Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Last revision Both sides next revision
tutorials:unxnode9 [2012/05/08 17:19]
memnon Add footnote
tutorials:unxnode9 [2012/05/08 17:21]
memnon Fix footnote correctly
Line 1: Line 1:
-====== 8. Hacking ======+  ​====== 8. Hacking ======
  
 So you want to hack? To break into computers? Take them over? Get root access? Crash them or use their CPU cycles to do work for you? So you want to hack? To break into computers? Take them over? Get root access? Crash them or use their CPU cycles to do work for you?
Line 10: Line 10:
 You might find some people in COM Mode who would like to talk about these things, but most of them are really tired of kiddies coming into the lobby & asking <​nowiki>"</​nowiki>​Do any of you know how to hack?<​nowiki>"</​nowiki>​ So you'll need to be more subtle. It's like real life; you don't walk into a room, interrupt the current conversation,​ & loudly ask if anyone will sell you nose candy. It's just rude. You might find some people in COM Mode who would like to talk about these things, but most of them are really tired of kiddies coming into the lobby & asking <​nowiki>"</​nowiki>​Do any of you know how to hack?<​nowiki>"</​nowiki>​ So you'll need to be more subtle. It's like real life; you don't walk into a room, interrupt the current conversation,​ & loudly ask if anyone will sell you nose candy. It's just rude.
  
-Information about security holes is pretty easy to find without help. Just use Google to search for things like <​nowiki>"</​nowiki>​computer security virus hole exploit<​nowiki>"</​nowiki>​. What you need is the knowledge to make use of that information. You need to learn straightforward programming techniques, especially networking((Lookup //socket//, //​connect//,​ //listen//, & //accept// in the man.), before you can make use of all that security information that is readily available. So instead of asking people to teach you to crack, it might be more worthwhile & fun to talk programming with people.+Information about security holes is pretty easy to find without help. Just use Google to search for things like <​nowiki>"</​nowiki>​computer security virus hole exploit<​nowiki>"</​nowiki>​. What you need is the knowledge to make use of that information. You need to learn straightforward programming techniques, especially networking((Lookup //socket//, //​connect//,​ //listen//, & //accept// in the man.)), before you can make use of all that security information that is readily available. So instead of asking people to teach you to crack, it might be more worthwhile & fun to talk programming with people.
  
 While we're on the topic, I guess I can throw out a bone. Take a look at <​nowiki>"</​nowiki>​CIFS:​ Common Insecurities Fail Scrutiny<​nowiki>"</​nowiki>​ ([Hob77]). While we're on the topic, I guess I can throw out a bone. Take a look at <​nowiki>"</​nowiki>​CIFS:​ Common Insecurities Fail Scrutiny<​nowiki>"</​nowiki>​ ([Hob77]).