SlideShare une entreprise Scribd logo
1  sur  36
{@pejman
{
Hacker       Glider_


    Emblem
             The five-dots
             in-nine-squares diagram.
What is   A
hacker
The Jargon File contains a bunch
of definitions of the term
‘hacker’, most having to do with
technical adeptness and a
delight in solving problems and
overcoming limits.
Hacker build things,
Crackers break them.
The hacker
attitude
1.
     The world is full of
     fascinating problems
     waiting to be solved.
2.   No problem should ever
     have to be solved twice.
3.   Boredom and drudgery
     are evil.
look to the master,
follow the master,
walk with the master,
see through the master,
become the master.
4.   Freedom is good.
5.   Attitude is no substitute
     for competence.
Basic
hacking
skills
LEARN
     PROGRAM
               You need to   learn how to
               think about   programming
               problems in   a general way,
               independent   of any one
               language.

     HOW
     TO




1.
2.
     Get one of the open-source
     Unixes and learn to use and
     run it.
3.   Learn how to use the World
     Wide Web and write HTML.
4.   If you don't have
     functional English,
     learn it.
Status in
the hacker
culture
You gain status and
reputation, by giving away
your time, your creativity,
and the results of your
skill.
1.   Write open-source
     software_
2.   Help test and debug
     open-source software_
3.   Publish useful
     information_
4.   Help keep the
     infrastructure working_
5.   Serve the hacker
     culture itself_
Hacker
nerd
connection
Contrary to popular
myth, you don't have to
be a nerd to be a
hacker.
many hackers have adopted
the label ‘geek’ as a badge
of pride — it's a way of
declaring their
independence from normal
social expectations.




  <geek />
Hacker
mindset
Learn to write your
native language well.
Read science fiction.
Go to science fiction
conventions.
Train in a
martial-arts form.
Develop an analytical ear
for music.
Study an actual
meditation discipline.
TWITTER
 @pejman
CREDITS
Pictures:                          Pictures:
• http://bit.ly/h5pBKK             • http://bit.ly/fqkabx
• http://bit.ly/dMeh9w             • http://bit.ly/evNQPJ
• http://bit.ly/eATScd             • http://bit.ly/dXRBgk
• http://bit.ly/fs56sx             • http://bit.ly/fs56sx
• http://bit.ly/fGq7hW             • http://bit.ly/ghev7g
• http://bit.ly/fu59iO             • http://bit.ly/fQDyVb
• http://bit.ly/fUdzlo             • http://bit.ly/f0t3ZW
• http://bit.ly/gSMm6G             • http://bit.ly/eZmOz3
• http://bit.ly/gpCrwZ             • http://bit.ly/eUegq5
• http://bit.ly/e2povX             • http://bit.ly/hFBmS4
• http://bit.ly/ihj8PJ             • http://bit.ly/eXwgqo
• http://bit.ly/e6xj2L             • http://bit.ly/etby8Q
• http://bit.ly/dKjEUZ             • http://bit.ly/fSpRBM

•   Source of contents:
    http://www.catb.org/~esr/faqs/hacker-howto.html
•   Twitter Icon:
    http://freakyframes.deviantart.com/art/Twitter-Bird-127757230

Contenu connexe

Tendances

Tendances (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Internet safety at work presentation
Internet safety at work presentationInternet safety at work presentation
Internet safety at work presentation
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Cyber security
Cyber securityCyber security
Cyber security
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Hacking
HackingHacking
Hacking
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Hacking
HackingHacking
Hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
Hacking Hacking
Hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Bug Bounty - Hackers Job
Bug Bounty - Hackers JobBug Bounty - Hackers Job
Bug Bounty - Hackers Job
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
HACKING
HACKINGHACKING
HACKING
 

En vedette

How To Become A Successful Hacker In Only 10 Years
How To Become A Successful Hacker In Only 10 YearsHow To Become A Successful Hacker In Only 10 Years
How To Become A Successful Hacker In Only 10 Yearsluke_bkk
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information SecurityAjay Dhamija
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
CEH-GEAR dataset (BHS2014 Birmingham)
CEH-GEAR dataset (BHS2014 Birmingham)CEH-GEAR dataset (BHS2014 Birmingham)
CEH-GEAR dataset (BHS2014 Birmingham)MalikoTanguy
 
Ethical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSEthical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSSifs India
 
Day3 Backup
Day3 BackupDay3 Backup
Day3 BackupJai4uk
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and HackingParth Makadiya
 
Hacking attitude : love, live, hack
Hacking attitude : love, live, hackHacking attitude : love, live, hack
Hacking attitude : love, live, hacknous sommes vivants
 
Discover Georgia- Why To Visit Georgia Country Presented By Forty Travels
Discover Georgia- Why To Visit Georgia Country Presented By Forty TravelsDiscover Georgia- Why To Visit Georgia Country Presented By Forty Travels
Discover Georgia- Why To Visit Georgia Country Presented By Forty TravelsForty Travels & Tours
 
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive MeasuresShubham Takode
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hackingsatish kumar
 
11 Ways to Hack Puppet for Fun and Productivity - Luke Kanies - Velocity 2012
11 Ways to Hack Puppet for Fun and Productivity - Luke Kanies - Velocity 201211 Ways to Hack Puppet for Fun and Productivity - Luke Kanies - Velocity 2012
11 Ways to Hack Puppet for Fun and Productivity - Luke Kanies - Velocity 2012Puppet
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
Research in internet_lecture_1
Research in internet_lecture_1Research in internet_lecture_1
Research in internet_lecture_1Sergey Panarin
 
How to Become an Internet Research Specialist
How to Become an Internet Research SpecialistHow to Become an Internet Research Specialist
How to Become an Internet Research SpecialistChinedum Azuh
 
Think Like A Growth Hacker
Think Like A Growth HackerThink Like A Growth Hacker
Think Like A Growth HackerTim Homuth
 

En vedette (20)

How To Become A Successful Hacker In Only 10 Years
How To Become A Successful Hacker In Only 10 YearsHow To Become A Successful Hacker In Only 10 Years
How To Become A Successful Hacker In Only 10 Years
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
How to Become a Hacker?
How to Become a Hacker?How to Become a Hacker?
How to Become a Hacker?
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Georgia1
Georgia1Georgia1
Georgia1
 
CEH-GEAR dataset (BHS2014 Birmingham)
CEH-GEAR dataset (BHS2014 Birmingham)CEH-GEAR dataset (BHS2014 Birmingham)
CEH-GEAR dataset (BHS2014 Birmingham)
 
Ethical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSEthical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFS
 
Day3 Backup
Day3 BackupDay3 Backup
Day3 Backup
 
24 happiness hacker
24 happiness hacker24 happiness hacker
24 happiness hacker
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
 
Hacking attitude : love, live, hack
Hacking attitude : love, live, hackHacking attitude : love, live, hack
Hacking attitude : love, live, hack
 
Discover Georgia- Why To Visit Georgia Country Presented By Forty Travels
Discover Georgia- Why To Visit Georgia Country Presented By Forty TravelsDiscover Georgia- Why To Visit Georgia Country Presented By Forty Travels
Discover Georgia- Why To Visit Georgia Country Presented By Forty Travels
 
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive Measures
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
11 Ways to Hack Puppet for Fun and Productivity - Luke Kanies - Velocity 2012
11 Ways to Hack Puppet for Fun and Productivity - Luke Kanies - Velocity 201211 Ways to Hack Puppet for Fun and Productivity - Luke Kanies - Velocity 2012
11 Ways to Hack Puppet for Fun and Productivity - Luke Kanies - Velocity 2012
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Research in internet_lecture_1
Research in internet_lecture_1Research in internet_lecture_1
Research in internet_lecture_1
 
How to Become an Internet Research Specialist
How to Become an Internet Research SpecialistHow to Become an Internet Research Specialist
How to Become an Internet Research Specialist
 
Think Like A Growth Hacker
Think Like A Growth HackerThink Like A Growth Hacker
Think Like A Growth Hacker
 

Similaire à How to become a hacker

Lecture 9 - New Paradigms, New Technologies, and Your Asset Creation - 6 Ma...
Lecture 9 -   New Paradigms, New Technologies, and Your Asset Creation - 6 Ma...Lecture 9 -   New Paradigms, New Technologies, and Your Asset Creation - 6 Ma...
Lecture 9 - New Paradigms, New Technologies, and Your Asset Creation - 6 Ma...Fahri Karakas
 
Personalized Learning IAGC 2016
Personalized Learning IAGC 2016Personalized Learning IAGC 2016
Personalized Learning IAGC 2016Brian Housand
 
OpenFest 2012 : Leveraging the public internet
OpenFest 2012 : Leveraging the public internetOpenFest 2012 : Leveraging the public internet
OpenFest 2012 : Leveraging the public internettkisason
 
Hitchhikers guide to OpenSim calongne
Hitchhikers guide to OpenSim calongneHitchhikers guide to OpenSim calongne
Hitchhikers guide to OpenSim calongneCynthia Calongne
 
DIY Applied Machine Learning
DIY Applied Machine LearningDIY Applied Machine Learning
DIY Applied Machine LearningTarek Hoteit
 
Inspiring Kids to Code Using Scratch and Other Tools
Inspiring Kids to Code Using Scratch and Other ToolsInspiring Kids to Code Using Scratch and Other Tools
Inspiring Kids to Code Using Scratch and Other ToolsSt. Petersburg College
 
Inspiring Kids to Code Using Scratch and Other Tools
Inspiring Kids to Code Using Scratch and Other ToolsInspiring Kids to Code Using Scratch and Other Tools
Inspiring Kids to Code Using Scratch and Other ToolsChad Mairn
 
Personalized Learning indiana
Personalized Learning indianaPersonalized Learning indiana
Personalized Learning indianaBrian Housand
 
Bdd training v5.2.0 - public
Bdd training   v5.2.0 - publicBdd training   v5.2.0 - public
Bdd training v5.2.0 - publicArnauld Loyer
 
LEFT TO THEIR OWN DEVICES
LEFT TO THEIR OWN DEVICES LEFT TO THEIR OWN DEVICES
LEFT TO THEIR OWN DEVICES Brian Housand
 
A detailed introduction to gamification - Brisbane Web Design Meetup
A detailed introduction to gamification - Brisbane Web Design MeetupA detailed introduction to gamification - Brisbane Web Design Meetup
A detailed introduction to gamification - Brisbane Web Design MeetupZac Fitz-Walter
 
Majoran Distillery pitch workshop aug 2013
Majoran Distillery pitch workshop aug 2013Majoran Distillery pitch workshop aug 2013
Majoran Distillery pitch workshop aug 2013alan jones
 
Personalized Learning Lagniappe
Personalized Learning LagniappePersonalized Learning Lagniappe
Personalized Learning LagniappeBrian Housand
 
Crowd Media's Guide to Remarkable Community Management
Crowd Media's Guide to Remarkable Community ManagementCrowd Media's Guide to Remarkable Community Management
Crowd Media's Guide to Remarkable Community ManagementCrowd Media Ltd
 
Creative Outlets Minnesota
Creative Outlets MinnesotaCreative Outlets Minnesota
Creative Outlets MinnesotaBrian Housand
 

Similaire à How to become a hacker (20)

Lecture 9 - New Paradigms, New Technologies, and Your Asset Creation - 6 Ma...
Lecture 9 -   New Paradigms, New Technologies, and Your Asset Creation - 6 Ma...Lecture 9 -   New Paradigms, New Technologies, and Your Asset Creation - 6 Ma...
Lecture 9 - New Paradigms, New Technologies, and Your Asset Creation - 6 Ma...
 
What Art can teach you
What Art can teach youWhat Art can teach you
What Art can teach you
 
Personalized Learning IAGC 2016
Personalized Learning IAGC 2016Personalized Learning IAGC 2016
Personalized Learning IAGC 2016
 
Science and Technology - Englishpost.org
Science and Technology - Englishpost.orgScience and Technology - Englishpost.org
Science and Technology - Englishpost.org
 
OpenFest 2012 : Leveraging the public internet
OpenFest 2012 : Leveraging the public internetOpenFest 2012 : Leveraging the public internet
OpenFest 2012 : Leveraging the public internet
 
Hitchhikers guide to OpenSim calongne
Hitchhikers guide to OpenSim calongneHitchhikers guide to OpenSim calongne
Hitchhikers guide to OpenSim calongne
 
DIY Applied Machine Learning
DIY Applied Machine LearningDIY Applied Machine Learning
DIY Applied Machine Learning
 
Inspiring Kids to Code Using Scratch and Other Tools
Inspiring Kids to Code Using Scratch and Other ToolsInspiring Kids to Code Using Scratch and Other Tools
Inspiring Kids to Code Using Scratch and Other Tools
 
