SlideShare a Scribd company logo
1 of 36
{@pejman
{
Hacker       Glider_


    Emblem
             The five-dots
             in-nine-squares diagram.
What is   A
hacker
The Jargon File contains a bunch
of definitions of the term
‘hacker’, most having to do with
technical adeptness and a
delight in solving problems and
overcoming limits.
Hacker build things,
Crackers break them.
The hacker
attitude
1.
     The world is full of
     fascinating problems
     waiting to be solved.
2.   No problem should ever
     have to be solved twice.
3.   Boredom and drudgery
     are evil.
look to the master,
follow the master,
walk with the master,
see through the master,
become the master.
4.   Freedom is good.
5.   Attitude is no substitute
     for competence.
Basic
hacking
skills
LEARN
     PROGRAM
               You need to   learn how to
               think about   programming
               problems in   a general way,
               independent   of any one
               language.

     HOW
     TO




1.
2.
     Get one of the open-source
     Unixes and learn to use and
     run it.
3.   Learn how to use the World
     Wide Web and write HTML.
4.   If you don't have
     functional English,
     learn it.
Status in
the hacker
culture
You gain status and
reputation, by giving away
your time, your creativity,
and the results of your
skill.
1.   Write open-source
     software_
2.   Help test and debug
     open-source software_
3.   Publish useful
     information_
4.   Help keep the
     infrastructure working_
5.   Serve the hacker
     culture itself_
Hacker
nerd
connection
Contrary to popular
myth, you don't have to
be a nerd to be a
hacker.
many hackers have adopted
the label ‘geek’ as a badge
of pride — it's a way of
declaring their
independence from normal
social expectations.




  <geek />
Hacker
mindset
Learn to write your
native language well.
Read science fiction.
Go to science fiction
conventions.
Train in a
martial-arts form.
Develop an analytical ear
for music.
Study an actual
meditation discipline.
TWITTER
 @pejman
CREDITS
Pictures:                          Pictures:
• http://bit.ly/h5pBKK             • http://bit.ly/fqkabx
• http://bit.ly/dMeh9w             • http://bit.ly/evNQPJ
• http://bit.ly/eATScd             • http://bit.ly/dXRBgk
• http://bit.ly/fs56sx             • http://bit.ly/fs56sx
• http://bit.ly/fGq7hW             • http://bit.ly/ghev7g
• http://bit.ly/fu59iO             • http://bit.ly/fQDyVb
• http://bit.ly/fUdzlo             • http://bit.ly/f0t3ZW
• http://bit.ly/gSMm6G             • http://bit.ly/eZmOz3
• http://bit.ly/gpCrwZ             • http://bit.ly/eUegq5
• http://bit.ly/e2povX             • http://bit.ly/hFBmS4
• http://bit.ly/ihj8PJ             • http://bit.ly/eXwgqo
• http://bit.ly/e6xj2L             • http://bit.ly/etby8Q
• http://bit.ly/dKjEUZ             • http://bit.ly/fSpRBM

•   Source of contents:
    http://www.catb.org/~esr/faqs/hacker-howto.html
•   Twitter Icon:
    http://freakyframes.deviantart.com/art/Twitter-Bird-127757230

More Related Content

What's hot

Cybersecurity
CybersecurityCybersecurity
CybersecurityA. Shamel
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trendsShreedeep Rayamajhi
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx1SI19IS064TEJASS
 
Gain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldGain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldQualys
 
Practical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in CybersecurityPractical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurityscoopnewsgroup
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...Aladdin Dandis
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor AuthenticationRonnie Isherwood
 
OWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application VulnerabilitiesOWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application VulnerabilitiesSoftware Guru
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardeninganupriti
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network SecurityDushyant Singh
 
Mobile Application Security Testing (Static Code Analysis) of Android App
Mobile Application Security Testing (Static Code Analysis) of Android AppMobile Application Security Testing (Static Code Analysis) of Android App
Mobile Application Security Testing (Static Code Analysis) of Android AppAbhilash Venkata
 

