111 How to hack and what is hacking? What do they do every day?

Updated on technology 2024-05-12
17 answers
  1. Anonymous users2024-02-10

    If the landlord wants to learn the knowledge of hacking, you can go to the Huaxia Hacker Alliance forum to see, there are a lot of comprehensive hacking knowledge, I believe you can learn what you want in it, I hope you can learn hacker knowledge well, I wish you a happy forum will be open for free registration from time to time or on a specific date, and you can go to register for free when the time comes.

  2. Anonymous users2024-02-09

    Where does hacking come from? How to say it. There are many problems.

    Just find the answer. Practice. Slowly, some skills have been accumulated.

    As for hackers. Even if you are new to computers, as long as you have the spirit of hacking, you are a hacker. Don't ask me what the spirit of hacking is.

    See for yourself.

  3. Anonymous users2024-02-08

    You go straight to the hacking animation bar and check it out, there are a lot of tutorials in it, which are good.

  4. Anonymous users2024-02-07

    In fact, hacking is also a technology, and real hackers are not easy, they need considerable network knowledge and program development skills, and it is said that they also need a little luck. In any case, everything needs to be learned, but if you just run behind others, you will always only follow others, for example, if a country survives by importing foreign goods, its demise is very close. China's computer industry needs to develop, and I hope that these people who have learned black can promote the development of national computers; For the time being, people who have not learned to hack can control the hacking spirit well and contribute to mankind.

  5. Anonymous users2024-02-06

    Like ordinary people, you think too much, it's just some of you who learn cybersecurity.

  6. Anonymous users2024-02-05

    Mankind... It can be understood as a conceited genius

    Basically, most of them like this out of personal interests, longing and desire for technology, and feeling honored. Of course, there are also those who have ulterior motives.

    Play... What can you do Work during the day (otherwise drink the northwest wind), play at night (it's just that toys are different from others)。。

    Capture packets every day, parse, study the penetration of firewalls, study how to disguise data packets, study the composition of another person's system, etc., in short, there are many directions... The process of pursuing various technologies is very fun

  7. Anonymous users2024-02-04

    Some hackers have the spirit of hacking, what they do every day is to find leaks in the software and then patch or attack the software, and then can't post it on the Internet, everyone learns, but it is a big trouble to be used by those so-called hackers!

    Now Bill Gates, when he was a child, and one of his classmates did vulnerability finding work in a software company!

  8. Anonymous users2024-02-03

    Generally, it refers to the use of the Internet by hackers to spread viruses and attack the network or game server. It also refers to the implantation of personal computers by means of technical judgment before excavation.

    This is how computer poisoning manifests itself.

    1) Under certain circumstances, some abnormal characters or specific screens appear on the screen;

    2) Abnormal increase or decrease in file length or inexplicable generation of new files;

    3) Some files are opened abnormally or suddenly lost;

    4) The system reads and writes a large number of disks without reason or formats without the permission of the user;

    5) The system has an abnormal restart, often crashes, or the blue screen cannot enter the system.

    The housekeeper has 16 layers of protection, and the anti-virus uses roller skating to use a "4+1" core engine.

    4+1 "Core Engine": "4" refers to the four virus detection and killing technologies of QQ Computer, Kingsoft Antivirus, Little Red Umbrella and Trend Micro, and "1" refers to the newly launched system file crash caused by Trojan damage to achieve self-repair function.

    16 layers of protection: It is divided into three parts: Internet security protection, application entry protection, and system bottom layer protection. Each section contains more detailed protection items and can be switched on and off separately.

    In order to keep the performance of the computer as stable as possible, it is recommended to use the butler to clean up the garbage and plug-ins once a week or so.

  9. Anonymous users2024-02-02

    Glad to answer for you :

    Viruses are used to destroy your computer, Trojans are used to steal your computer account, and hackers are used to make this bridge to watch.

    5. Added ad filtering function to effectively reduce ad harassment.

    I wish you a happy work and life!!

  10. Anonymous users2024-02-01

    In a word, if you are a broiler and your computer is open and the network is open, then he can operate your computer as if he were sitting in front of your computer.

    Of course, hackers can't get over the network and take your monitor, memory, etc.

  11. Anonymous users2024-01-31

    Keep learning until you reach the level of a master hacker (not just a computer master), so that you can become a hacker!

