I will discuss first is How to Become a Hacker. The trick is as follows:
1. Prepare the Soul
This mental preparation is the most important thing in being a hacker, while the things that need to be prepared are:
Mental and psychological: it is necessary because a hacker will get a lot of trials that often make down and sometimes make us forget ourselves. Such as verbal abuse, insults, flattery and sweet words.
Patience, steadfastness and sincerity: this is where the key to the success of a hacker with this would make a hacker will never regret any act done.
Spirit, effort, willingness, unyielding and hard work: it takes a hacker to strive to reach the best in life lived, because being a hacker is not easy and it took a considerable time to understand the ins and outs of each science.
Trust and surrender only to God Almighty: it became the foundation of the most important and one of the motto used by BinusHacker Family "God Only You the One" which in this case will all be returned to the Creator and declares that Science was without Borders ,
2. Prepare Raga
Preparation raga is the second step needs to be done by a hacker, in which the body must be built in such a way in order to reach the target diingikan. It needs to be prepared are:
Health and fitness: it is necessary that a hacker still fit to face any challenge and struggle in learning and achieving the targets set and the ability of memory, thinking brain, conscience, senses can be maximized.
Active Sport: it is necessary to support the body workout to avoid the various threats. Suppose martial arts to protect themselves when there is a threat of fitness to keep the body active and healthy awake.
3. Prepare act
Preparation works is the third step to become a hacker, in which steps need to be undertaken is a positive step in life, always do good and worship. Reduce, avoid and leave the negative things is a long struggle and the most severe for a hacker.
Learning, Sharing, Always Update and Enhance Capabilities: it became the foundation of one of the most important and motto used by BinusHacker Family to jointly improve the quality and quantity capabilities.
Mutual Help Helping, Friendship, expose SARA: this is necessary so that a hacker can contribute to the global life where all very universal. By becoming a hacker then required to have a wide view so that it can act in a neutral, good, fair and wise.
There are five important things that need to be learned by a hacker:
1. Logic (Logic)
A hacker must always use logic where it is becoming a consideration sense to produce something that is good, true and correct. Humans are given advantages by the Almighty for this case, then take advantage to the fullest.
Logic is often used in programming languages is OR, AND, NOT, XOR, NAND, etc. Some programs are composed of program components IF..THEN ... ELSE, FOR..TO..DO, WHILE, and other CASE..OF-lainnya.Logika will then collaborated with math to produce something bernilaiBenar (True) or False ( False) like (<,>, =, +, -, etc.).
2. Hardware (Hardware)
A hacker must know the ins and outs of the hardware, because the hardware is the basis of forming technology. Hardware here is to understand the ins and outs of the wiring, chips, mainboard, switches, hubs, electronics, etc. If a hacker has to understand the hardware, it will be easier to create instructions for the software. Never see James Bond and Mission Impossible? Well, diluarsana many extraordinary people who understand the hardware deeply.
Which merit further study is a component of the device is fixed in the following sections:
Input Device (Unit Input: Keyboard, Mouse): media to include data from outside into a memory and a processor.
Process Device (Processing Unit: CPU, Microchip, RAM): medium to process input to produce the necessary information.
Output Device (Unit Output: Monitor, Scanner, Speaker): medium to release the result of information.
Backing Storage (Storage Unit: Hard Drive, Disk): medium for the storage of data and information.
Peripherals (Additional Units: USB, Modem): additional media used to support the work processes of the hardware.
3. Software (Software)
A hacker will study the software as instruction to the hardware to perform the desired commands. This software is built from a variety of languages, where the language to be learned in machine language is 0, 1, and analog. As the base is a programming language is assembly. The exact order as follows and I quote from wikipedia:
Machine Language, which gives orders to the computer using the binary language code, for example, 01100101100110.
Low-level languages (ASM) or known as assembly language (bah.Inggris Assembly), which gives orders to the computer using a short code (mnemonic code), for example, MOV, SUB, CMP, JMP, JGE, JL, LOOP, etc.