What's hot (20)

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Gain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldGain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless World
 
Practical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in CybersecurityPractical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurity
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor Authentication
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
Cross site scripting XSS
Cross site scripting XSSCross site scripting XSS
Cross site scripting XSS
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cloning
CloningCloning
Cloning
 
OWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application VulnerabilitiesOWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application Vulnerabilities
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Mobile Application Security Testing (Static Code Analysis) of Android App
Mobile Application Security Testing (Static Code Analysis) of Android AppMobile Application Security Testing (Static Code Analysis) of Android App
Mobile Application Security Testing (Static Code Analysis) of Android App
 

Viewers also liked

How To Become A Successful Hacker In Only 10 Years
How To Become A Successful Hacker In Only 10 YearsHow To Become A Successful Hacker In Only 10 Years
How To Become A Successful Hacker In Only 10 Yearsluke_bkk
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information SecurityAjay Dhamija
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
CEH-GEAR dataset (BHS2014 Birmingham)
CEH-GEAR dataset (BHS2014 Birmingham)CEH-GEAR dataset (BHS2014 Birmingham)
CEH-GEAR dataset (BHS2014 Birmingham)MalikoTanguy
 
Ethical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSEthical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSSifs India
 
Day3 Backup
Day3 BackupDay3 Backup
Day3 BackupJai4uk
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and HackingParth Makadiya
 
Hacking attitude : love, live, hack
Hacking attitude : love, live, hackHacking attitude : love, live, hack
Hacking attitude : love, live, hacknous sommes vivants
 
Discover Georgia- Why To Visit Georgia Country Presented By Forty Travels
Discover Georgia- Why To Visit Georgia Country Presented By Forty TravelsDiscover Georgia- Why To Visit Georgia Country Presented By Forty Travels
Discover Georgia- Why To Visit Georgia Country Presented By Forty TravelsForty Travels & Tours
 
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive MeasuresShubham Takode
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hackingsatish kumar
 
11 Ways to Hack Puppet for Fun and Productivity - Luke Kanies - Velocity 2012
11 Ways to Hack Puppet for Fun and Productivity - Luke Kanies - Velocity 201211 Ways to Hack Puppet for Fun and Productivity - Luke Kanies - Velocity 2012
11 Ways to Hack Puppet for Fun and Productivity - Luke Kanies - Velocity 2012Puppet
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
Research in internet_lecture_1
Research in internet_lecture_1Research in internet_lecture_1
Research in internet_lecture_1Sergey Panarin
 
How to Become an Internet Research Specialist
How to Become an Internet Research SpecialistHow to Become an Internet Research Specialist
How to Become an Internet Research SpecialistChinedum Azuh
 
Think Like A Growth Hacker
Think Like A Growth HackerThink Like A Growth Hacker
Think Like A Growth HackerTim Homuth
 

Viewers also liked (20)

How To Become A Successful Hacker In Only 10 Years
How To Become A Successful Hacker In Only 10 YearsHow To Become A Successful Hacker In Only 10 Years
How To Become A Successful Hacker In Only 10 Years
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
How to Become a Hacker?
How to Become a Hacker?How to Become a Hacker?
How to Become a Hacker?
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Georgia1
Georgia1Georgia1
Georgia1
 
CEH-GEAR dataset (BHS2014 Birmingham)
CEH-GEAR dataset (BHS2014 Birmingham)CEH-GEAR dataset (BHS2014 Birmingham)
CEH-GEAR dataset (BHS2014 Birmingham)
 
Ethical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSEthical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFS
 
Day3 Backup
Day3 BackupDay3 Backup
Day3 Backup
 
24 happiness hacker
24 happiness hacker24 happiness hacker
24 happiness hacker
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
 
Hacking attitude : love, live, hack
Hacking attitude : love, live, hackHacking attitude : love, live, hack
Hacking attitude : love, live, hack
 
