SlideShare ist ein Scribd-Unternehmen logo
1 von 36
{@pejman
{
Hacker       Glider_


    Emblem
             The five-dots
             in-nine-squares diagram.
What is   A
hacker
The Jargon File contains a bunch
of definitions of the term
‘hacker’, most having to do with
technical adeptness and a
delight in solving problems and
overcoming limits.
Hacker build things,
Crackers break them.
The hacker
attitude
1.
     The world is full of
     fascinating problems
     waiting to be solved.
2.   No problem should ever
     have to be solved twice.
3.   Boredom and drudgery
     are evil.
look to the master,
follow the master,
walk with the master,
see through the master,
become the master.
4.   Freedom is good.
5.   Attitude is no substitute
     for competence.
Basic
hacking
skills
LEARN
     PROGRAM
               You need to   learn how to
               think about   programming
               problems in   a general way,
               independent   of any one
               language.

     HOW
     TO




1.
2.
     Get one of the open-source
     Unixes and learn to use and
     run it.
3.   Learn how to use the World
     Wide Web and write HTML.
4.   If you don't have
     functional English,
     learn it.
Status in
the hacker
culture
You gain status and
reputation, by giving away
your time, your creativity,
and the results of your
skill.
1.   Write open-source
     software_
2.   Help test and debug
     open-source software_
3.   Publish useful
     information_
4.   Help keep the
     infrastructure working_
5.   Serve the hacker
     culture itself_
Hacker
nerd
connection
Contrary to popular
myth, you don't have to
be a nerd to be a
hacker.
many hackers have adopted
the label ‘geek’ as a badge
of pride — it's a way of
declaring their
independence from normal
social expectations.




  <geek />
Hacker
mindset
Learn to write your
native language well.
Read science fiction.
Go to science fiction
conventions.
Train in a
martial-arts form.
Develop an analytical ear
for music.
Study an actual
meditation discipline.
TWITTER
 @pejman
CREDITS
Pictures:                          Pictures:
• http://bit.ly/h5pBKK             • http://bit.ly/fqkabx
• http://bit.ly/dMeh9w             • http://bit.ly/evNQPJ
• http://bit.ly/eATScd             • http://bit.ly/dXRBgk
• http://bit.ly/fs56sx             • http://bit.ly/fs56sx
• http://bit.ly/fGq7hW             • http://bit.ly/ghev7g
• http://bit.ly/fu59iO             • http://bit.ly/fQDyVb
• http://bit.ly/fUdzlo             • http://bit.ly/f0t3ZW
• http://bit.ly/gSMm6G             • http://bit.ly/eZmOz3
• http://bit.ly/gpCrwZ             • http://bit.ly/eUegq5
• http://bit.ly/e2povX             • http://bit.ly/hFBmS4
• http://bit.ly/ihj8PJ             • http://bit.ly/eXwgqo
• http://bit.ly/e6xj2L             • http://bit.ly/etby8Q
• http://bit.ly/dKjEUZ             • http://bit.ly/fSpRBM

•   Source of contents:
    http://www.catb.org/~esr/faqs/hacker-howto.html
•   Twitter Icon:
    http://freakyframes.deviantart.com/art/Twitter-Bird-127757230

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application SecurityAbdul Wahid
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical HackingDivyank Jindal
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingNeel Kamal
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Amit Tyagi
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1ShivamSharma909
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...Edureka!
 
