The whole process of the growth of hackers, the development process of hackers

Updated on healthy 2024-05-25
9 answers
  1. Anonymous users2024-02-11

    A hacker is someone who likes to use their intellect to push the limits of their mental power through creative methods, especially in their field of interest, such as computer programming or electrical engineering.

    Hackers originated from English hackers, and they were praised in the computer industry in the United States in the early days. But in the report, the word hacker often refers to those who are "software crackers."

    The term hacker originally referred to computer experts, especially programmers, who are enthusiastic about computer technology and have a high level of proficiency.

    But today, the term hacker has been used to refer to people who specialize in using computers to wreak havoc or pranks. The correct English name for these people is cracker, which some translate as "hacker".

    The fundamental difference between hackers and hackers is that hackers build, while hackers destroy.

    The word hacker generally has the following four meanings:

    A person who knows enough about programming languages (in a certain field) to create useful software without long thinking.

    A person who maliciously (usually illegally) attempts to crack or disrupt the security of a program, system, or network. This meaning often causes serious distress to hackers who qualify for (1), and they suggest calling this group of people "crackers". Sometimes this group of people is also called "black hat hackers".

    A system security vulnerability that attempts to hack a system or network to alert the owner of that system. This group of people is often referred to as "white hat hackers" or "sneakers" or red customers. Many of these people are employees of computer security companies and attack a system when it is perfectly legal.

    A person who, through knowledge or guesswork, makes (often good) changes to a piece of a program and changes (or enhances) the purpose of that program.

    "Script kids" are people who have no or little hacking skills, but only follow instructions or run some kind of hacking program to achieve the purpose of cracking.

    Redker - a name that makes people awe-inspiring!

    Redke can be said to be the name given by Chinese hackers. The English "honker" is the transliteration of Hongke.

    Reds are a group of hackers fighting to defend China's sovereignty!

    Their spirit is admirable!

  2. Anonymous users2024-02-10

    Hehe. Haven't learned it yet.

    Don't know the process.

  3. Anonymous users2024-02-09

    For a hacker, learning to program is a must, computers can be said to be designed for programming, and running programs is the only function of the computer. By the way, mathematics is also indispensable, running programs is actually operations, discrete mathematics, linear algebra, calculus, etc.

    I often visit the "Central China Empire", "Black Base Network", "Huaxia Alliance", etc., and learn the tutorials inside. Familiar with protocols, proficient in assembly language, and know how to make invocations from software to hardware.

    The origin of the hacker:The word hacker originated at the Massachusetts Institute of Technology in the 50s of the last century, when a group of bright and energetic young students at MIT gathered together, sparks of ideas collided with each other, and people with common ideas formed interest groups. For example, the most famous tech model Railroad Claub (Railway Technology Club), everyone learns and studies the composition of the train, the signal control system, assembles the model by themselves, modifies the model, studies and experiments together, and puts the ideas in their hearts into practice.

  4. Anonymous users2024-02-08

    Hackers first started in the 50s of the 20th century, the first computers were born at the University of Pennsylvania in 1946, and the first hackers appeared at the Massachusetts Institute of Technology, and Bell Labs also had them. The first hackers were generally high-level technologists who were passionate about challenge, advocating freedom, and advocating for the sharing of information.

    Today, hackers are no longer a minority phenomenon like they used to be, they have developed into a unique group on the web. They have different ideals and pursuits from ordinary people, and have their own unique behavior patterns, and there are now many hacker groups organized by some like-minded people on the Internet. But where did these people come from?

    What kind of people are they? In fact, except for a very small number of professional hackers, most of them are amateurs, and hackers are actually no different from ordinary people in reality, maybe he is just an ordinary high school student.

  5. Anonymous users2024-02-07

    In this regard, China has been detached from the world. I can't say anything about it.

  6. Anonymous users2024-02-06

    Start by learning the hacking code :

    Hacker Code 1: Don't maliciously damage any system, doing so will only cause you trouble. Maliciously destroying someone else's software will lead to legal liability, if you just use the computer, it is only illegal use! Note: Don't damage anyone else's software or data!

    Article 2. Do not modify any system files, if you want to change it to access the system, please change it back to the original state after answering the purpose.

    The first mountain calls three articles. Don't easily tell your untrusted friends about the platform you want to hack.

    Article 4. Don't talk about anything you hack on BBS.

    Article 5: Caution. Don't use your real name when posting an article.

    Article 6. Don't leave your computer at random while you're hacking.

    Article 7. Do not invade or damage the main unit of the ** mechanism.

    Article 8. Talk about anything you hack in **.

    Article 9. Keep your notes in a safe place.

    Article 10. If you want to become a hacker, you have to really hack and read all the documents about system security or system vulnerabilities (learn English quickly)!

    Article 11. Accounts that have been compromised into a computer must not be wiped or modified.

    Article 12. You must not modify the system files, except if you make changes to hide your own intrusion, but you must still maintain the security of the original system, and you must not open the door to gain control of the system!

    Article 13. Don't share your hacked account with your friends.

    Secondly, you can learn some professional basics of hacking skills with the help of hackers**.

    Also, learn at least one programming language.

    Practice more according to what you have learned, and never stop learning.

  7. Anonymous users2024-02-05

    How hackers are made, who knows? Tell me next...It's definitely not a verbal exercise..You search for the godfather of programming, his name is Cao Lei, and you can directly check his official website. Go to his official website and believe in you.

  8. Anonymous users2024-02-04

    1. I like to study the Internet 2. I love to play 3. I have a good foundation.

  9. Anonymous users2024-02-03

    Learn to code well, and don't start with all the bells and whistles.

Related questions
6 answers2024-05-25

1. The idea of whole-process control refers to the need for comprehensive control of each link in the whole process of investment control to ensure the success of the investment project. >>>More

10 answers2024-05-25

Braised pork: 10g dried chili, 5g Sichuan pepper, star anise, cinnamon, 2g bay leaves, cloves, 3 grass fruits, 1 yellow gardenia, grass cardamom, white cardamom, 1g licorice, cumin, lemongrass, angelica, 3g tangerine peel, a total of 15 spices. >>>More

4 answers2024-05-25

Keeping the complex simple is what we do.

7 answers2024-05-25

Shiitake mushroom cultivation bagging process.

5 answers2024-05-25

Pumpkin shrimp siu mai method.