Discover Georgia- Why To Visit Georgia Country Presented By Forty Travels
Discover Georgia- Why To Visit Georgia Country Presented By Forty TravelsDiscover Georgia- Why To Visit Georgia Country Presented By Forty Travels
Discover Georgia- Why To Visit Georgia Country Presented By Forty Travels
 
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive Measures
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
11 Ways to Hack Puppet for Fun and Productivity - Luke Kanies - Velocity 2012
11 Ways to Hack Puppet for Fun and Productivity - Luke Kanies - Velocity 201211 Ways to Hack Puppet for Fun and Productivity - Luke Kanies - Velocity 2012
11 Ways to Hack Puppet for Fun and Productivity - Luke Kanies - Velocity 2012
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Research in internet_lecture_1
Research in internet_lecture_1Research in internet_lecture_1
Research in internet_lecture_1
 
How to Become an Internet Research Specialist
How to Become an Internet Research SpecialistHow to Become an Internet Research Specialist
How to Become an Internet Research Specialist
 
Think Like A Growth Hacker
Think Like A Growth HackerThink Like A Growth Hacker
Think Like A Growth Hacker
 

Similar to How to become a hacker

Lecture 9 - New Paradigms, New Technologies, and Your Asset Creation - 6 Ma...
Lecture 9 -   New Paradigms, New Technologies, and Your Asset Creation - 6 Ma...Lecture 9 -   New Paradigms, New Technologies, and Your Asset Creation - 6 Ma...
Lecture 9 - New Paradigms, New Technologies, and Your Asset Creation - 6 Ma...Fahri Karakas
 
Personalized Learning IAGC 2016
Personalized Learning IAGC 2016Personalized Learning IAGC 2016
Personalized Learning IAGC 2016Brian Housand
 
OpenFest 2012 : Leveraging the public internet
OpenFest 2012 : Leveraging the public internetOpenFest 2012 : Leveraging the public internet
OpenFest 2012 : Leveraging the public internettkisason
 
Hitchhikers guide to OpenSim calongne
Hitchhikers guide to OpenSim calongneHitchhikers guide to OpenSim calongne
Hitchhikers guide to OpenSim calongneCynthia Calongne
 
DIY Applied Machine Learning
DIY Applied Machine LearningDIY Applied Machine Learning
DIY Applied Machine LearningTarek Hoteit
 
Inspiring Kids to Code Using Scratch and Other Tools
Inspiring Kids to Code Using Scratch and Other ToolsInspiring Kids to Code Using Scratch and Other Tools
Inspiring Kids to Code Using Scratch and Other ToolsChad Mairn
 
Inspiring Kids to Code Using Scratch and Other Tools
Inspiring Kids to Code Using Scratch and Other ToolsInspiring Kids to Code Using Scratch and Other Tools
Inspiring Kids to Code Using Scratch and Other ToolsSt. Petersburg College
 
Personalized Learning indiana
Personalized Learning indianaPersonalized Learning indiana
Personalized Learning indianaBrian Housand
 
Bdd training v5.2.0 - public
Bdd training   v5.2.0 - publicBdd training   v5.2.0 - public
Bdd training v5.2.0 - publicArnauld Loyer
 
LEFT TO THEIR OWN DEVICES
LEFT TO THEIR OWN DEVICES LEFT TO THEIR OWN DEVICES
LEFT TO THEIR OWN DEVICES Brian Housand
 
A detailed introduction to gamification - Brisbane Web Design Meetup
A detailed introduction to gamification - Brisbane Web Design MeetupA detailed introduction to gamification - Brisbane Web Design Meetup
A detailed introduction to gamification - Brisbane Web Design MeetupZac Fitz-Walter
 
Majoran Distillery pitch workshop aug 2013
Majoran Distillery pitch workshop aug 2013Majoran Distillery pitch workshop aug 2013
Majoran Distillery pitch workshop aug 2013alan jones
 
Personalized Learning Lagniappe
Personalized Learning LagniappePersonalized Learning Lagniappe
Personalized Learning LagniappeBrian Housand
 
Crowd Media's Guide to Remarkable Community Management
Crowd Media's Guide to Remarkable Community ManagementCrowd Media's Guide to Remarkable Community Management
Crowd Media's Guide to Remarkable Community ManagementCrowd Media Ltd
 
Creative Outlets Minnesota
Creative Outlets MinnesotaCreative Outlets Minnesota
Creative Outlets MinnesotaBrian Housand
 

Similar to How to become a hacker (20)

Lecture 9 - New Paradigms, New Technologies, and Your Asset Creation - 6 Ma...
Lecture 9 -   New Paradigms, New Technologies, and Your Asset Creation - 6 Ma...Lecture 9 -   New Paradigms, New Technologies, and Your Asset Creation - 6 Ma...
Lecture 9 - New Paradigms, New Technologies, and Your Asset Creation - 6 Ma...
 
What Art can teach you
What Art can teach youWhat Art can teach you
What Art can teach you
 
Personalized Learning IAGC 2016
Personalized Learning IAGC 2016Personalized Learning IAGC 2016
Personalized Learning IAGC 2016
 
Science and Technology - Englishpost.org
Science and Technology - Englishpost.orgScience and Technology - Englishpost.org
Science and Technology - Englishpost.org
 
OpenFest 2012 : Leveraging the public internet
OpenFest 2012 : Leveraging the public internetOpenFest 2012 : Leveraging the public internet
OpenFest 2012 : Leveraging the public internet
 
Hitchhikers guide to OpenSim calongne
Hitchhikers guide to OpenSim calongneHitchhikers guide to OpenSim calongne
Hitchhikers guide to OpenSim calongne
 
DIY Applied Machine Learning
DIY Applied Machine LearningDIY Applied Machine Learning
DIY Applied Machine Learning
 
Inspiring Kids to Code Using Scratch and Other Tools
Inspiring Kids to Code Using Scratch and Other ToolsInspiring Kids to Code Using Scratch and Other Tools
Inspiring Kids to Code Using Scratch and Other Tools
 
Inspiring Kids to Code Using Scratch and Other Tools
Inspiring Kids to Code Using Scratch and Other ToolsInspiring Kids to Code Using Scratch and Other Tools
Inspiring Kids to Code Using Scratch and Other Tools
 
Personalized Learning indiana
Personalized Learning indianaPersonalized Learning indiana
Personalized Learning indiana
 
Bdd training v5.2.0 - public
Bdd training   v5.2.0 - publicBdd training   v5.2.0 - public
Bdd training v5.2.0 - public
 
LEFT TO THEIR OWN DEVICES
LEFT TO THEIR OWN DEVICES LEFT TO THEIR OWN DEVICES
LEFT TO THEIR OWN DEVICES
 
Doonish
DoonishDoonish
Doonish
 
Doonish
DoonishDoonish
Doonish
 
A detailed introduction to gamification - Brisbane Web Design Meetup
A detailed introduction to gamification - Brisbane Web Design MeetupA detailed introduction to gamification - Brisbane Web Design Meetup
A detailed introduction to gamification - Brisbane Web Design Meetup
 
How Not to SUCK at Social Media
How Not to SUCK at Social MediaHow Not to SUCK at Social Media
How Not to SUCK at Social Media
 
Majoran Distillery pitch workshop aug 2013
Majoran Distillery pitch workshop aug 2013Majoran Distillery pitch workshop aug 2013
Majoran Distillery pitch workshop aug 2013
 
Personalized Learning Lagniappe
Personalized Learning LagniappePersonalized Learning Lagniappe
Personalized Learning Lagniappe
 
Crowd Media's Guide to Remarkable Community Management
Crowd Media's Guide to Remarkable Community ManagementCrowd Media's Guide to Remarkable Community Management
Crowd Media's Guide to Remarkable Community Management
 
Creative Outlets Minnesota
Creative Outlets MinnesotaCreative Outlets Minnesota
Creative Outlets Minnesota
 