Inspiring Kids to Code Using Scratch and Other Tools
Inspiring Kids to Code Using Scratch and Other ToolsInspiring Kids to Code Using Scratch and Other Tools
Inspiring Kids to Code Using Scratch and Other Tools
 
Personalized Learning indiana
Personalized Learning indianaPersonalized Learning indiana
Personalized Learning indiana
 
Bdd training v5.2.0 - public
Bdd training   v5.2.0 - publicBdd training   v5.2.0 - public
Bdd training v5.2.0 - public
 
LEFT TO THEIR OWN DEVICES
LEFT TO THEIR OWN DEVICES LEFT TO THEIR OWN DEVICES
LEFT TO THEIR OWN DEVICES
 
Doonish
DoonishDoonish
Doonish
 
Doonish
DoonishDoonish
Doonish
 
A detailed introduction to gamification - Brisbane Web Design Meetup
A detailed introduction to gamification - Brisbane Web Design MeetupA detailed introduction to gamification - Brisbane Web Design Meetup
A detailed introduction to gamification - Brisbane Web Design Meetup
 
How Not to SUCK at Social Media
How Not to SUCK at Social MediaHow Not to SUCK at Social Media
How Not to SUCK at Social Media
 
Majoran Distillery pitch workshop aug 2013
Majoran Distillery pitch workshop aug 2013Majoran Distillery pitch workshop aug 2013
Majoran Distillery pitch workshop aug 2013
 
Personalized Learning Lagniappe
Personalized Learning LagniappePersonalized Learning Lagniappe
Personalized Learning Lagniappe
 
Crowd Media's Guide to Remarkable Community Management
Crowd Media's Guide to Remarkable Community ManagementCrowd Media's Guide to Remarkable Community Management
Crowd Media's Guide to Remarkable Community Management
 
Creative Outlets Minnesota
Creative Outlets MinnesotaCreative Outlets Minnesota
Creative Outlets Minnesota
 

Plus de Pejman Dashtinejad

گفتگو من با کلیک روزنامه جام جم درباره کارآفرینی
گفتگو من با کلیک روزنامه جام جم درباره کارآفرینیگفتگو من با کلیک روزنامه جام جم درباره کارآفرینی
گفتگو من با کلیک روزنامه جام جم درباره کارآفرینیPejman Dashtinejad
 
خدمات خانه کارآفرینی فانتازیو
 خدمات خانه کارآفرینی فانتازیو خدمات خانه کارآفرینی فانتازیو
خدمات خانه کارآفرینی فانتازیوPejman Dashtinejad
 
استارتاپهای اینترنتی
استارتاپهای اینترنتیاستارتاپهای اینترنتی
استارتاپهای اینترنتیPejman Dashtinejad
 
از ایده تا اجرا و نگاهی به شتاب دهنده ها
از ایده تا اجرا و نگاهی به شتاب دهنده هااز ایده تا اجرا و نگاهی به شتاب دهنده ها
از ایده تا اجرا و نگاهی به شتاب دهنده هاPejman Dashtinejad
 
داده های پارازیتی
داده های پارازیتیداده های پارازیتی
داده های پارازیتیPejman Dashtinejad
 
هسته اصلی فعالیت شرکت نوپا
هسته اصلی فعالیت شرکت نوپاهسته اصلی فعالیت شرکت نوپا
هسته اصلی فعالیت شرکت نوپاPejman Dashtinejad
 
متن مصاحبه با هفته نامه فارغ التحصیلان
متن مصاحبه با هفته نامه فارغ التحصیلانمتن مصاحبه با هفته نامه فارغ التحصیلان
متن مصاحبه با هفته نامه فارغ التحصیلانPejman Dashtinejad
 
روی جلد هفته نامه فارغ التحصیلان
روی جلد هفته نامه فارغ التحصیلان روی جلد هفته نامه فارغ التحصیلان
روی جلد هفته نامه فارغ التحصیلان Pejman Dashtinejad
 
گوگل؛ مدیریت و ابزارها
گوگل؛ مدیریت و ابزارهاگوگل؛ مدیریت و ابزارها
گوگل؛ مدیریت و ابزارهاPejman Dashtinejad
 
