Here is a small artile I wrote this is going specifically to all
the newbie's ,aoler's and idiots out there.
Miskatonic University Learning Guides
Issue # 3
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
³ The Rules of the Game.³
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
In learning to be or are a hacker you should there are some guidelines
for you to learn and live by. These are imparted to you to help you become a
better hacker and to protect your livelyhood. From personal experiences and
from files I have read I have formed these rules for you to use.
ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ»
º Conservative Man's Guidelines for Hacking.º
ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ
(1) When possible bid your time.
ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ
This means never rush anything that can give you away. I personaly
was almost got in serious trouble because I got to anxious. I got off
luckely. Keep hacking to a hunter and prey game. Learn to be very
cautious and to carefully stalk your target.
(2) Keep invisible.
ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ
Never let your presence be know. Do not leave marks around. Never
leave your real name or anybody's real name you now. Do not leave calling
cards like "Great hacker was here" or Handles as they will be eventually
be traced back to you. Do not draw attention to yourself like by staying
on to long or signing on at weird times. Keep visits short and normal
if possible.
(3) Hacking is better in a group.
ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ
Simply put get out and meet people. Make correspondances with people
on bulletin boards and the Internet. Go to BBS meetings or join computer
groups. With some hard effort you can find some people from which you
can learn as which they can also learn from you too.
(4) Alterations and Destruction.
ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ
a. Do not intentionally damage *any* system or file.
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
If you by chance get onto a computer and you crash it or delete an
important file you are no hacker but a big tit. Destroying things serves
no purpose. When you destroy something you make many bad moves, you let
people known of your presence (thus breaking rule #1). When people lose
important files they get mad and when people are angry they ever more
diligent in catching you. If caught charges against you are much more
severe as you will be charged with destruction of computer property.
Crashing a computer is like burning your own bridges down you lose the
potential of learning and systems to use.
b. Do not alter files.
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
Do not alter any system files other than ones needed to ensure your
escape from detection and your future access (Trojan Horses, Altering
Logs, and the like are all necessary to your survival for as long as
possible.) *Taken from LOD Hacking guide
(5) Careful who you tell or loose lips sink ships.
ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ
Every person will always want to tell someone about their exploits
as it is a basic human reaction. So when telling of your success remember
who you tell. Try to avoid telling people that will in turn tell on you
such an example is your parents, girlfriend, cops, and even sibilings. If
you want tell rember rule #2 and get yourself into a trusted group. This
can also mean to what you post and write in e-mail.
(6) Being a little paranoid never hurt anyone.
ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ
Get a little paranoid as it will help you. Learn the feeling that
you are being tracked by the cops. This in turn will teach you how to
protect yourself from getting caught or incriminated. This can mean from
hiding your disks in a nuclear bomb shelter in your backyard, calling
from a payphone, or encrypting your e-mail with a 125 letter long phrase.
(7) Never under estimate your opponent.
ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ
Most people thing of cops and security people are idiots. Do not
thing this for a minute, as to every 5 dumb cops there is 5 really smart
ones. Most of the time your opponent has the law or the system (computer
or government) on his side. This gives him/her an edge over you. One
such example comes to mind. An writer for "Phrack" did an article on a
hacker cop. In the procces in doing it he got records about the cop.
When the cop eventualy caught on he called up the writer and informed him
of his own lifestory, going all the way from credit history to the bike he
paid for in cash. This incident proves that cops are not ignorant of our
kind and are tricks.
(8) Read everything related remotely related to computers.
ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ
Get manuals from friends and read them. Download textfiles and read
them. Type help at the prompt and read. With all this reading you soon
can become very proficent in may aspects of computers. I have seen many
newbies try and have other people tell them what to do and where. This
rarely works or provides any knowledge gain. As to every great hacker
there has been tonnes of stuff he had to read and learn.
(9) Learn to use many differnet programs.
ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ
Download, copy, or pirate programs. Learn to use them, find the bugs
and little tricks and use these things for your needs. In the long run
you will find some programs that can be really useful to you. This rule
also reaches out to learning other operating systems.
(10) Make goals.
ÍÍÍÍÍÍÍÍÍÍÍ
This rule may sound it like it does not belong or is even releated to
hacking but it is. No person has ever gotten 95% to 100% by doing a days
worth of cramming. The same with hacking. Get a daytimer and begin to
record little daily goals for you to complete, big goals like to go trashing
at the local ma ball office, and simple tasks for you to complete. With
all this planning a person can become a ok hacker in faster time.
(11) Hacking is like sex.
ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ
Hacking is similar to sex (Yes I know this is not very conservative
but it is the best ancedote I can think of). A person can read all the
books about sex, watch blue movies galore, and skim every playboy but until
that person has sex they can not relate to it. This is the same with
hacking. You can read all the text files and have all the programs but
until you actually go out and hacked into a system you never now what it
is like.
Brought to you by: Conservative Man
The Right Way ----->
Next issue of M.U.L.G.: Miskatonic University Text Books.
--
Conservative Man
The Right Way ----->
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH