HACKER Origins title

HACKER--The term hacker was born approximately in 1959 from MIT (Massacusetts Institute of Technology), a university in America composed of intelligent people but tend not to trust in God (atheist). That's when all started, from a new room, "EAM room" in Building 26 at MIT, a place that is the ancestor of the "new world" which we now know, the ancestors of a machine which we now refer to as "computer", the machine that can lead us toward kelebihbaikan with freedom of information, the world of the true hacker.The Hacker always cooperate voluntarily resolve problems and build things. They always share information, provide answers and are keen to do my best to be respected in his neighborhood. They never stop learning to be an expert and very anti to do something repetitive and boring. They are guided by the wise words: "To follow the road - look at the expert - follow the experts - to walk with the experts - identify the experts - be the expert."
Meanwhile, cracker busy to satisfy themselves with cracking activity. ranging from breaking into your computer, spread viruses (without any purpose - there are few true hackers who write viruses, but with clear goals), to outsmart the phone (Phreaking). The Hacker called them as lazy people who are not responsible. So, very unfair if we still assume that hackers are evil and frightening as it is very clear that the hacker is a cracker to be built while unpacking.
Want to become a Hacker? There are no hard words for those who want to learn. To be a hacker you have to master several programming languages ​​and of course the attitudes that can make you acceptable in their environment. Usually candidates Hackers start with learning the language [Python] because the language is classified as a programming language which is easier. Discussion of this language you can see in www.python.org. After that you also have to master [java] a little more difficult but it produces faster code than Python, [C], [C + +] which became the core of UNIX, and [Perl] (www.perl.com) and [LISP ] the advanced level.
After mastering all the basic capabilities above, candidates are advised to open Hacker sati open-source version of UNIX or LINUX studying, reading the code, modify and run it again. If you're having trouble, it is advisable to communicate with Linux users club (www.linpeople.org).
Interesting side of a Hacker is where they go hand in hand in solving a problem and build something. But unfortunately, the lives of those who spend 90% of their time to activities Hacking is not a good thing. If it really wants to be a hacker, be a good hacker.


Post a Comment


The Forex Quotes are Powered by Forexpros - The Leading Financial Portal.


Twitter Delicious Facebook Digg Stumbleupon Favorites More