گوگل؛ نگاهی از درون
گوگل؛ نگاهی از درونگوگل؛ نگاهی از درون
گوگل؛ نگاهی از درونPejman Dashtinejad
 

Plus de Pejman Dashtinejad (11)

گفتگو من با کلیک روزنامه جام جم درباره کارآفرینی
گفتگو من با کلیک روزنامه جام جم درباره کارآفرینیگفتگو من با کلیک روزنامه جام جم درباره کارآفرینی
گفتگو من با کلیک روزنامه جام جم درباره کارآفرینی
 
خدمات خانه کارآفرینی فانتازیو
 خدمات خانه کارآفرینی فانتازیو خدمات خانه کارآفرینی فانتازیو
خدمات خانه کارآفرینی فانتازیو
 
استارتاپهای اینترنتی
استارتاپهای اینترنتیاستارتاپهای اینترنتی
استارتاپهای اینترنتی
 
از ایده تا اجرا و نگاهی به شتاب دهنده ها
از ایده تا اجرا و نگاهی به شتاب دهنده هااز ایده تا اجرا و نگاهی به شتاب دهنده ها
از ایده تا اجرا و نگاهی به شتاب دهنده ها
 
داده های پارازیتی
داده های پارازیتیداده های پارازیتی
داده های پارازیتی
 
هسته اصلی فعالیت شرکت نوپا
هسته اصلی فعالیت شرکت نوپاهسته اصلی فعالیت شرکت نوپا
هسته اصلی فعالیت شرکت نوپا
 
متن مصاحبه با هفته نامه فارغ التحصیلان
متن مصاحبه با هفته نامه فارغ التحصیلانمتن مصاحبه با هفته نامه فارغ التحصیلان
متن مصاحبه با هفته نامه فارغ التحصیلان
 
روی جلد هفته نامه فارغ التحصیلان
روی جلد هفته نامه فارغ التحصیلان روی جلد هفته نامه فارغ التحصیلان
روی جلد هفته نامه فارغ التحصیلان
 
گوگل؛ مدیریت و ابزارها
گوگل؛ مدیریت و ابزارهاگوگل؛ مدیریت و ابزارها
گوگل؛ مدیریت و ابزارها
 
گوگل؛ نگاهی از درون
گوگل؛ نگاهی از درونگوگل؛ نگاهی از درون
گوگل؛ نگاهی از درون
 
از ایده تا اجرا
از ایده تا اجرااز ایده تا اجرا
از ایده تا اجرا
 

Dernier

The 5 sec rule - Mel Robins (Hindi Summary)
The 5 sec rule - Mel Robins (Hindi Summary)The 5 sec rule - Mel Robins (Hindi Summary)
The 5 sec rule - Mel Robins (Hindi Summary)Shakti Savarn
 
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...JeylaisaManabat1
 
ingrediendts needed in preparing dessert and sweet sauces
ingrediendts needed in preparing dessert and sweet saucesingrediendts needed in preparing dessert and sweet sauces
ingrediendts needed in preparing dessert and sweet saucesJessicaEscao
 
integrity in personal relationship (1).pdf
integrity in personal relationship (1).pdfintegrity in personal relationship (1).pdf
integrity in personal relationship (1).pdfAmitRout25
 
Call Girls Dubai O525547819 Favor Dubai Call Girls Agency
Call Girls Dubai O525547819 Favor Dubai Call Girls AgencyCall Girls Dubai O525547819 Favor Dubai Call Girls Agency
Call Girls Dubai O525547819 Favor Dubai Call Girls Agencykojalkojal131
 
Benefits of Co working & Shared office space in India
Benefits of Co working & Shared office space in IndiaBenefits of Co working & Shared office space in India
Benefits of Co working & Shared office space in IndiaBrantfordIndia
 
English basic for beginners Future tenses .pdf
English basic for beginners Future tenses .pdfEnglish basic for beginners Future tenses .pdf
English basic for beginners Future tenses .pdfbromerom1
 
Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?
Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?
Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?Mikko Kangassalo
 
Spiritual Life Quote from Shiva Negi
Spiritual Life Quote from Shiva Negi Spiritual Life Quote from Shiva Negi
Spiritual Life Quote from Shiva Negi OneDay18
 

Dernier (9)