More from Pejman Dashtinejad

گفتگو من با کلیک روزنامه جام جم درباره کارآفرینی
گفتگو من با کلیک روزنامه جام جم درباره کارآفرینیگفتگو من با کلیک روزنامه جام جم درباره کارآفرینی
گفتگو من با کلیک روزنامه جام جم درباره کارآفرینیPejman Dashtinejad
 
خدمات خانه کارآفرینی فانتازیو
 خدمات خانه کارآفرینی فانتازیو خدمات خانه کارآفرینی فانتازیو
خدمات خانه کارآفرینی فانتازیوPejman Dashtinejad
 
استارتاپهای اینترنتی
استارتاپهای اینترنتیاستارتاپهای اینترنتی
استارتاپهای اینترنتیPejman Dashtinejad
 
از ایده تا اجرا و نگاهی به شتاب دهنده ها
از ایده تا اجرا و نگاهی به شتاب دهنده هااز ایده تا اجرا و نگاهی به شتاب دهنده ها
از ایده تا اجرا و نگاهی به شتاب دهنده هاPejman Dashtinejad
 
داده های پارازیتی
داده های پارازیتیداده های پارازیتی
داده های پارازیتیPejman Dashtinejad
 
هسته اصلی فعالیت شرکت نوپا
هسته اصلی فعالیت شرکت نوپاهسته اصلی فعالیت شرکت نوپا
هسته اصلی فعالیت شرکت نوپاPejman Dashtinejad
 
متن مصاحبه با هفته نامه فارغ التحصیلان
متن مصاحبه با هفته نامه فارغ التحصیلانمتن مصاحبه با هفته نامه فارغ التحصیلان
متن مصاحبه با هفته نامه فارغ التحصیلانPejman Dashtinejad
 
روی جلد هفته نامه فارغ التحصیلان
روی جلد هفته نامه فارغ التحصیلان روی جلد هفته نامه فارغ التحصیلان
روی جلد هفته نامه فارغ التحصیلان Pejman Dashtinejad
 
گوگل؛ مدیریت و ابزارها
گوگل؛ مدیریت و ابزارهاگوگل؛ مدیریت و ابزارها
گوگل؛ مدیریت و ابزارهاPejman Dashtinejad
 
گوگل؛ نگاهی از درون
گوگل؛ نگاهی از درونگوگل؛ نگاهی از درون
گوگل؛ نگاهی از درونPejman Dashtinejad
 

More from Pejman Dashtinejad (11)

گفتگو من با کلیک روزنامه جام جم درباره کارآفرینی
گفتگو من با کلیک روزنامه جام جم درباره کارآفرینیگفتگو من با کلیک روزنامه جام جم درباره کارآفرینی
گفتگو من با کلیک روزنامه جام جم درباره کارآفرینی
 
خدمات خانه کارآفرینی فانتازیو
 خدمات خانه کارآفرینی فانتازیو خدمات خانه کارآفرینی فانتازیو
خدمات خانه کارآفرینی فانتازیو
 
استارتاپهای اینترنتی
استارتاپهای اینترنتیاستارتاپهای اینترنتی
استارتاپهای اینترنتی
 
از ایده تا اجرا و نگاهی به شتاب دهنده ها
از ایده تا اجرا و نگاهی به شتاب دهنده هااز ایده تا اجرا و نگاهی به شتاب دهنده ها
از ایده تا اجرا و نگاهی به شتاب دهنده ها
 
داده های پارازیتی
داده های پارازیتیداده های پارازیتی
داده های پارازیتی
 
هسته اصلی فعالیت شرکت نوپا
هسته اصلی فعالیت شرکت نوپاهسته اصلی فعالیت شرکت نوپا
هسته اصلی فعالیت شرکت نوپا
 
متن مصاحبه با هفته نامه فارغ التحصیلان
متن مصاحبه با هفته نامه فارغ التحصیلانمتن مصاحبه با هفته نامه فارغ التحصیلان
متن مصاحبه با هفته نامه فارغ التحصیلان
 