Cyber Domain Security
Cyber Domain SecurityCyber Domain Security
Cyber Domain SecurityICSA, LLC
 

Was ist angesagt? (20)

Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Security testing
Security testingSecurity testing
Security testing
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Cyber Domain Security
Cyber Domain SecurityCyber Domain Security
Cyber Domain Security
 

Andere mochten auch

How To Become A Successful Hacker In Only 10 Years
How To Become A Successful Hacker In Only 10 YearsHow To Become A Successful Hacker In Only 10 Years
How To Become A Successful Hacker In Only 10 Yearsluke_bkk
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information SecurityAjay Dhamija
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
CEH-GEAR dataset (BHS2014 Birmingham)
CEH-GEAR dataset (BHS2014 Birmingham)CEH-GEAR dataset (BHS2014 Birmingham)
CEH-GEAR dataset (BHS2014 Birmingham)MalikoTanguy
 
Ethical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSEthical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSSifs India
 
Day3 Backup
Day3 BackupDay3 Backup
Day3 BackupJai4uk
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and HackingParth Makadiya
 
Hacking attitude : love, live, hack
Hacking attitude : love, live, hackHacking attitude : love, live, hack
Hacking attitude : love, live, hacknous sommes vivants
 
Discover Georgia- Why To Visit Georgia Country Presented By Forty Travels
Discover Georgia- Why To Visit Georgia Country Presented By Forty TravelsDiscover Georgia- Why To Visit Georgia Country Presented By Forty Travels
Discover Georgia- Why To Visit Georgia Country Presented By Forty TravelsForty Travels & Tours
 
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive MeasuresShubham Takode
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hackingsatish kumar
 
11 Ways to Hack Puppet for Fun and Productivity - Luke Kanies - Velocity 2012
11 Ways to Hack Puppet for Fun and Productivity - Luke Kanies - Velocity 201211 Ways to Hack Puppet for Fun and Productivity - Luke Kanies - Velocity 2012
11 Ways to Hack Puppet for Fun and Productivity - Luke Kanies - Velocity 2012Puppet
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
Research in internet_lecture_1
Research in internet_lecture_1Research in internet_lecture_1
Research in internet_lecture_1Sergey Panarin
 
How to Become an Internet Research Specialist
How to Become an Internet Research SpecialistHow to Become an Internet Research Specialist
How to Become an Internet Research SpecialistChinedum Azuh
 
Think Like A Growth Hacker
Think Like A Growth HackerThink Like A Growth Hacker
Think Like A Growth HackerTim Homuth
 

Andere mochten auch (20)

How To Become A Successful Hacker In Only 10 Years
How To Become A Successful Hacker In Only 10 YearsHow To Become A Successful Hacker In Only 10 Years
How To Become A Successful Hacker In Only 10 Years
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
How to Become a Hacker?
How to Become a Hacker?How to Become a Hacker?
How to Become a Hacker?
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Georgia1
Georgia1Georgia1
Georgia1
 
CEH-GEAR dataset (BHS2014 Birmingham)
CEH-GEAR dataset (BHS2014 Birmingham)CEH-GEAR dataset (BHS2014 Birmingham)
CEH-GEAR dataset (BHS2014 Birmingham)
 
Ethical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSEthical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFS
 
Day3 Backup
Day3 BackupDay3 Backup
Day3 Backup
 
24 happiness hacker
24 happiness hacker24 happiness hacker
24 happiness hacker
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
 
Hacking attitude : love, live, hack
Hacking attitude : love, live, hackHacking attitude : love, live, hack
Hacking attitude : love, live, hack
 
Discover Georgia- Why To Visit Georgia Country Presented By Forty Travels
Discover Georgia- Why To Visit Georgia Country Presented By Forty TravelsDiscover Georgia- Why To Visit Georgia Country Presented By Forty Travels
Discover Georgia- Why To Visit Georgia Country Presented By Forty Travels
 
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive Measures
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
11 Ways to Hack Puppet for Fun and Productivity - Luke Kanies - Velocity 2012
11 Ways to Hack Puppet for Fun and Productivity - Luke Kanies - Velocity 201211 Ways to Hack Puppet for Fun and Productivity - Luke Kanies - Velocity 2012
11 Ways to Hack Puppet for Fun and Productivity - Luke Kanies - Velocity 2012
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Research in internet_lecture_1
Research in internet_lecture_1Research in internet_lecture_1
Research in internet_lecture_1
 
How to Become an Internet Research Specialist
How to Become an Internet Research SpecialistHow to Become an Internet Research Specialist
How to Become an Internet Research Specialist
 
