If you wan't to be a hacker then Learning things on your own, Asking questions to
help you, and a curious mind "is" a start. If you ask the question
"How do you hack?" chances are you will not get the answer.
You can't learn how to hack in one day and yet some people go out
and acclaim themselves hackers and chances are it's probaly the
first time they have ever touched a computer. Hacking is the knowledge
of many things put together. It takes time and pateince and it's
something that you would be better off just trying to learn on your own.
That way you can learn at your own pace and you make sure you
understand one thing before moving on to learning another. Well
since you came in search of hacking knowledge I am going to give it to you.
This text is not going to make you a hacker because only you can do that.
1b. Explanation
Hacking was once just someone who sat down hours on end programing If
you were making a program you were considerd to be hacking at a program
if you found a bug in a program or a way to make it shorter that was also
considerd hacking. Now there are different classes of hacking.
"Hacking is a willingness to make technology accessible and open."
Meaning you believed that all information should be kept open (free) to the public
and not hidden in secret. Hacking is wanting to learn something then taking it to
the fullest extent by wanting to learn more about that thing, all the cracks,
codes ,and operations. When a hacker learns a programming language he learns how
to use the language fluently he/she just doesnt learn some of the language he/she
goes beyond it. Hacking is not email bombs, damaging systems
and, virii. In a true sense we are "Knowledage Seekers" but labled by the media
hackers, and phreaks. So we proudly hold the name "Hackers", and continue doing what we do best....
To hack a system you have to know the system you are working with, and others of its
kind.
1c. Hackers Ethics
1. Do not intentionally damage any system.
2. Do not alter any system files other than the ones needed to ensure your escape from detection and your future access (Trojan Horses, Altering Logs, and the like are all necessary to your survival for as long as possible.)
3. Do not leave your (or anyone else's) real name, real handle, or real phone number
on any system that you access illegally. They "can" and will track you down from your handle!
4. Be careful who you share information with. Feds are getting trickier. Generally, if you don't know their voice phone number, name, and occupation or haven't spoken with them voice on non-info trading conversations, be wary.
5. Do not leave your real phone number to anyone you don't know. This includes logging on boards, no matter how k-rad they seem. If you don't know the sysop, leave a note telling some trustworthy people that will validate you.
6. Do not hack government computers. Yes, there are government systems that are safe to hack, but they are few and far between. And the government has infinitely more time and resources to track you down than a company who has to make a profit and
justify expenses.
7. Don't use codes . . .unless there is "NO" way around it (you don't have a local telenet or tymnet outdial and can't connect to anything 800...) If you use codes
long enough, you will get caught. Period.
Hacker Ethic
============
In the book _HACKERS; Heros of the Computer Revolution_, by Steven Levy the "Hacker Ethic" was first put into concrete words. This ethic follows;
* Access to computers - and anything which might teach you something about the way the world works - should be unlimited and total. Always yield to the Hands-On-Imperative!
* All information should be free.
* Mistrust authority- promote de-centralization.
* Hackers should be judged by their Hacking, not bogus criteria such as degrees, age, race, or position.
* You can create art and beauty on a computer.
* Computers can change your life for the better.
1e. Procedure-
Things you should start off with>
A Computer
Port Scanner
War Dailer
Internet Access
Telnet
A Unix/Linux based OS
books on different Os's
Any type of Documentation on Networking
A computer- The most important tool a hacker can have.
Port Scanner - A Port Scanner does exactly what its name says it does. It scans various ports on a client and compiles a list of open ports.
War Dailer- Used to dail numbers in a selected range.
Internet Access- The Inter"net" is a large network which connects a user to a huge number of serveral other networks and computers.
Telnet- is a program that allows a user to connect to a remote host.
The term Hacker has been terribly distorted and misused by the American media for the past ten years. Now the international press has also taken up the use of the term to refer to *common criminals* who happen to use computers. These people are NOT Hackers in ANY sense of the word, and it's tragic that the average person in America has been exposed only to the corrupted meaning of the proud Hacker moniker.
HACKER, n., a term of endearment for someone with talent, knowledge, intelligence, and ingenuity, esp. concerning computer operations, networks, security concerns, etc.
The following definition was found in a text file being distributed internationally through the INTERNET computer network;
HACKER, n. 1. A person who enjoys learning the details of programming systems and how to stretch their capabilities, as opposed to most users who prefer to learn only the minimum necessary. 2. One who programs enthusiastically, or who enjoys programming rather than just theorizing about programming. 3. A person capable of appreciating hack value (q.v.). 4. A person who is good at programming quickly. Not everything a hacker produces is a hack. 5. An expert at a particular program, or one who frequently does
work using it or on it; example: "A SAIL hacker". (Definitions 1 to 5 are correlated, and people who fit them congregate.) 6. An inquisitive meddler who tries to discover information by poking around. Hence "password hacker", "network hacker".
Note that NO definition defines a Hacker as a criminal. At their best, Hackers change the very fabric of an information-based society and advance the flow of technology. At their worst, Hackers can be mischievous pranksters or curious explorers. Hackers do NOT write harmful computer viruses. Sad, insecure, mediocre programmers do. Harmful viruses are completely against the Hacker Ethic.