149 lines
7.9 KiB
Plaintext
149 lines
7.9 KiB
Plaintext
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|
= F.U.C.K. - Fucked Up College Kids - Born Jan. 24th, 1993 - F.U.C.K. =
|
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|
|
|
How To Be An Evil Computer Hacker
|
|
---------------------------------
|
|
|
|
People are always asking me "Voyager, How do *I* become an evil computer
|
|
hacker like you?" I almost always give them the straight truth, and
|
|
they very seldom believe me.
|
|
|
|
The secret to being a successful Evil Computer Hacker (tm-TNo(1991)) is
|
|
understanding systems. To expolit a system, you must first understand
|
|
how that system works, both conceptually and practically. Over 2500 years
|
|
ago, Sun Tzu wrote "If you know the enemy and you know yourself, you
|
|
need not fear the result of a hundred battles." Make yourself knowledgable
|
|
about systems, and assess your knowledge fairly. Do this and you will
|
|
not be defeated.
|
|
|
|
Here are a few tips on becoming an Evil Computer Hacker:
|
|
|
|
Read at least one book a week.
|
|
|
|
Dilbert books don't count. This week I've read _An AIX
|
|
Companion_, _AIX RS/6000 System and Administration Guide_ and
|
|
_AFS Users Guide_. I'm working on _Troubleshooting
|
|
Internetworks_ today. Select books that are just a bit above
|
|
your current skill level. Books below your current skill level
|
|
won't help you, nor will books too far above your current skill
|
|
level. Select books that interest you. If a topic does not
|
|
arouse your interest, you will not retain the information you
|
|
are studying. With every new fact you read, try to fit it into
|
|
place with the facts you currently posess. Look at the new fact
|
|
and try to imagine a situation where you could put it to use.
|
|
Personalize the knowledge and it will stay around for a long
|
|
time. As always, take good notes. Review your notes when you
|
|
finish the book. Review your notes one day later and also one
|
|
week later.
|
|
|
|
Keep up with periodicals in your field.
|
|
|
|
Books are your best source for comprehensive information, but
|
|
the lead time for a book to go to press means that books are out
|
|
of date before they hit the shelves. Periodicals are required
|
|
to round out your knowledge base. Public libraries subscribe to
|
|
many periodicals. Many industry periodicals are available free
|
|
to qualified subscribers. Remember, Evil Computer Hackers are
|
|
_always_ qualified subscribers. Do not ignore online
|
|
periodicals like Phrack, CoTNo, The Infinity Concept and FEH.
|
|
|
|
Wander the Web.
|
|
|
|
When you come across a new concept, term, phrase, vendor,
|
|
product or technology -- head to the World Wide Web. Visit one
|
|
or more of the WWW search engines (my personal favorite is
|
|
http://www.yahoo.com) and search for references. Each time you
|
|
find a link to something that sounds interesting, follow that
|
|
link. An excellent way to expand our horizons is to find
|
|
information that we were not _originally_ looking for.
|
|
|
|
Practice, Practice, Practice.
|
|
|
|
Reading Is Fundamental, but reading isn't everything. Practice
|
|
is required to cement your recently obtained knowledge into
|
|
place. Practice everything that you can practice. Build
|
|
cables. Build circuits. Code software. Execute commands.
|
|
Explore systems. Without practice you are only a voyeur, not a
|
|
voyager.
|
|
|
|
Find a job in the field.
|
|
|
|
The best way to practice is to get paid for it. This method
|
|
also has the advantage of helping you to avoid time in the
|
|
Penalty Box. Although prison can be an interesting and learning
|
|
experience, I really cannot reccommend it as a good step toward
|
|
becoming an Evil Computer Hacker. In addition, you come into
|
|
contact with systems you simply can't get into by traditional
|
|
hacker methods. I may be able to remotely access the NSA's
|
|
Cray's, but I certaintly cannot remotely access their biometric
|
|
security devices. As an employee (or contractor), I will be
|
|
able to access these systems every day.
