Urban Denon

Chapter 72 Hackers

The word "hacker" is translated from English hacker, which refers to computer enthusiasts who specialize in researching and discovering computer and network vulnerabilities. They grow up with the development of computers and networks. Hackers have a fanatical interest in computers and persistent Pursuit, they continue to study computer and network knowledge, discover the loopholes in computers and networks, like to challenge difficult network systems and find loopholes, and then propose solutions and repair loopholes to administrators.

Hackers do not interfere in politics and are not subject to political use. Their appearance has promoted the development and improvement of computers and networks.What hackers do is not malicious damage, they are a group of heroes on the Internet, pursuing sharing, free, and advocating freedom and equality.The existence of hackers is due to the imperfection of computer technology. In a certain sense, the security of computers needs more hackers to maintain.To borrow a sentence from myhk, "The meaning of the existence of hackers is to make the network more and more secure and perfect".

In today's era of rapid development of electronic technology, it seems that hackers can be heard everywhere, and hackers seem to exist everywhere.The term hacker originally refers to computer experts who are passionate about computer technology and have a high level of expertise, especially programmers.But today, the term "hacker" has been used for the endorsement of those who use computers to destroy or invade others. The appearance of "hacker" has tarnished the word "hacker", causing people to confuse hacker with hacker, and hacker is considered to be a person who causes damage on the Internet.

For real hackers, almost everyone relies on their own programs and software for remote operations. Hackers are arrogant. Every hacker seems to disdain other people's works and thinks that he is the best.As this group of special, proud, and hidden people, what they worship are those who stand at the pinnacle of this field. Only those who have such a level are worthy of their admiration and admiration.Therefore, there are often discussions between hackers. When one party is complacent about successfully invading the other party, the other party will throw out a sentence, if you have the ability to defeat Kevin, I will convince you.

As top hackers, they all have their own code of conduct. They are evil and behave eclecticly, but they are also a group of people who are responsible for human society. They will not use their extremely advanced technology to carry out social sabotage activities. If those top hackers spread their destructive viruses to the network, it will cause immeasurable losses to today's society with high-intensity electronic control.

Just a few years ago, a hacker accidentally wrote a virus by himself. This virus is called cih virus. This virus can not only destroy the entire infected computer system, but the most terrifying thing is to directly destroy the hard disk of the infected computer. The information stored in the computer is completely destroyed.At that time, this virus caused incalculable losses to almost 60.00% of the users and corporate governments in the world. Later, the virus creator made a deep confession on the Internet for the harm he caused to the world, saying that he would never touch the Internet again in the future. As a punishment for himself, the author of this virus is still a mystery.

A hacker usually learns with a certain purpose before learning hacking techniques. During the continuous learning process, he usually decides what kind of hacker he will become in the future based on several factors such as his personality, environment, and the purpose of learning hacking techniques. Types of hacks:

A black hat refers to a professional hacker who uses hacking techniques to attack the system, thereby obtaining improper benefits to maintain his livelihood.

b Gray hat hackers are usually able to mix black and white. They can not only serve as the company's security consultants, but also do some shady deeds.

c White hats These hackers are a bit like Liangshan heroes who have been recruited. Once they are proficient in hacker technology, they start to engage in technical research on network security, so as to contribute to the cause of network security.

d Red hats are usually called "red hackers", and they often stand up to fight back against the enemy when the interests of the country and the people are threatened. Unity and cooperation and training newbies are their biggest characteristics, so they are the most popular at the beginning. The welcome of scholars has a far-reaching impact on beginners.

e no hat refers to those who have learned hacking techniques, but stopped due to other reasons. There are not a few of these people, and these people usually shout for the rectification of the hacker's name.

Hacking Rules

1 Do not maliciously damage any system, this will only bring you trouble.Maliciously damaging someone else's software will result in legal liability, and if you're just using your computer, it's only illegal! !Note: Do not damage other people's software or data! !

2 Do not modify any system files. If you modify it to enter the system, please change it back to the original state after achieving the purpose.

3 Don't easily tell your untrusted friends the platform you want to hack.

4 Don't talk about your hack on bbs.

5. Do not use your real name when posting articles.

6. When invading, don't leave your computer at will.

7 Do not invade or destroy the host computer of the government agency.

8. Don't talk about anything about your hack on the phone.

9. Keep your notes in a safe place.

10 If you want to be a hacker, you must do real hacking, read all the documents about system security or system vulnerabilities (learn English quickly)!

11 Accounts that have been hacked into the computer must not be cleared or altered.

12 Do not modify system files, except for modifications made to hide your own intrusion, but the security of the original system must still be maintained, and the door must not be opened wide because of gaining control of the system! !

13 Do not share your cracked account with your friends.

Whether it is hackers or crackers, whether it is hackers or red hackers, as a subgroup, they always have common principles, creeds, and spiritual pillars. Let’s call it hacker ethics. The American scholar Levi summed it up as follows:

1 There is more than one way to the computer, and entering (accessing) the computer should be unlimited and absolute, always obeying the commands of the fingers;

2 All information should be free;

3 doubt authority and promote decentralization;

4. Hackers should be judged by their high technical level, not by any formal organization or their inappropriate standards;

5 Anyone can create art and beauty on a computer;

6 Computers can make life better.

The above basic information about hackers is what Xiao Yihan learned on the Internet. These guidelines and rules will play a vital role in Xiao Yihan's future in maintaining his integrity in the online world.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like