Think Like A Growth Hacker
Think Like A Growth HackerThink Like A Growth Hacker
Think Like A Growth Hacker
 

Ähnlich wie How to become a hacker

Lecture 9 - New Paradigms, New Technologies, and Your Asset Creation - 6 Ma...
Lecture 9 -   New Paradigms, New Technologies, and Your Asset Creation - 6 Ma...Lecture 9 -   New Paradigms, New Technologies, and Your Asset Creation - 6 Ma...
Lecture 9 - New Paradigms, New Technologies, and Your Asset Creation - 6 Ma...Fahri Karakas
 
Personalized Learning IAGC 2016
Personalized Learning IAGC 2016Personalized Learning IAGC 2016
Personalized Learning IAGC 2016Brian Housand
 
OpenFest 2012 : Leveraging the public internet
OpenFest 2012 : Leveraging the public internetOpenFest 2012 : Leveraging the public internet
OpenFest 2012 : Leveraging the public internettkisason
 
Hitchhikers guide to OpenSim calongne
Hitchhikers guide to OpenSim calongneHitchhikers guide to OpenSim calongne
Hitchhikers guide to OpenSim calongneCynthia Calongne
 
DIY Applied Machine Learning
DIY Applied Machine LearningDIY Applied Machine Learning
DIY Applied Machine LearningTarek Hoteit
 
Inspiring Kids to Code Using Scratch and Other Tools
Inspiring Kids to Code Using Scratch and Other ToolsInspiring Kids to Code Using Scratch and Other Tools
Inspiring Kids to Code Using Scratch and Other ToolsSt. Petersburg College
 
Inspiring Kids to Code Using Scratch and Other Tools
Inspiring Kids to Code Using Scratch and Other ToolsInspiring Kids to Code Using Scratch and Other Tools
Inspiring Kids to Code Using Scratch and Other ToolsChad Mairn
 
Personalized Learning indiana
Personalized Learning indianaPersonalized Learning indiana
Personalized Learning indianaBrian Housand
 
Bdd training v5.2.0 - public
Bdd training   v5.2.0 - publicBdd training   v5.2.0 - public
Bdd training v5.2.0 - publicArnauld Loyer
 
LEFT TO THEIR OWN DEVICES
LEFT TO THEIR OWN DEVICES LEFT TO THEIR OWN DEVICES
LEFT TO THEIR OWN DEVICES Brian Housand
 
A detailed introduction to gamification - Brisbane Web Design Meetup
A detailed introduction to gamification - Brisbane Web Design MeetupA detailed introduction to gamification - Brisbane Web Design Meetup
A detailed introduction to gamification - Brisbane Web Design MeetupZac Fitz-Walter
 
Majoran Distillery pitch workshop aug 2013
Majoran Distillery pitch workshop aug 2013Majoran Distillery pitch workshop aug 2013
Majoran Distillery pitch workshop aug 2013alan jones
 
Personalized Learning Lagniappe
Personalized Learning LagniappePersonalized Learning Lagniappe
Personalized Learning LagniappeBrian Housand
 
Crowd Media's Guide to Remarkable Community Management
Crowd Media's Guide to Remarkable Community ManagementCrowd Media's Guide to Remarkable Community Management
Crowd Media's Guide to Remarkable Community ManagementCrowd Media Ltd
 
Creative Outlets Minnesota
Creative Outlets MinnesotaCreative Outlets Minnesota
Creative Outlets MinnesotaBrian Housand
 

Ähnlich wie How to become a hacker (20)

Lecture 9 - New Paradigms, New Technologies, and Your Asset Creation - 6 Ma...
Lecture 9 -   New Paradigms, New Technologies, and Your Asset Creation - 6 Ma...Lecture 9 -   New Paradigms, New Technologies, and Your Asset Creation - 6 Ma...
Lecture 9 - New Paradigms, New Technologies, and Your Asset Creation - 6 Ma...
 