روی جلد هفته نامه فارغ التحصیلان
روی جلد هفته نامه فارغ التحصیلان روی جلد هفته نامه فارغ التحصیلان
روی جلد هفته نامه فارغ التحصیلان
 
گوگل؛ مدیریت و ابزارها
گوگل؛ مدیریت و ابزارهاگوگل؛ مدیریت و ابزارها
گوگل؛ مدیریت و ابزارها
 
گوگل؛ نگاهی از درون
گوگل؛ نگاهی از درونگوگل؛ نگاهی از درون
گوگل؛ نگاهی از درون
 
از ایده تا اجرا
از ایده تا اجرااز ایده تا اجرا
از ایده تا اجرا
 

Recently uploaded

2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)Delhi Call girls
 
the Husband rolesBrown Aesthetic Cute Group Project Presentation
the Husband rolesBrown Aesthetic Cute Group Project Presentationthe Husband rolesBrown Aesthetic Cute Group Project Presentation
the Husband rolesBrown Aesthetic Cute Group Project Presentationbrynpueblos04
 
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Morcall Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Morvikas rana
 
$ Love Spells^ 💎 (310) 882-6330 in West Virginia, WV | Psychic Reading Best B...
$ Love Spells^ 💎 (310) 882-6330 in West Virginia, WV | Psychic Reading Best B...$ Love Spells^ 💎 (310) 882-6330 in West Virginia, WV | Psychic Reading Best B...
$ Love Spells^ 💎 (310) 882-6330 in West Virginia, WV | Psychic Reading Best B...PsychicRuben LoveSpells
 
2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)Delhi Call girls
 
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...Cara Menggugurkan Kandungan 087776558899
 
2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)Delhi Call girls
 
WOMEN EMPOWERMENT women empowerment.pptx
WOMEN EMPOWERMENT women empowerment.pptxWOMEN EMPOWERMENT women empowerment.pptx
WOMEN EMPOWERMENT women empowerment.pptxpadhand000
 
LC_YouSaidYes_NewBelieverBookletDone.pdf
LC_YouSaidYes_NewBelieverBookletDone.pdfLC_YouSaidYes_NewBelieverBookletDone.pdf
LC_YouSaidYes_NewBelieverBookletDone.pdfpastor83
 
2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)Delhi Call girls
 
Top Rated Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Pokemon Go... Unraveling the Conspiracy Theory
Pokemon Go... Unraveling the Conspiracy TheoryPokemon Go... Unraveling the Conspiracy Theory
Pokemon Go... Unraveling the Conspiracy Theorydrae5
 

Recently uploaded (14)

2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)
 
the Husband rolesBrown Aesthetic Cute Group Project Presentation
the Husband rolesBrown Aesthetic Cute Group Project Presentationthe Husband rolesBrown Aesthetic Cute Group Project Presentation
the Husband rolesBrown Aesthetic Cute Group Project Presentation
 
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Morcall Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
 
$ Love Spells^ 💎 (310) 882-6330 in West Virginia, WV | Psychic Reading Best B...
$ Love Spells^ 💎 (310) 882-6330 in West Virginia, WV | Psychic Reading Best B...$ Love Spells^ 💎 (310) 882-6330 in West Virginia, WV | Psychic Reading Best B...
$ Love Spells^ 💎 (310) 882-6330 in West Virginia, WV | Psychic Reading Best B...
 
2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)
 
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
 
2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)
 
(Aarini) Russian Call Girls Surat Call Now 8250077686 Surat Escorts 24x7
(Aarini) Russian Call Girls Surat Call Now 8250077686 Surat Escorts 24x7(Aarini) Russian Call Girls Surat Call Now 8250077686 Surat Escorts 24x7
(Aarini) Russian Call Girls Surat Call Now 8250077686 Surat Escorts 24x7
 
(Anamika) VIP Call Girls Navi Mumbai Call Now 8250077686 Navi Mumbai Escorts ...
(Anamika) VIP Call Girls Navi Mumbai Call Now 8250077686 Navi Mumbai Escorts ...(Anamika) VIP Call Girls Navi Mumbai Call Now 8250077686 Navi Mumbai Escorts ...
(Anamika) VIP Call Girls Navi Mumbai Call Now 8250077686 Navi Mumbai Escorts ...
 
