us anything, it is the computer hackers can do anything. Even hack someone's brakes on their car. Hell! Jeff Goldblum saved the entire planet with a MacBook. Wouldn't you love to do that? Here is how. If you think this post is going to teach, you how to break into the Pentagon think again, hacking into computers you do not own or have explicit permission to do so is illegal and you will go to jail. When most people think of a hacker, they think of some sweaty nerd stealing your files but that is not accurate. According to Eric Raymond, noted hacker and author of the new hacker’s dictionary, a computer hacker is someone who is passionate about computers and works with other computer hackers to forward computer innovation. There are two kinds of hackers white hat and black hat. White hat hackers are the good guys who break into systems to learn about vulnerabilities to make the internet safer place. Black hat hackers break into computers to steal money private documents or even just for kicks. Think of the two like the Jedi and the Sith, but with more neckbeards before you even touch a computer you need to learn to think like a hacker.


Don't forget to follow us.




In the new hacker dictionary, Eric Raymond lays out the five principles of hackers:-

1.  The world is full of fascinating problems waiting to be solved that means, you have to be curious and always interested in learning new things.
2.  No problems should ever have to be solved twice. If someone has figured something out they should share the solution with the world.
3.  Boredom and drudgery are evil. We should find ways to get computers to automate the boring stuff.
4.  Freedom is good. Information and knowledge are a human right. Everyone deserves access to.
5.  Attitude is no substitute for competence. You have to walk the walk bud.

Some Other useful links:-


Don't forget to follow us!


Let us get you some hacker skills to be a hacker.

1.  You need to learn how to program. There are hundreds of programming languages all of them with their own pros and cons but the best languages to learn are the ones most used in the hacker community see the Python and Perl. There are plenty of books and free guides on the internet to help you learn to program. If you're still in school consider signing up for a programming class because they have those. There might even be a programming class at your local community college. That's worth checking out.
2.  You're also gonna want to learn Linux. Linux is an operating system that's used on ninety six point five percent of web servers in the world. So if you want to navigate the inner workings of the Internet, you need to have Linux on your computer instead of Windows or iOS. There are tons of different flavors of Linux available for free on the internet. So try a bunch! Find the one that you like best. The best way to do that is to use your programming skills to work on open source projects.
3.  Open source software is software whose code is made public for everyone to view and potentially change. Well-known open source software includes web browser “Firefox” which is awesome, the blogging platform “WordPress” and the previously mentioned “Linux”. Get your feet in the door of developing. Open source software offered to beta test the latest releases. You'll start to make friends with hackers and eventually work your way up to contributing code. You can also meet people at the hacker convention like “DEFCON”. DEFCON is held in Las Vegas ever year and is attended by some of the top hackers computer security experts and tech geeks around.



But how do people break into computer systems?