The 5 sec rule - Mel Robins (Hindi Summary)
The 5 sec rule - Mel Robins (Hindi Summary)The 5 sec rule - Mel Robins (Hindi Summary)
The 5 sec rule - Mel Robins (Hindi Summary)
 
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
 
ingrediendts needed in preparing dessert and sweet sauces
ingrediendts needed in preparing dessert and sweet saucesingrediendts needed in preparing dessert and sweet sauces
ingrediendts needed in preparing dessert and sweet sauces
 
integrity in personal relationship (1).pdf
integrity in personal relationship (1).pdfintegrity in personal relationship (1).pdf
integrity in personal relationship (1).pdf
 
Call Girls Dubai O525547819 Favor Dubai Call Girls Agency
Call Girls Dubai O525547819 Favor Dubai Call Girls AgencyCall Girls Dubai O525547819 Favor Dubai Call Girls Agency
Call Girls Dubai O525547819 Favor Dubai Call Girls Agency
 
Benefits of Co working & Shared office space in India
Benefits of Co working & Shared office space in IndiaBenefits of Co working & Shared office space in India
Benefits of Co working & Shared office space in India
 
English basic for beginners Future tenses .pdf
English basic for beginners Future tenses .pdfEnglish basic for beginners Future tenses .pdf
English basic for beginners Future tenses .pdf
 
Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?
Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?
Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?
 
Spiritual Life Quote from Shiva Negi
Spiritual Life Quote from Shiva Negi Spiritual Life Quote from Shiva Negi
Spiritual Life Quote from Shiva Negi
 

How to become a hacker

  • 2. Hacker Glider_ Emblem The five-dots in-nine-squares diagram.
  • 3. What is A hacker
  • 4. The Jargon File contains a bunch of definitions of the term ‘hacker’, most having to do with technical adeptness and a delight in solving problems and overcoming limits.
  • 7. 1. The world is full of fascinating problems waiting to be solved.
  • 8. 2. No problem should ever have to be solved twice.
  • 9. 3. Boredom and drudgery are evil.
  • 10. look to the master, follow the master, walk with the master, see through the master, become the master.
  • 11. 4. Freedom is good.
  • 12. 5. Attitude is no substitute for competence.
  • 14. LEARN PROGRAM You need to learn how to think about programming problems in a general way, independent of any one language. HOW TO 1.
  • 15. 2. Get one of the open-source Unixes and learn to use and run it.
  • 16. 3. Learn how to use the World Wide Web and write HTML.
  • 17. 4. If you don't have functional English, learn it.
  • 19. You gain status and reputation, by giving away your time, your creativity, and the results of your skill.
  • 20. 1. Write open-source software_
  • 21. 2. Help test and debug open-source software_
  • 22. 3. Publish useful information_
  • 23. 4. Help keep the infrastructure working_
  • 24. 5. Serve the hacker culture itself_
  • 26. Contrary to popular myth, you don't have to be a nerd to be a hacker.
  • 27. many hackers have adopted the label ‘geek’ as a badge of pride — it's a way of declaring their independence from normal social expectations. <geek />
  • 29. Learn to write your native language well.
  • 30. Read science fiction. Go to science fiction conventions.
  • 32. Develop an analytical ear for music.
  • 35.
  • 36. CREDITS Pictures: Pictures: • http://bit.ly/h5pBKK • http://bit.ly/fqkabx • http://bit.ly/dMeh9w • http://bit.ly/evNQPJ • http://bit.ly/eATScd • http://bit.ly/dXRBgk • http://bit.ly/fs56sx • http://bit.ly/fs56sx • http://bit.ly/fGq7hW • http://bit.ly/ghev7g • http://bit.ly/fu59iO • http://bit.ly/fQDyVb • http://bit.ly/fUdzlo • http://bit.ly/f0t3ZW • http://bit.ly/gSMm6G • http://bit.ly/eZmOz3 • http://bit.ly/gpCrwZ • http://bit.ly/eUegq5 • http://bit.ly/e2povX • http://bit.ly/hFBmS4 • http://bit.ly/ihj8PJ • http://bit.ly/eXwgqo • http://bit.ly/e6xj2L • http://bit.ly/etby8Q • http://bit.ly/dKjEUZ • http://bit.ly/fSpRBM • Source of contents: http://www.catb.org/~esr/faqs/hacker-howto.html • Twitter Icon: http://freakyframes.deviantart.com/art/Twitter-Bird-127757230