WOMEN EMPOWERMENT women empowerment.pptx
WOMEN EMPOWERMENT women empowerment.pptxWOMEN EMPOWERMENT women empowerment.pptx
WOMEN EMPOWERMENT women empowerment.pptx
 
LC_YouSaidYes_NewBelieverBookletDone.pdf
LC_YouSaidYes_NewBelieverBookletDone.pdfLC_YouSaidYes_NewBelieverBookletDone.pdf
LC_YouSaidYes_NewBelieverBookletDone.pdf
 
2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)
 
Top Rated Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Pokemon Go... Unraveling the Conspiracy Theory
Pokemon Go... Unraveling the Conspiracy TheoryPokemon Go... Unraveling the Conspiracy Theory
Pokemon Go... Unraveling the Conspiracy Theory
 

How to become a hacker

  • 2. Hacker Glider_ Emblem The five-dots in-nine-squares diagram.
  • 3. What is A hacker
  • 4. The Jargon File contains a bunch of definitions of the term ‘hacker’, most having to do with technical adeptness and a delight in solving problems and overcoming limits.
  • 7. 1. The world is full of fascinating problems waiting to be solved.
  • 8. 2. No problem should ever have to be solved twice.
  • 9. 3. Boredom and drudgery are evil.
  • 10. look to the master, follow the master, walk with the master, see through the master, become the master.
  • 11. 4. Freedom is good.
  • 12. 5. Attitude is no substitute for competence.
  • 14. LEARN PROGRAM You need to learn how to think about programming problems in a general way, independent of any one language. HOW TO 1.
  • 15. 2. Get one of the open-source Unixes and learn to use and run it.
  • 16. 3. Learn how to use the World Wide Web and write HTML.
  • 17. 4. If you don't have functional English, learn it.
  • 19. You gain status and reputation, by giving away your time, your creativity, and the results of your skill.
  • 20. 1. Write open-source software_
  • 21. 2. Help test and debug open-source software_
  • 22. 3. Publish useful information_
  • 23. 4. Help keep the infrastructure working_
  • 24. 5. Serve the hacker culture itself_
  • 26. Contrary to popular myth, you don't have to be a nerd to be a hacker.
  • 27. many hackers have adopted the label ‘geek’ as a badge of pride — it's a way of declaring their independence from normal social expectations. <geek />
  • 29. Learn to write your native language well.
  • 30. Read science fiction. Go to science fiction conventions.
  • 32. Develop an analytical ear for music.
  • 35.
  • 36. CREDITS Pictures: Pictures: • http://bit.ly/h5pBKK • http://bit.ly/fqkabx • http://bit.ly/dMeh9w • http://bit.ly/evNQPJ • http://bit.ly/eATScd • http://bit.ly/dXRBgk • http://bit.ly/fs56sx • http://bit.ly/fs56sx • http://bit.ly/fGq7hW • http://bit.ly/ghev7g • http://bit.ly/fu59iO • http://bit.ly/fQDyVb • http://bit.ly/fUdzlo • http://bit.ly/f0t3ZW • http://bit.ly/gSMm6G • http://bit.ly/eZmOz3 • http://bit.ly/gpCrwZ • http://bit.ly/eUegq5 • http://bit.ly/e2povX • http://bit.ly/hFBmS4 • http://bit.ly/ihj8PJ • http://bit.ly/eXwgqo • http://bit.ly/e6xj2L • http://bit.ly/etby8Q • http://bit.ly/dKjEUZ • http://bit.ly/fSpRBM • Source of contents: http://www.catb.org/~esr/faqs/hacker-howto.html • Twitter Icon: http://freakyframes.deviantart.com/art/Twitter-Bird-127757230