English Intermediate (C), which is a computer language that uses a mix of instruction in the words of human language (see example below High Level Languages) and the instructions that are symbolic, for example, {,},?, <<, >>, &&, ||, etc.
High Level Languages (HTML, XML, JSP, Java, VB, Pascal, DELPHI, C #, F #, PHP, ASP, SQL, ORACLE, PYTHON, PERL, etc) is a computer language that uses the instruction derived from elements of the words of human language , for example, begin, end, if, for, while, and, or, etc.
As a hacker, knowing more complex programming languages it will be easier to turn memolak software, look for cracks, repair, provide a solution to solve the problem and even build a new application.
The key is getting to know the language of the machine, it will be easier to communicate with the machine.
Besides knowing a programming language, which need to be studied is a system built on software that already exist today, as one example, namely OS: * Nix, Linux, FreeBSD, SunOS, Windows, etc.
4. Networking (Networking)
A hacker needs to know and explore electronic networks and computers is an important part to learn, because this is the network that connect with each other like a spider's web that is not interrupted.
When we have to understand the network it will be quite easy in setting up, configuration and control of the network. Within this network mobile communication flow between one device to another. This is a lot on the network communication protocol used so it is necessary also to be studied such as TCP, HTTP / S, FTP / S, etc. If the network is in control, then all of the information that flows in it would be very easy to come by, added, changed, even for deleted though.
5. Cryptography (Cryptography)
A hacker has challenges in terms of cryptography, because today almost all communication transactions are already using cryptography as a protective bridge. With the logic of a mature capital then cryptography can be easier to learn despite the tough structure. A hacker requires knowledge of cryptography to safeguard information security aspects such as confidentiality of information, the validity of information, information integrity, and authentication information and even to obtain and translate the information itself.
There are many models of cryptography are now widely grown, namely MD5, SHA, DES, AES, Base64, IDEA, Blowfish, RSA, Etc. Cryptography is widely used for configuration, data storage in the database and transaction communications on the network.
By understanding and studying the above five elements, I think you become a hacker reliable.
1. Prepare the Soul
This mental preparation is the most important thing in being a hacker, while the things that need to be prepared are:
Mental and psychological: it is necessary because a hacker will get a lot of trials that often make down and sometimes make us forget ourselves. Such as verbal abuse, insults, flattery and sweet words.
Patience, steadfastness and sincerity: this is where the key to the success of a hacker with this would make a hacker will never regret any act done.
Spirit, effort, willingness, unyielding and hard work: it takes a hacker to strive to reach the best in life lived, because being a hacker is not easy and it took a considerable time to understand the ins and outs of each science.
Trust and surrender only to God Almighty: it became the foundation of the most important and one of the motto used by BinusHacker Family "God Only You the One" which in this case will all be returned to the Creator and declares that Science was without Borders ,
2. Prepare Raga
Preparation raga is the second step needs to be done by a hacker, in which the body must be built in such a way in order to reach the target diingikan. It needs to be prepared are:
Health and fitness: it is necessary that a hacker still fit to face any challenge and struggle in learning and achieving the targets set and the ability of memory, thinking brain, conscience, senses can be maximized.
Active Sport: it is necessary to support the body workout to avoid the various threats. Suppose martial arts to protect themselves when there is a threat of fitness to keep the body active and healthy awake.
3. Prepare act
Preparation works is the third step to become a hacker, in which steps need to be undertaken is a positive step in life, always do good and worship. Reduce, avoid and leave the negative things is a long struggle and the most severe for a hacker.
Learning, Sharing, Always Update and Enhance Capabilities: it became the foundation of one of the most important and motto used by BinusHacker Family to jointly improve the quality and quantity capabilities.
Mutual Help Helping, Friendship, expose SARA: this is necessary so that a hacker can contribute to the global life where all very universal. By becoming a hacker then required to have a wide view so that it can act in a neutral, good, fair and wise.
There are five important things that need to be learned by a hacker:
1. Logic (Logic)
A hacker must always use logic where it is becoming a consideration sense to produce something that is good, true and correct. Humans are given advantages by the Almighty for this case, then take advantage to the fullest.