What Art can teach you
What Art can teach youWhat Art can teach you
What Art can teach you
 
Personalized Learning IAGC 2016
Personalized Learning IAGC 2016Personalized Learning IAGC 2016
Personalized Learning IAGC 2016
 
Science and Technology - Englishpost.org
Science and Technology - Englishpost.orgScience and Technology - Englishpost.org
Science and Technology - Englishpost.org
 
OpenFest 2012 : Leveraging the public internet
OpenFest 2012 : Leveraging the public internetOpenFest 2012 : Leveraging the public internet
OpenFest 2012 : Leveraging the public internet
 
Hitchhikers guide to OpenSim calongne
Hitchhikers guide to OpenSim calongneHitchhikers guide to OpenSim calongne
Hitchhikers guide to OpenSim calongne
 
DIY Applied Machine Learning
DIY Applied Machine LearningDIY Applied Machine Learning
DIY Applied Machine Learning
 
Inspiring Kids to Code Using Scratch and Other Tools
Inspiring Kids to Code Using Scratch and Other ToolsInspiring Kids to Code Using Scratch and Other Tools
Inspiring Kids to Code Using Scratch and Other Tools
 
Inspiring Kids to Code Using Scratch and Other Tools
Inspiring Kids to Code Using Scratch and Other ToolsInspiring Kids to Code Using Scratch and Other Tools
Inspiring Kids to Code Using Scratch and Other Tools
 
Personalized Learning indiana
Personalized Learning indianaPersonalized Learning indiana
Personalized Learning indiana
 
Bdd training v5.2.0 - public
Bdd training   v5.2.0 - publicBdd training   v5.2.0 - public
Bdd training v5.2.0 - public
 
LEFT TO THEIR OWN DEVICES
LEFT TO THEIR OWN DEVICES LEFT TO THEIR OWN DEVICES
LEFT TO THEIR OWN DEVICES
 
Doonish
DoonishDoonish
Doonish
 
Doonish
DoonishDoonish
Doonish
 
A detailed introduction to gamification - Brisbane Web Design Meetup
A detailed introduction to gamification - Brisbane Web Design MeetupA detailed introduction to gamification - Brisbane Web Design Meetup
A detailed introduction to gamification - Brisbane Web Design Meetup
 
How Not to SUCK at Social Media
How Not to SUCK at Social MediaHow Not to SUCK at Social Media
How Not to SUCK at Social Media
 
Majoran Distillery pitch workshop aug 2013
Majoran Distillery pitch workshop aug 2013Majoran Distillery pitch workshop aug 2013
Majoran Distillery pitch workshop aug 2013
 
Personalized Learning Lagniappe
Personalized Learning LagniappePersonalized Learning Lagniappe
Personalized Learning Lagniappe
 
Crowd Media's Guide to Remarkable Community Management
Crowd Media's Guide to Remarkable Community ManagementCrowd Media's Guide to Remarkable Community Management
Crowd Media's Guide to Remarkable Community Management
 
Creative Outlets Minnesota
Creative Outlets MinnesotaCreative Outlets Minnesota
Creative Outlets Minnesota
 

Mehr von Pejman Dashtinejad

گفتگو من با کلیک روزنامه جام جم درباره کارآفرینی
گفتگو من با کلیک روزنامه جام جم درباره کارآفرینیگفتگو من با کلیک روزنامه جام جم درباره کارآفرینی
گفتگو من با کلیک روزنامه جام جم درباره کارآفرینیPejman Dashtinejad
 
خدمات خانه کارآفرینی فانتازیو
 خدمات خانه کارآفرینی فانتازیو خدمات خانه کارآفرینی فانتازیو
خدمات خانه کارآفرینی فانتازیوPejman Dashtinejad
 
استارتاپهای اینترنتی
استارتاپهای اینترنتیاستارتاپهای اینترنتی
استارتاپهای اینترنتیPejman Dashtinejad
 
