skip to main | skip to sidebar

TechsVilla

HOUSE OF TECH FOR ZEALERS

  • TECH
  • GAME
  • BLOG
  • WINDOW
  • LINUX
  • APPLE
  • SECURE
  • MSN
  • TIPS
  • Friday, March 18, 2011


    HACKING

    Today the word hacking is a glory of a person. But don't think it is an easy job. Generally the word Hacking tends to have a negative effect on people. They believe that "HACKERS" are computer criminals or who cause harm to the system; But I don't blame them for holding such a negative opinion. As in this fascinating world, different types of people have different thoughts; so, you don't have to change their thoughts. Therefore, it is divided into three categories Black Hat Hacker, White Hat Hacker and Gray Hat Hacker (later we discuss about it).
    In reality, Hackers are good, pleasant and extremely intelligent people, they are expert in programming languages and networking wizard. They use their knowledge in a constructive manner helping organization, government forums etc.
    Traditionally, Hackers were computer geeks who knew everything about computers (software, hardware, networks). But over the years, reputation of hackers has been going down due to some bad guys.
    They are technically sound in software and networks developments. They have incredible ability to find out the way of doing the impossible. They find the Hole or Vulnerability to the system and report for any bugs to Administrator. They break free from restriction and discover new hidden features. You see, Hacking is about Knowledge. Hackers are those really intellectual people who have the Extra Bit of Information. 

    THEY KNOW OF THE THINGS THAT NORMAL PEOPLE WOULD ONLY DREAM OF.
    World is having lots of fascinating problems, Know your turn to solve it….


    STEPS OF LEARNING HACKING

    Ok, lets get down to it.General rule: -  Why do you want to learn hacking? First of all, clear your goal, then go in this profession, because it is not as easy as you think. This field is very interesting as well as very frustrating and lots of time consuming. So if you have lots of time and patience, then go ahead, keep it up.

    Step 1.
    Reading is a main step of hacking. You must have to read everything. If you don't like to read……then good luck, you should look into a different hobby.

    Step 2.
    Learn some languages good start to learn "Python", "C","Java" don't go to learn like visual basic otherwise you just bound with windows platform.

    Step 3.
    Spend lots of time in reading and learning, I know sometimes it is very frustrating but you have to be patient because fruits take time to ripe.

    Step 4.
    Make a note and write down what you don't understand. And after that go to some hacking forums and discuss your topics and try to understand these things. Go deep inside these topics which you are discussing on forums.

    Step 5.
    Now the main part of this profession is to perform lots of experiments, because it is self learning profession and you can't expect that someone'll teach you properly and you'll become a hacker…LoL.

    Step 6.
    When you perform an experiment, sometimes it works and sometimes not, don't be panic just Chill, take a long breath and concentrate on your work, find out WHY IT IS NOT WORKING? Go to your favorite search engine and find the stuff regarding to your topic. Second scenario, if it works, then don't be happy, just find WHY IT WORKS and HOW IT WORKS? Because hackers have to know everything.

    Step 7.
    Learn World Wide Web. It doesn't mean that you have to just drive a browser. Learn HTML, XHTML make your own home page.

    Step 8.
    Get any Open Source likeLINUX and learn to use and run it. This is open source operating system which is distributed in binary form. This is very powerful operating system and contributed by the whole world. Most interesting thing is that you have legal rights to modify this operating system according to your need. Join open source forums (LINUX FORUM) and keep reading on open source.

    Step 9.
    Learn writing good programs because hackers are expert in developing a program. You have to show dedication and adopt habit to write good programs. Write Open Source Program and distribute also help other open source software to find bugs and fix it.

    Step 10.
    Hacking is a free style computing so you have no restrictions to perform any experiment with your system, languages and hardware. So just tight you seat belt and enjoy your own ride.
    Posted by Rajan Chatterjee at 8:56 AM Email This BlogThis! Share to X Share to Facebook

    0 comments:

    Post a Comment

    Newer Post Older Post Home
    Subscribe to: Post Comments (Atom)
    Powered by Blogger.
    • Home
    • TWEAK PC
    • MICROSOFT NEWS
    • CYBER SECURITY
    • APPLE
    • LINUX
    • WINDOWS
    • WEB DESIGNING
    • GAMING
    • TECHVISION

    TechsVilla Corner

    Loading...