|
|
|
|
Do a good job at work.
|
|
|
|
Become the wizard at the office. Learn _everything_ about
|
|
_every_ system in the building, even that horrid PRIME 9950 that
|
|
no one wants to learn to use. Be the person people come to with
|
|
questions. Every time someone comes to you with a question,
|
|
they bring useful information with them. Repeat after me "Sure,
|
|
I'll take a look at the problem for you. I'll need an account on
|
|
the system though."
|
|
|
|
Switch jobs regularly, but not too regularly.
|
|
|
|
Switching jobs regularly is required to keep your skills up to
|
|
date. Not that long ago, three years was considered the
|
|
shortest acceptable time to hold a position. Today, it's two
|
|
years and falling.
|
|
|
|
Teach others.
|
|
|
|
When we teach a subject, we organize and clarify that subject in
|
|
our mind. We find (and fill) the gaps in our understanding of
|
|
the subject matter. Our conceptualization of the system
|
|
improves, and our understanding of the system deepens.
|
|
|
|
|
|
There are no secrets to becoming an Evil Computer Hacker. There are no
|
|
short cuts. Sure, there are a thousand lamers with 31337 sUp3R s3Kr3t
|
|
r00t X-pL01tS, but they are still lamers. They pretend to be Evil
|
|
Computer Hackers, but when their particular toy exploit is patched, they
|
|
are back to begging for scripts on #hack.
|
|
|
|
One more note: Avoid IRC, it's a pit from which few escape.
|
|
|
|
-Voyager
|
|
|
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|
= Questions, Comments, Bitches, Ideas, Rants, Death Threats, etc etc... =
|
|
= Internet : jericho@dimensional.com (Mail is welcomed) =
|
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|
= gote land +27.31.441115 =
|
|
= Arrested Development +31.77.3547477 =
|
|
= Global Chaos +61.2.681.2837 =
|
|
= Chemical Persuasion 203.324.0894 Undrgrnd Indust/Inc. 207.490.2158 =
|
|
= Damnation 212.861.0580 that stupid place 215.985.0462 =
|
|
= Hacker's Haven 303.343.4053 PheedbacK 303.782.0893 =
|
|
= E.L.F. (NUP) 314.272.3426 Misery 318.625.4532 =
|
|
= Dungeon Sys. Inc. 410.263.2258 Psykodelik Images 407.834.4576 =
|
|
= Paradise Lost 414.476.3181 Black SunShine 513.891.3465 =
|
|
= underworld_1995.com 514.683.1894 Digital Fallout 516.378.6640 =
|
|
= PSYCHOSiS 613.836.7211 Bad Trip 615.870.8805 =
|
|
= Plan 9 716.881.3663 suicidal chaos 718.592.1083 =
|
|
= Damaged 801.944.7353 The Death Star Bar 805.872.3151 =
|
|
= Purple Hell 806.791.0747 Atrocity Exhibition 905.796.3385 =
|
|
= Phoenix Modernz 908.830.8265 The Keg 914.234.9674 =
|
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|
= Files through Anon FTP FTP.DIMENSIONAL.COM/users/jericho/FUCK =
|
|
= FTP.PRISM.NET/pub/users/mercuri/zines/fuck =
|
|
= FTP.WINTERNET.COM/users/craigb/fuck =
|
|
= FTP.GIGA.OR.AT/pub/hackers/zines/FUCK =
|
|
= ETEXT.ARCHIVE.UMICH.EDU - /pub/Zines/FUCK =
|
|
= FTP.DIMENSIONAL.COM - /users/rage/zines/fuck =
|
|
= Files through WWW: http://www.dimensional.com/~jericho =
|
|
= http://command.com.inter.net (DisordeR's User Page) =
|
|
= http://www.prism.net/zineworld/fuck/ =
|
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|
|