  12. Anonymous users2024-01-30

    Customers are a group of people who like to push the limits with their wisdom, and their common tools are computers and circuit engineering. To put it bluntly, hackers are computer masters.

    What you are talking about, sabotage, is at most called Internet enthusiasts, because the technology is too bad, no one appreciates it, so I panic, hoping to attract the attention of others, so I will create some viruses as simple as his brain.

    If you're a hacker, then making money, I don't think it's a problem, it's mainly that you know what a hacker is. Hacking techniques are not learned, whether they are hackers, software developers, or programmers, these people's thinking needs to be creative and logical. I didn't learn it.

  13. Anonymous users2024-01-29

    It is recommended that you go to some forums to see tutorials or something, just like yes Cyber Security Alliance or something tutorials are good.

  14. Anonymous users2024-01-28

    Hackers are people, viruses and remote control programs are made up by people.

  15. Anonymous users2024-01-27

    This is, of course, the most basic hacking technique. If you don't know any computer languages yet, I recommend starting with python. It has a clear design and is well-documented, making it suitable for beginners.

    Despite being a good beginner's language, it's more than just a toy. It is very powerful, flexible, and also suitable for doing large projects.

    If you want to do some important programming, you'll have to learn C, the core language of UNIX. Other languages that are important to hackers include Perl and Lisp. Perl is practical and worth learning; It's widely used for active web pages and system administration, so even if you never write a program in Perl, you should at least be able to read it.

    LISP is worth learning because when you finally master it, you will get a wealth of experience; These experiences make you a better programmer later in life, even though you may actually use LISP itself very little.

    Of course, you'd better do all four. (python, c, perl, and lisp).In addition to being the four most important basic languages, they also represent four very different approaches to programming, each of which will benefit you a lot.

    2. Get an open source Unix and learn to use and run it.

    I'm assuming you already have a personal computer or have one that works ( Happy Kids Today :- The most basic step for newbies is to get a copy of Linux or BSD-Unix, install it on your personal computer, and run it.

    Of course, there are other operating systems in the world besides UNIX. But they're all sent in binary form--- you can't read its source code, let alone modify it. Trying to learn hacking techniques on a DOS or Windows machine is like learning to dance with an iron block tied to your legs.

    In addition to this, UNIX is also the operating system of the Internet. You can learn to use the Internet without knowing Unix, but you can't be an Internet hacker without knowing it. For this reason, today's hacker culture is largely unix-centric.

    This isn't always true, and some early hackers are unhappy about it, but the symbiotic relationship between Unix and the Internet is so strong that even Microsoft can't help it).

    To get linux, see: **Can get linux

    But just building a homepage doesn't make you a hacker. The web is full of web pages. Most of it is meaningless, zero-information garbage.

  16. Anonymous users2024-01-26

    Come to the Hacking Technology Forum.

    Tree Cyber Security Forum.

    Popularize cyber security technology.

    A reminder! Please don't use hacking techniques for illegal purposes!

  17. Anonymous users2024-01-25

    Are you sick, how can you have such thoughts?

Related questions
3 answers2024-05-12

Hacking first began in the 50s of the 20th century, and the first computer was in 1946 at the University of Pennsylvania. >>>More

3 answers2024-05-12

Computer "hackers" are a group of people who have mastered computer knowledge and skills, can decrypt encryption programs, steal information or destroy information, and use this as a hobby or semi-professional or professional means. The intrusion of "hackers" is difficult to detect and, if used for military purposes, poses a serious threat to military computer systems and computer networks. Using "hackers" to attack the enemy's information system can cause the enemy's information and data to be lost and the command and control system to be paralyzed.

8 answers2024-05-12

A hacker is someone who likes to use their intellect to push the limits of their mental power through creative methods, especially in their field of interest, such as computer programming or electrical engineering. >>>More

5 answers2024-05-12

If you want to understand this film, you must first understand the three groups in this film: 1. Matrix: The future world, the machine (that is, the mother nest) creates the whole world, and this world is a program designed by it, which includes many, many small programs, such as food, cars, **, everything except the human body (seen, heard). >>>More

7 answers2024-05-12

Take me, more, more points!!

Of course, the problem should be fully argued, the information should be detailed, the words should be exquisite, the people should be sincere, and the problems should be solved for others sincerely!! >>>More