    Blog Archive

    • ▼  2011 (156)
      • ►  April (5)
      • ▼  March (151)
        • PC won't boot up? How to find out why it so....
        • Mac OS X 10.7 Lion: what you need to know
        • In Depth: Our preview of the best of the new phone...
        • Kinect For Xbox 360 Hacked To Work With Sony PlayS...
        • Next Generation Xbox Hardware To Surface By 2015?
        • Tethered Jailbreak for iOS 4.3.1 Now Available (Bu...
        • iOS 4.3.1 Jailbroken Already Using PwnageTool. Her...
        • 3DS Crashing To “Black Screen Of Death”?
        • Panasonic And Partners Announce New M-3DI Active-S...
        • MIT Scientist Claims To Have Created Practical “Ar...
        • SSDs have been on my Amazon Wishlist for over ...
        • Windows Phone 7 gets copy and paste update
        • Windows 8: everything you need to know
        • The Only Secure Password Is the One You Can’t Reme...
        • Honeywell’s Home Automation Touchscreen: Security ...
        • How to research your users
        • Bulletstorm review
        • Homefront Review
        • Forza Motorsport 4: Capitalising on GT5's missteps?
        • Crash Time 4: The Syndicate Review
        • iPad 2 review Apple's new tablet is the best of i...
        • Firefox 4 review It's the best Firefox yet. Is it...
        • How Mozilla turned the corner with Firefox 4
        • Fly or Die: The Nintendo 3DS, Rockmelt, And Mobile...
        • Robocast Sues Apple For Infringing Its ‘Automated ...
        • Drunk On Licensing Fees And Patents, Microsoft Has...
        • http://techcrunch.com/2011/03/22/googlers-buy-more...
        • This tip will explain How to open a file manager o...
        • Social Media Risks: The Basics
        • 9 Dirty Tricks: Social Engineers' Favorite Pick-Up...
        • 3 reasons trustworthy sites can no longer be trusted
        • Facebook is biggest mobile malware threat, says se...
        • Malware exploding, especially on mobile devices
        • Local ethical hackers nurtured in Kenya
        • Mobile security moving to the forefront? Extending...
        • Expert: RSA security breach compromised key federa...
        • Anonymous Exposed: Hacker Group Infiltrated, Chat ...
        • How your operating system works
        • Libre Graphics Meeting: Cutting Edge Creative Tool...
        • Red Hat Announces EMEA Partner Summit: Dublin Ireland
        • Create a social media icon
        • Nintendo 3DS released
        • SPLIT/SECOND
        • HALO REACH
        • Assassin’s Creed: Brotherhood
        • SPIDER-MAN: SHATTERED DIMENSIONS
        • Apple: Judging an app by its icon
        • Master the Windows 7 Action Center
        • Share files between Windows Vista and Windows 7
        • Download and install the best gadgets
        • CES 2011: More details about the Windows Phone 7 u...
        • Netbook ultimate guide
        • Get more from email
        • Reinstall Windows For The Last Time
        • HTC Incredible S To Come In Strawberry Red?
        • The Magic Connector Unifies The Apple Wireless Key...
        • Every Super Nintendo Game Ever – Yours For $9999!
        • Prevent E-mail Disasters: 5 Tools to Protect You f...
        • Apple Tweaks In-App Purchase To Prevent Accidental...
        • Analyst: Non-iPad Tablets Will Be Collecting Dust ...
        • PS3 To Be Re-Secured by 3.60 Firmware
        • Apples To Apples: Apple Inc. Files For Apple Corps...
        • AT&T DSL Adopts 250GB Monthly Bandwidth Cap
        • Google Maps Can Now Locate EV Charging Stations
        • M-Edge’s Case Designer Lets You Customize Your iPa...
        • MicroCenter Takes Up To $200 Off MacBook Pro
        • Bang And Olufsen Bring 16 Speakers To The New BMW ...
        • Protect your home with your webca
        • 9 Steps to get Windows Vista help from your friend...
        • The Best Flash Sites Ever
        • Web fonts: the .net top 20
        • Best web design: How to create better layouts from...
        • Best Graphics/Design Tool
        • Best Digital Photo Management Tool
        • Best IRC Client Pidgin Honorable Mention/Runner Up...
        • Best Single Office Program
        • Best Office Suite
        • Best Microblogging Client
        • Best IM Client
        • Best E-mail Client
        • Best Web Browser
        • Best Desktop Environment
        • Best Mobile OSGoogle Android Honorable Mention/Run...
        • Best Distribution for Netbooks/Limited Hardware
        • Best Linux Distribution
        • Apples To Apples: Apple Inc. Files For Apple Corps...
        • Adobe Just Made Medialets Its Mobile Ad Server
        • Apple Keeps Right On Approving Amazon And Netflix ...
        • Study: Mobile Ad-Tracking Systems Are “Blind” To 8...
        • The Ever-Elusive Mobile Wallet: Why NFC Chips Are ...
        • It’s A Good Day To Be An iPad Competitor . . . Oh ...
        • Why Payments Are Hard, Even For Apple And Google
        • Dear Apple, Please Copy This Notification System F...
        • Explor, Touch-Based App Discovery To Get Around Th...
        • Adobe’s Wallaby Can’t Jump Very High
        • As Apple Ponders Their Subscription Ruling, Readab...
        • Video: Hands-On With An Engineering Prototype 64GB...
        • On Apple TV Special Apps, Sports, And The Slow Ble...

    Popular Posts Widget

    • SPIDER-MAN: SHATTERED DIMENSIONS
      RATINGS 4/5 Action Spider-Man: Shattered Dimensions Price       Rs 3,499 (PS3) PUBLISHER          Activision DEVELOPER         Beenox PLA...
    • Web fonts: the .net top 20
      Web fonts: the .net top 20 It’s easier than ever to get creative with typefaces. Elliot Jay Stocks picks 20 web fonts that demand your vis...
    • Mac OS X 10.7 Lion: what you need to know
      Steve Jobs and other senior Apple employees provided   a glimpse   into Mac OS X 10.7 'Lion', making clear Apple's philosophy re...
    • Wireframe tools: the top 10 solutions
      Create your next prototype the easy way with our guide to the best wireframing tools out there Every website design has to ki...
    • PC won't boot up? How to find out why it so....
      You press the power button and your PC won't boot up. What do you do next? Don't write it off just yet. The first thing to do when ...

    Total Pageviews

    Subscribe To

    Posts
    Atom
    Posts
    Comments
    Atom
    Comments

    About Me

    Rajan Chatterjee
    I m Student Of computer Scince Engineering and tech-savvy person have unlimit zeal for programming and technology
    View my complete profile

    Followers

    Copyright © 2010 TechsVilla | Blogger Templates by Splashy Templates
    Css Designed by Hot Website Templates