Logic is often used in programming languages is OR, AND, NOT, XOR, NAND, etc. Some programs are composed of program components IF..THEN ... ELSE, FOR..TO..DO, WHILE, and other CASE..OF-lainnya.Logika will then collaborated with math to produce something bernilaiBenar (True) or False ( False) like (<,>, =, +, -, etc.).
2. Hardware (Hardware)
A hacker must know the ins and outs of the hardware, because the hardware is the basis of forming technology. Hardware here is to understand the ins and outs of the wiring, chips, mainboard, switches, hubs, electronics, etc. If a hacker has to understand the hardware, it will be easier to create instructions for the software. Never see James Bond and Mission Impossible? Well, diluarsana many extraordinary people who understand the hardware deeply.
Which merit further study is a component of the device is fixed in the following sections:
Input Device (Unit Input: Keyboard, Mouse): media to include data from outside into a memory and a processor.
Process Device (Processing Unit: CPU, Microchip, RAM): medium to process input to produce the necessary information.
Output Device (Unit Output: Monitor, Scanner, Speaker): medium to release the result of information.
Backing Storage (Storage Unit: Hard Drive, Disk): medium for the storage of data and information.
Peripherals (Additional Units: USB, Modem): additional media used to support the work processes of the hardware.
3. Software (Software)
A hacker will study the software as instruction to the hardware to perform the desired commands. This software is built from a variety of languages, where the language to be learned in machine language is 0, 1, and analog. As the base is a programming language is assembly. The exact order as follows and I quote from wikipedia:
Machine Language, which gives orders to the computer using the binary language code, for example, 01100101100110.
Low-level languages (ASM) or known as assembly language (bah.Inggris Assembly), which gives orders to the computer using a short code (mnemonic code), for example, MOV, SUB, CMP, JMP, JGE, JL, LOOP, etc.
English Intermediate (C), which is a computer language that uses a mix of instruction in the words of human language (see example below High Level Languages) and the instructions that are symbolic, for example, {,},?, <<, >>, &&, ||, etc.
High Level Languages (HTML, XML, JSP, Java, VB, Pascal, DELPHI, C #, F #, PHP, ASP, SQL, ORACLE, PYTHON, PERL, etc) is a computer language that uses the instruction derived from elements of the words of human language , for example, begin, end, if, for, while, and, or, etc.
As a hacker, knowing more complex programming languages it will be easier to turn memolak software, look for cracks, repair, provide a solution to solve the problem and even build a new application.
The key is getting to know the language of the machine, it will be easier to communicate with the machine.
Besides knowing a programming language, which need to be studied is a system built on software that already exist today, as one example, namely OS: * Nix, Linux, FreeBSD, SunOS, Windows, etc.
4. Networking (Networking)
A hacker needs to know and explore electronic networks and computers is an important part to learn, because this is the network that connect with each other like a spider's web that is not interrupted.
When we have to understand the network it will be quite easy in setting up, configuration and control of the network. Within this network mobile communication flow between one device to another. This is a lot on the network communication protocol used so it is necessary also to be studied such as TCP, HTTP / S, FTP / S, etc. If the network is in control, then all of the information that flows in it would be very easy to come by, added, changed, even for deleted though.
5. Cryptography (Cryptography)
A hacker has challenges in terms of cryptography, because today almost all communication transactions are already using cryptography as a protective bridge. With the logic of a mature capital then cryptography can be easier to learn despite the tough structure. A hacker requires knowledge of cryptography to safeguard information security aspects such as confidentiality of information, the validity of information, information integrity, and authentication information and even to obtain and translate the information itself.
There are many models of cryptography are now widely grown, namely MD5, SHA, DES, AES, Base64, IDEA, Blowfish, RSA, Etc. Cryptography is widely used for configuration, data storage in the database and transaction communications on the network.
By understanding and studying the above five elements, I think you become a hacker reliable.
0 Response to "How to be a Hacker"
Post a Comment