از ایده تا اجرا و نگاهی به شتاب دهنده ها
از ایده تا اجرا و نگاهی به شتاب دهنده هااز ایده تا اجرا و نگاهی به شتاب دهنده ها
از ایده تا اجرا و نگاهی به شتاب دهنده هاPejman Dashtinejad
 
داده های پارازیتی
داده های پارازیتیداده های پارازیتی
داده های پارازیتیPejman Dashtinejad
 
هسته اصلی فعالیت شرکت نوپا
هسته اصلی فعالیت شرکت نوپاهسته اصلی فعالیت شرکت نوپا
هسته اصلی فعالیت شرکت نوپاPejman Dashtinejad
 
متن مصاحبه با هفته نامه فارغ التحصیلان
متن مصاحبه با هفته نامه فارغ التحصیلانمتن مصاحبه با هفته نامه فارغ التحصیلان
متن مصاحبه با هفته نامه فارغ التحصیلانPejman Dashtinejad
 
روی جلد هفته نامه فارغ التحصیلان
روی جلد هفته نامه فارغ التحصیلان روی جلد هفته نامه فارغ التحصیلان
روی جلد هفته نامه فارغ التحصیلان Pejman Dashtinejad
 
گوگل؛ مدیریت و ابزارها
گوگل؛ مدیریت و ابزارهاگوگل؛ مدیریت و ابزارها
گوگل؛ مدیریت و ابزارهاPejman Dashtinejad
 
گوگل؛ نگاهی از درون
گوگل؛ نگاهی از درونگوگل؛ نگاهی از درون
گوگل؛ نگاهی از درونPejman Dashtinejad
 

Mehr von Pejman Dashtinejad (11)

گفتگو من با کلیک روزنامه جام جم درباره کارآفرینی
گفتگو من با کلیک روزنامه جام جم درباره کارآفرینیگفتگو من با کلیک روزنامه جام جم درباره کارآفرینی
گفتگو من با کلیک روزنامه جام جم درباره کارآفرینی
 
خدمات خانه کارآفرینی فانتازیو
 خدمات خانه کارآفرینی فانتازیو خدمات خانه کارآفرینی فانتازیو
خدمات خانه کارآفرینی فانتازیو
 
استارتاپهای اینترنتی
استارتاپهای اینترنتیاستارتاپهای اینترنتی
استارتاپهای اینترنتی
 
از ایده تا اجرا و نگاهی به شتاب دهنده ها
از ایده تا اجرا و نگاهی به شتاب دهنده هااز ایده تا اجرا و نگاهی به شتاب دهنده ها
از ایده تا اجرا و نگاهی به شتاب دهنده ها
 
داده های پارازیتی
داده های پارازیتیداده های پارازیتی
داده های پارازیتی
 
هسته اصلی فعالیت شرکت نوپا
هسته اصلی فعالیت شرکت نوپاهسته اصلی فعالیت شرکت نوپا
هسته اصلی فعالیت شرکت نوپا
 
متن مصاحبه با هفته نامه فارغ التحصیلان
متن مصاحبه با هفته نامه فارغ التحصیلانمتن مصاحبه با هفته نامه فارغ التحصیلان
متن مصاحبه با هفته نامه فارغ التحصیلان
 
روی جلد هفته نامه فارغ التحصیلان
روی جلد هفته نامه فارغ التحصیلان روی جلد هفته نامه فارغ التحصیلان
روی جلد هفته نامه فارغ التحصیلان
 
گوگل؛ مدیریت و ابزارها
گوگل؛ مدیریت و ابزارهاگوگل؛ مدیریت و ابزارها
گوگل؛ مدیریت و ابزارها
 
گوگل؛ نگاهی از درون
گوگل؛ نگاهی از درونگوگل؛ نگاهی از درون
گوگل؛ نگاهی از درون
 
از ایده تا اجرا
از ایده تا اجرااز ایده تا اجرا
از ایده تا اجرا
 

Kürzlich hochgeladen

Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?
Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?
Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?Mikko Kangassalo
 
Inspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxInspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxShubham Rawat
 
南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证kbdhl05e
 
integrity in personal relationship (1).pdf
integrity in personal relationship (1).pdfintegrity in personal relationship (1).pdf
integrity in personal relationship (1).pdfAmitRout25
 
(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)oannq
 
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...JeylaisaManabat1
 
Spiritual Life Quote from Shiva Negi
Spiritual Life Quote from Shiva Negi Spiritual Life Quote from Shiva Negi
Spiritual Life Quote from Shiva Negi OneDay18
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan
 

Kürzlich hochgeladen (8)

Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?
Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?
Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?
 
Inspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxInspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptx
 
南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证
 
integrity in personal relationship (1).pdf
integrity in personal relationship (1).pdfintegrity in personal relationship (1).pdf
integrity in personal relationship (1).pdf
 
(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)
 
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
 
Spiritual Life Quote from Shiva Negi
Spiritual Life Quote from Shiva Negi Spiritual Life Quote from Shiva Negi
Spiritual Life Quote from Shiva Negi
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
 

How to become a hacker

  • 2. Hacker Glider_ Emblem The five-dots in-nine-squares diagram.
  • 3. What is A hacker
  • 4. The Jargon File contains a bunch of definitions of the term ‘hacker’, most having to do with technical adeptness and a delight in solving problems and overcoming limits.
  • 7. 1. The world is full of fascinating problems waiting to be solved.
  • 8. 2. No problem should ever have to be solved twice.
  • 9. 3. Boredom and drudgery are evil.
  • 10. look to the master, follow the master, walk with the master, see through the master, become the master.
  • 11. 4. Freedom is good.
  • 12. 5. Attitude is no substitute for competence.
  • 14. LEARN PROGRAM You need to learn how to think about programming problems in a general way, independent of any one language. HOW TO 1.
  • 15. 2. Get one of the open-source Unixes and learn to use and run it.
  • 16. 3. Learn how to use the World Wide Web and write HTML.
  • 17. 4. If you don't have functional English, learn it.
  • 19. You gain status and reputation, by giving away your time, your creativity, and the results of your skill.
  • 20. 1. Write open-source software_
  • 21. 2. Help test and debug open-source software_
  • 22. 3. Publish useful information_
  • 23. 4. Help keep the infrastructure working_
  • 24. 5. Serve the hacker culture itself_
  • 26. Contrary to popular myth, you don't have to be a nerd to be a hacker.
  • 27. many hackers have adopted the label ‘geek’ as a badge of pride — it's a way of declaring their independence from normal social expectations. <geek />
  • 29. Learn to write your native language well.
  • 30. Read science fiction. Go to science fiction conventions.
  • 32. Develop an analytical ear for music.
  • 35.
  • 36. CREDITS Pictures: Pictures: • http://bit.ly/h5pBKK • http://bit.ly/fqkabx • http://bit.ly/dMeh9w • http://bit.ly/evNQPJ • http://bit.ly/eATScd • http://bit.ly/dXRBgk • http://bit.ly/fs56sx • http://bit.ly/fs56sx • http://bit.ly/fGq7hW • http://bit.ly/ghev7g • http://bit.ly/fu59iO • http://bit.ly/fQDyVb • http://bit.ly/fUdzlo • http://bit.ly/f0t3ZW • http://bit.ly/gSMm6G • http://bit.ly/eZmOz3 • http://bit.ly/gpCrwZ • http://bit.ly/eUegq5 • http://bit.ly/e2povX • http://bit.ly/hFBmS4 • http://bit.ly/ihj8PJ • http://bit.ly/eXwgqo • http://bit.ly/e6xj2L • http://bit.ly/etby8Q • http://bit.ly/dKjEUZ • http://bit.ly/fSpRBM • Source of contents: http://www.catb.org/~esr/faqs/hacker-howto.html • Twitter Icon: http://freakyframes.deviantart.com/art/Twitter-Bird-127757230