Copy Link
Add to Bookmark
Report

Fucked Up College Kids File 206

eZine's profile picture
Published in 
Fucked Up College Kids
 · 5 years ago

  

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
= F.U.C.K. - Fucked Up College Kids - Born Jan. 24th, 1993 - F.U.C.K. =
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

How To Be An Evil Computer Hacker
---------------------------------

People are always asking me "Voyager, How do *I* become an evil computer
hacker like you?" I almost always give them the straight truth, and
they very seldom believe me.

The secret to being a successful Evil Computer Hacker (tm-TNo(1991)) is
understanding systems. To expolit a system, you must first understand
how that system works, both conceptually and practically. Over 2500 years
ago, Sun Tzu wrote "If you know the enemy and you know yourself, you
need not fear the result of a hundred battles." Make yourself knowledgable
about systems, and assess your knowledge fairly. Do this and you will
not be defeated.

Here are a few tips on becoming an Evil Computer Hacker:

Read at least one book a week.

Dilbert books don't count. This week I've read _An AIX
Companion_, _AIX RS/6000 System and Administration Guide_ and
_AFS Users Guide_. I'm working on _Troubleshooting
Internetworks_ today. Select books that are just a bit above
your current skill level. Books below your current skill level
won't help you, nor will books too far above your current skill
level. Select books that interest you. If a topic does not
arouse your interest, you will not retain the information you
are studying. With every new fact you read, try to fit it into
place with the facts you currently posess. Look at the new fact
and try to imagine a situation where you could put it to use.
Personalize the knowledge and it will stay around for a long
time. As always, take good notes. Review your notes when you
finish the book. Review your notes one day later and also one
week later.

Keep up with periodicals in your field.

Books are your best source for comprehensive information, but
the lead time for a book to go to press means that books are out
of date before they hit the shelves. Periodicals are required
to round out your knowledge base. Public libraries subscribe to
many periodicals. Many industry periodicals are available free
to qualified subscribers. Remember, Evil Computer Hackers are
_always_ qualified subscribers. Do not ignore online
periodicals like Phrack, CoTNo, The Infinity Concept and FEH.

Wander the Web.

When you come across a new concept, term, phrase, vendor,
product or technology -- head to the World Wide Web. Visit one
or more of the WWW search engines (my personal favorite is
http://www.yahoo.com) and search for references. Each time you
find a link to something that sounds interesting, follow that
link. An excellent way to expand our horizons is to find
information that we were not _originally_ looking for.

Practice, Practice, Practice.

Reading Is Fundamental, but reading isn't everything. Practice
is required to cement your recently obtained knowledge into
place. Practice everything that you can practice. Build
cables. Build circuits. Code software. Execute commands.
Explore systems. Without practice you are only a voyeur, not a
voyager.

Find a job in the field.

The best way to practice is to get paid for it. This method
also has the advantage of helping you to avoid time in the
Penalty Box. Although prison can be an interesting and learning
experience, I really cannot reccommend it as a good step toward
becoming an Evil Computer Hacker. In addition, you come into
contact with systems you simply can't get into by traditional
hacker methods. I may be able to remotely access the NSA's
Cray's, but I certaintly cannot remotely access their biometric
security devices. As an employee (or contractor), I will be
able to access these systems every day.

Do a good job at work.

Become the wizard at the office. Learn _everything_ about
_every_ system in the building, even that horrid PRIME 9950 that
no one wants to learn to use. Be the person people come to with
questions. Every time someone comes to you with a question,
they bring useful information with them. Repeat after me "Sure,
I'll take a look at the problem for you. I'll need an account on
the system though."

Switch jobs regularly, but not too regularly.

Switching jobs regularly is required to keep your skills up to
date. Not that long ago, three years was considered the
shortest acceptable time to hold a position. Today, it's two
years and falling.

Teach others.

When we teach a subject, we organize and clarify that subject in
our mind. We find (and fill) the gaps in our understanding of
the subject matter. Our conceptualization of the system
improves, and our understanding of the system deepens.


There are no secrets to becoming an Evil Computer Hacker. There are no
short cuts. Sure, there are a thousand lamers with 31337 sUp3R s3Kr3t
r00t X-pL01tS, but they are still lamers. They pretend to be Evil
Computer Hackers, but when their particular toy exploit is patched, they
are back to begging for scripts on #hack.

One more note: Avoid IRC, it's a pit from which few escape.

-Voyager

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
= Questions, Comments, Bitches, Ideas, Rants, Death Threats, etc etc... =
= Internet : jericho@dimensional.com (Mail is welcomed) =
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
= gote land +27.31.441115 =
= Arrested Development +31.77.3547477 =
= Global Chaos +61.2.681.2837 =
= Chemical Persuasion 203.324.0894 Undrgrnd Indust/Inc. 207.490.2158 =
= Damnation 212.861.0580 that stupid place 215.985.0462 =
= Hacker's Haven 303.343.4053 PheedbacK 303.782.0893 =
= E.L.F. (NUP) 314.272.3426 Misery 318.625.4532 =
= Dungeon Sys. Inc. 410.263.2258 Psykodelik Images 407.834.4576 =
= Paradise Lost 414.476.3181 Black SunShine 513.891.3465 =
= underworld_1995.com 514.683.1894 Digital Fallout 516.378.6640 =
= PSYCHOSiS 613.836.7211 Bad Trip 615.870.8805 =
= Plan 9 716.881.3663 suicidal chaos 718.592.1083 =
= Damaged 801.944.7353 The Death Star Bar 805.872.3151 =
= Purple Hell 806.791.0747 Atrocity Exhibition 905.796.3385 =
= Phoenix Modernz 908.830.8265 The Keg 914.234.9674 =
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
= Files through Anon FTP FTP.DIMENSIONAL.COM/users/jericho/FUCK =
= FTP.PRISM.NET/pub/users/mercuri/zines/fuck =
= FTP.WINTERNET.COM/users/craigb/fuck =
= FTP.GIGA.OR.AT/pub/hackers/zines/FUCK =
= ETEXT.ARCHIVE.UMICH.EDU - /pub/Zines/FUCK =
= FTP.DIMENSIONAL.COM - /users/rage/zines/fuck =
= Files through WWW: http://www.dimensional.com/~jericho =
= http://command.com.inter.net (DisordeR's User Page) =
= http://www.prism.net/zineworld/fuck/ =
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT