Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
What is Hacking? Are You a Hacker? > NetSparsh - Viral Content you Love & Share

What is Hacking? Are You a Hacker?

WHAT IS HACKING?

Hacking, sometimes known as "computer crime" has only recently been taken very seriously. The activities undertaken by the real hackers have been criminalized and they are now being legally persecuted on a scale disproportional to the actual threat they pose.

For those who don't know better, a hacker, by wrong-definition, can be anything from a computer-user to someone who destroys everything they can get their evil terminals into.

Real hackers want their motivations and ethics to be viewed as legitimate, or at least understood, instead of being simply written off as malicious, vandalising, thieving, terrorist out to take over the computers of the world for personal gain, or devious teenagers who have nothing better to do than crash every available computer.

It is thanks to the mass media and people who have absolutely no understanding of computers, who use terms like "information superhighways", "IT", and "computer crime" to try and make themselves sound important that it is assumed all "hackers" (the good and the bad) fit the above descriptions. There are people who do stuff like the above but they ARE NOT real hackers, They buy the magazine "2600" and they ask questions. They do not want knowledge. They do not want to learn how things work, they do not want to explore. All They want to know is the answer to their damn questions, they are not real hackers.

They are the real criminals and are the threat to every appliance connected to the Internet, they destroy, steal and mess up the flow of information then let the real hackers take the blame!

Hacking IS NOT about the mindless idiotic destruction of files and/or crashing systems intentionally.

Real hackers have an ethical code of practice, which includes things such as:

☞ Leave a system in the state it was found.
☞ Do not intentionally destroy or modify anyone else's data.
☞ Do not cause any legitimate user problems with computer resources.
☞ Do not access emergency services computers.

Real hackers are enraged when so called "hackers" cause damage to or compromise resources. Hacking is about looking for answers and knowledge, it is about learning. That's why hackers hack, to search around inside a place they have never been, to explore all the little nooks and crannies of a world so unlike the boring cess-pool they live in.

Their aim is to rise above the rest, and then to pull everyone else up to the same new level. Real hackers justify accessing computer systems by claiming that it is not unfair to break into otherwise idle computer resources and to download files with the intent to learn.

The already terrible reputation carried by the real hackers is cased by the ignorant and stupid people who like the label of "hacker" that screw things up, mainly though the destruction of stored information and or all passable activities of computer related fraud.

For those who don't know better it is thanks to the mass Media who have blown it way out of proportion. A hacker, by wrong-definition, can be anything from a computer-user to someone who destroys everything they can get their evil terminals into.

And the people who have absolutely no understanding of computers, who use terms like "information superhighways", IT, and computer crime to try and make themselves sound important that it is assumed all hackers are malicious, vandalising, thieving, terrorist out to take over the computers of the world for personal gain. There are people who do stuff like the above but they ARE NOT real hackers, They buy the magazine "2600" and they ask questions.

They do not want knowledge. They do not want to learn how things work, they do not want to explore. All They want to know is the answer to their damn questions, they are not real hackers.

They are the real criminals and are the threat to every appliance connected to the Internet, they destroy, steal and mess up the flow of information and let the real hackers take the blame!

Hacking IS NOT about the mindless idiotic destruction of files and / or crashing systems intentionally.

Hacking is about looking, searching for answers and knowledge, it is about learning, satisfying their curiosity. That's why they get into the system, to search around inside a place they've never been, to explore all the little nooks and crannies of a world so unlike the boring cess-pool they live in. They seek to rise above the rest, and then to pull everyone else up to the same new level.

Why destroy that which they love? To take away someone else's chance to succeed in getting in as he did? To fuel an already terrible reputation and increase their chances of getting caught and thus have their lives and careers effectively ruined? IT IS ILLOGICAL!

The real problems are caused by the ignorant and stupid people who like the label of "hacker" that screw thing up by destroying everything they can get their evil terminals into.

It is thanks to the mass Media and people who have absolutely no understanding of computers, who use terms like "information superhighways", IT, and computer crime to try and make themselves sound important that it is assumed all hackers are malicious, vandalising, thieving, terrorist out to take over the computers of the world for personal gain.

ARE YOU A HACKER?

Too identify users who like the label of "hacker". Even as I type this they are dammaging the already terrible reputation carried by the real hackers. This file is meant to help these people who are not helping the movement by pointing out the errors of their ways! What is that you say, "but I am a "badass" hacker". Just ask your self whether any of the following descriptions sound like you, if so then you are part of the problem!.

You have been surfing the net, and you laugh at those media reports of the information superhighways. You have a red box. You do not have to pay for phone calls. You have crackerjack, and you have run it on the password file at a Unix on which you have an account. Your computer knowledge has impressed everyone at your school, you are the one the teachers ask for help. Am I getting warmer?

Or may be you are one of the free loaders. There are thousands of you out there. You buy 2600 and you ask questions. You read phrack and you ask questions. You join #hack and you ask questions. What is that you say, "what is wrong with that? After all, to be a hacker is to question things, is it not?" Nevertheless, you do not want knowledge. You want answers. You do not want to learn how things work. You only want answers. You do not want to explore. All you want to know is the answer to your damn questions. Dose this sound like you?

Or if not the above you are what I refer to as a non event. You read 5% of 5 or 10 of the hacking FAQs and or tutorial files. You no not fully understand the essentials of hacking. Or the reasons for cacking. You have never heard of social engineering or if you have you think it is not important. You think the world of computers and security opens up to you through a keyboard and your redbox. In short you know nothing. You are brain dead, but you see your self as a master mind criminal. You brag about you hacking factices. You make it up as you go along. You lie over any and all the BBS you can.

Dose any of this sound like you? If so you are not a hacker. You are a little child. It is thanks to you morons that get bested whilst destroying everything you can get your evil terminals into that the established order (governments, companions, the mass Media etcetera) assume all hackers are like you, malicious, vandalising, thieving, terrorist out to take over the computers of the world for personal gain or are devious teenagers who have nothing better to do than crash every available computer. Nothing could be feather from the truth!

You enrage the real hackers when you cause damage or compromise resources. You do not understand the damage you inflect When you bring down a system you take away from everyone the chance to succeed in getting in, you take away that which all real hackers have come to love more that live itself!.

Hacking is about looking for knowledge. It is about learning. That's why hackers hack, to search around inside a place they have never been. To explore all the little nooks and crannies of a world so unlike the boring cess-pool they live in. To increase the flow of information and knowledge, so that Everyone can learn and benefit.

WHAT IS A HACKER?

More times that I can remember, someone has asked me the question "Just what exactly is a hacker?"

For those who don't know better. A hacker can be anything from someone who makes furniture with an axe; (by wrong-definition) A computer-user; An expert at a particular programme; An expert or enthusiast of any kind; but the most wide spread application of the term is to describe someone who destroys everything into which he/she can get their evil terminals. This is true to such an extent that if I were to say to just about anyone (that has not being leaving on the moon since 1982) "I am a hacker", it would immediately be assumed that I am a criminal, a malicious, vandalising, a thieving terrorist, a little shit out to take over the computers of the world for personal gain, or some thing along those lines. For this we have the wanabes and the mass Maida to blame!

What I consider a hacker to be is a person who is self motivated and besotted with exploring the details of programmable systems, a person who loves the intellectual challenge of creatively overcoming or circumventing limitations, and uses that knowledge to continue the fight for freedom of knowledge and information, a person who wants to know everything and most importantly a *real* hacker lives by the "hacker ethic" (the belief that information-sharing is a powerful positive and good thing), and whom follows an ethical code of practice (that typically includes things such as, Leave a system in the state it was found; Do not intentionally destroy or modify anyone else's data; Do not cause any legitimate user problems with computer resources; Do not access emergency services computers; etcetera)

Their motivations for hacking (the activities of a hacker) are generally to learn more about any think that can help them understand more about the way the would works, fore example how computer systems work by making them do things they were never intended to do and/or to challenge security measures.

This is my own definition of what the "normative" boundary markers of *real* hackers are. All real hackers tend to meat the majority of these criteria. However, this is by no means universal, like plants, there are many breads of hacker, most of which are out to achieve that same ends, the ones that do not meat any, or the ones the do all the above, but are intent on destruction are *NOT* hackers, most likely they are the wanabes. See my FAQ "ARE YOU A HACKER?" for more about them.

Now, who are the *real* hackers, whatever their motives they tend to share an, unbridled intimacy and total affinity for their life stilly, they are the ones who are so deeply consumed by learning computer science, cacking, programming, social engineering, boxing, scanning, etcetera, that it means more to them than the feeling that they experienced at the flash point of their first love, for some it is the ultimate buzz like heroin, for many to hack, to get access to a system and escape into the binary world, is to engage in sexual intercourse.

Again this is by no means universal, there are those that merely enjoy it, and the ones that find it a pain. The people that do not in *ANY* *WAY* reflect the above may be real hackers, but finding an elite hacker whom dose not is rare.

If you are a real hacker, like it or not, you are a revolutionary and know it or not every thing you do is in some way connected to your search for the truth, because although to be a hacker is to question things hacking its not about asking questions. It is simply about finding the truth because they must be able to choose for themselves, what ever the consequences, it is their right to have some say it their fate.

No one can be told what the truth is, as it is different for everyone, it is an idea, it is simply sufficient information and experience to allow a person to tell for min/her self. It is not an answer that hackers seek but rather the truth is learnt from the path that each hacker takes to gain experience, which is simply the search for knowledge.

I genuinely do not know what the purpose of this file is, maybe someone somewhere will read it, and know more about the truth concerning hackers. Not the lies of the ignorant!

I am the website administrator of the The Wandle Industrial Museum (http://www.wandle.org). Established in 1983 by local people determined to ensure that the history of the valley was no longer neglected but enhanced awareness its heritage for the use and benefits of the community.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Fox News

GOP leaders urge Homeland Security to adopt 'safe third country agreement' with Mexico over caravan
Fox News
Republican Sens. Chuck Grassley and Mike Lee are urging Department of Homeland Security head Kirstjen Nielsen to execute a "safe third country agreement" with the Mexican government, which would require members of the growing migrant caravan to ...
'Unacceptable Security Risk': Pompeo Says Central American Caravan 'Will Not Be Successful' in Breaching US BorderFox News Insider

all 3,517 news articles »

ABC News

Yahoo to pay $50M, other costs for massive security breach
ABC News
Yahoo has agreed to pay $50 million in damages and provide two years of free credit-monitoring services to 200 million people whose email addresses and other personal information were stolen as part of the biggest security breach in history. The ...
Yahoo must pay $50M in damages for security breachCNET

all 41 news articles »

CNN

Security guard shoots angry man during attack on Washington Fox affiliate, police say
CNN
Odemns was angry when he entered the lobby of the building housing the WTTG news offices, where the security guard shot him, the source told CNN. The suspect was not armed, Cmdr. Melvin Gresham of the Metropolitan Police Department said. The guard ...
Security guard shoots intruder at Fox station in Washington, DCNBCNews.com
Security Guard Shot Man Who Broke into Fox 5 Station in Washington DCNBC4 Washington
Intruder Who Broke Into Fox TV Station In DC Shot By Security GuardDeadline
Washington Post -WTOP -FOX 5 DC -Twitter
all 408 news articles »

Forbes

Elon Musk Mocks Bitcoin Security And Scams With Tongue-In-Cheek Tweet
Forbes
Bitcoin is often mocked by the wider cryptocurrency sector for its older technology compared to some of its newer peers and now Elon Musk, a serial entrepreneur who's no stranger to controversy, has lampooned the bitcoin scams that plague Twitter and ...

and more »

Idaho Statesman

In an unusual step, Idaho GOP candidate brought a full security team to a debate
Idaho Statesman
It's also unknown if she regularly retains a large security presence. But her apparent heightened concern stands out in a state where few candidates pursue such protection. McGeachin is a businesswoman and former state lawmaker. Her debate with ...


National Security Adviser Bolton Says Arms Treaty With Russia Has Outlived Its Purpose
NPR
NPR's Ailsa Chang speaks with Melissa Hanham, weapons of mass destruction expert, about the timing and global impact of the U.S. pulling out of the nuclear non-proliferation treaty with Russia. Facebook; Twitter; Flipboard; Email ...


AZCentral.com

Armed private security will soon patrol some Tempe parks as 'people are fed up'
AZCentral.com
Armed security guards will soon patrol some Tempe parks. The Tempe City Council on Monday unanimously approved spending $250,000 to hire G4S, a global security services company. The idea is to ease residents' concerns about safety and trash in ...


Baltimore Sun

Johns Hopkins seeks community input on renewed effort to increase security, create possible police force
Baltimore Sun
The Johns Hopkins University is renewing efforts to bolster security measures β€” including the possible addition of a police force β€” with a series of forums and community conversations through the end of the year. The push comes months after the ...

and more »

euronews

National security adviser John Bolton rebuffs Russian appeals to remain in key nuclear-arms pact
Washington Post
MOSCOW β€” National security adviser John Bolton held firm Tuesday to President Trump's announcement that the United States would withdraw from a landmark arms control treaty in place since the Soviet era. Bolton said the United States would present β€œin ...
US National Security Advisor Bolton reacts to Putin meetingeuronews
Putin to meet with US national security advisor on October 23TASS
US national security adviser says Russian meddling has created 'mistrust'CBC.ca
Yahoo News
all 2,291 news articles »

Statesman Journal

Salem security guard gets life in prison for murdering 25-year-old at Denny's
Statesman Journal
A former security guard was sentenced to life in prison Monday for shooting and killing a man while on duty outside a Salem Denny's restaurant in 2017. After less than 10 minutes of deliberation, a Marion County jury unanimously convicted Gregory ...

and more »
Google News

Personal Firewalls - Secure Your Computer

There has not been a time in the history of... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming... Read More

Are They Watching You Online?

When surfing the Internet you probably take your anonymity for... Read More

Personal Firewalls for Home Users

What is a Firewall?The term "firewall" illustrates a system that... Read More

Is Adware - Spyware Putting Your Privacy at Risk

Do you sometimes notice your computer running slower. Is your... Read More

Spyware is Not Like a Nosy Neighbor

Remember the television show about the nosy neighbor Mrs. Kravitz... Read More

Spyware Removal

Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More

Phishing

Recently I have received email from my bank/credit Card Company,... Read More

Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER

From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More

How To Avoid Hackers From Destroying Your Site?

Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More

Phishing and Pharming: Dangerous Scams

As soon as almost all computer users already got used... Read More

Viruses and Worms, Protection from Disaster

Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More

Is My PC Vulnerable on the Internet?

No longer are viruses the only threat on the internet.... Read More

Internet Identity Theft - How You Can Shield Yourself

With the advent of the World Wide Web, a whole... Read More

Temporary Internet Files - the Good, the Bad, and the Ugly

A little bit of time invested into learning about internet... Read More

Make Money Online - Defend Against The Latest Scam

First, let's do a little recap'. As I stated in... Read More

Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not... Read More

Is Shopping Online For Your Horse Gifts Safe?

Shopping for horse gifts or other gift items on the... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

SCAMS ? Be Aware ? And Report When Necessary

The Internet is a vast International Network of people and... Read More

Network Security 101

As more people are logging onto the Internet everyday, Network... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

Online Cell Phone Scams and Spam

They're out there. Individuals trying to make a quick buck... Read More