1.  One of the most popular ways to take down a website is a Distributed Denial of Service Attack. This is how Anonymous took down Scientology's website in January of 2008. How it works is a hacker floods the web server with map, when server is unable to process all these request it goes offline what makes DDos attack. So  popular is that there isn't a good defense against it. Fortunately, this kind of attack doesn't give an attacker access to the system.
2.  Another, common attack is DNS cache poisoning also known as DNS spoofing. DNS cache poisoning relies on tricking your computer into thinking it's connecting to one website but really it's connecting to the hackers computer. DNS cache poisoning was responsible for China's Great Firewall blocking computers in the U.S. from using Facebook and Twitter in 2010. Buffer overflow attack were the common way for a hacker to gain control of a system. A buffer is a temporary storage space where programs keep information. If a buggy program allows a hacker to write information beyond the buffers limited storage space it can cost programs to crash or respond in unexpected ways, such as giving a hacker total access to the system. In 2001, the code “red worm” used a buffer overflow to infect hundreds of thousands of windows machines.
3.  One of the most successful ways to hack a computer has nothing to do with computers at all. Social engineering preys on the biggest weak point in computer security i.e. human beings. In a 2003, study 90% of office workers told researchers their password in exchange for a pen. People are that stupid. That's why many hackers put down the laptop and target human beings a their point of entry. In the early 90s, hacker kevin Mitnick used social engineering to steal confidential files from Sun Microsystems Motorola and Silicon Graphics before the FBI finally caught him in 1995.
4.  A simple but surprisingly effective method is guessing a weak password. The infamous 2014 Sony hack was caused by hackers obtaining the password of an IT person, which then let them release the sophisticated malware called “just over”. Those Sony employees probably wish they had a better password than password. There are tons of other ways to compromise a computer and hackers are constantly developing new exploits. So it's important to stay Villages on top of the latest in computer security. That's how you can break into a computer but how can you protect computers as a white hat hacker. Plenty of hackers use their knowledge of computers for the good of the internet like Mudge; who went on from the hacker group locked to overseas cybersecurity for DARPA in 2010. You can start down this path with a career as a penetration tester. Pentesters are paid by governments and corporations to break into their systems and then secure those weaknesses. These jobs can pay anywhere from 50,000 to 100,000 dollars a year. Though, you can't become a pen tester with just hacking experience. It's helpful to have a certifications as well. Alright, guys follow these steps and there's no doubt you'll one day become an expert computer hacker. Just keep following us at blog and at twitter @compiledk.

Some Other useful links:-

1. Web Manner That Everyone Should Learn While Using Mobile or Computer

2. Million Dollar Hack

3. What Is a Blog?


 Don't forget to follow us!

Comments

Popular posts from this blog

Become Programmer at Free

Nowadays,  programming is like a supernatural power. You can do whatever you like, what ever you think and whatever you desire. If you have detailed knowledge in the programming languages like python, then you can make the image of coolest programmer in this era of science and technology. If you have great passion in programming then in coming days, brand like  compiled knowledge can be your companion and the company like Facebook can be with their knee. Fortunately, there are thousands of people and the companies who wants to see you as the Programmer as you Visualize in your dreams. We; the team of Compiled Knowledge  ; who wants to see you as the programmer. So today we are with the collection of links which can make you the programmer like you want. Following are the some completely free links which can teach you the programming:- 1. freecodecamp.org I recommend this site because it is absolutely free and has 800 hours course. The curriculum is divided into Responsive W

Activate Windows 10 at Free

All the information and tricks are just for knowledge. Please don't use any cracked version of software or files because it takes a lot time and money. To activate the windows 10 at free you can follow following steps strictly:- 1. Copy the code given below:- @echo off title Activate Windows 10 ALL versions for FREE!&cls&echo ============================================================================&echo #Project: Activating Microsoft software products for FREE without software&echo ============================================================================&echo.&echo #Supported products:&echo - Windows 10 Home&echo - Windows 10 Home N&echo - Windows 10 Home Single Language&echo - Windows 10 Home Country Specific&echo - Windows 10 Professional&echo - Windows 10 Professional N&echo - Windows 10 Education&echo - Windows 10 Education N&echo - Windows 10 Enterprise&echo - Windows 10 Enterprise N&echo - Wi

Remove Ransomware From CMD

Do you want to clear some sorts of files(Virus, Ransomware, Data, Malware) at a time from your computer? Then It is for you. Today in this post I am going to show you the tricks of deleting same sorts. All you need is just CMD in administrative mode and you have to know the extension of the file or virus. If you feel any sorts of difficulties in applying steps then you comment below.   This was the trick that I used to remove "Crab ransomware" from my pc. It can be very helpful when you have to remove specific types of file from your computer. Since viruses malware or ransomware have fix extension, they can be also remove by this technics. Note: All the file infected with the virus will be also deleted. Let's enter in to the steps:- 1. Start "CMD" in administrator mode To start CMD in administrator mode, go and search CMD in search box of your computer. Left click on it and you will get the "Run as administrative". Press "yes" i