Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
tutorials:unxnode9 [2012/05/08 16:38] – created memnontutorials:unxnode9 [2012/05/08 17:21] (current) – Fix Heading Indent memnon
Line 10: Line 10:
 You might find some people in COM Mode who would like to talk about these things, but most of them are really tired of kiddies coming into the lobby & asking <nowiki>"</nowiki>Do any of you know how to hack?<nowiki>"</nowiki> So you'll need to be more subtle. It's like real life; you don't walk into a room, interrupt the current conversation, & loudly ask if anyone will sell you nose candy. It's just rude. You might find some people in COM Mode who would like to talk about these things, but most of them are really tired of kiddies coming into the lobby & asking <nowiki>"</nowiki>Do any of you know how to hack?<nowiki>"</nowiki> So you'll need to be more subtle. It's like real life; you don't walk into a room, interrupt the current conversation, & loudly ask if anyone will sell you nose candy. It's just rude.
  
-Information about security holes is pretty easy to find without help. Just use Google to search for things like <nowiki>"</nowiki>computer security virus hole exploit<nowiki>"</nowiki>. What you need is the knowledge to make use of that information. You need to learn straightforward programming techniques, especially networking8.1, before you can make use of all that security information that is readily available. So instead of asking people to teach you to crack, it might be more worthwhile & fun to talk programming with people.+Information about security holes is pretty easy to find without help. Just use Google to search for things like <nowiki>"</nowiki>computer security virus hole exploit<nowiki>"</nowiki>. What you need is the knowledge to make use of that information. You need to learn straightforward programming techniques, especially networking((Lookup //socket//, //connect//, //listen//, & //accept// in the man.)), before you can make use of all that security information that is readily available. So instead of asking people to teach you to crack, it might be more worthwhile & fun to talk programming with people.
  
 While we're on the topic, I guess I can throw out a bone. Take a look at <nowiki>"</nowiki>CIFS: Common Insecurities Fail Scrutiny<nowiki>"</nowiki> ([Hob77]). While we're on the topic, I guess I can throw out a bone. Take a look at <nowiki>"</nowiki>CIFS: Common Insecurities Fail Scrutiny<nowiki>"</nowiki> ([Hob77]).
Line 26: Line 26:
 That's just an example. By the way, if none of those title make you at least a little curious to know what's in those documents, then you might not be cut-out to be a computer hacker or a cracker.  That's just an example. By the way, if none of those title make you at least a little curious to know what's in those documents, then you might not be cut-out to be a computer hacker or a cracker. 
  
-[[tutorials:unix|back]] +[[tutorials:unxunx|back]]
- +
  
 +Last Revision: e8d38543ddcd18c7482677e9570847a3