|
Here is a small artile I wrote this is going specifically to all the newbie's ,aoler's and idiots out there. Miskatonic University Learning Guides Issue # 3 ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ The Rules of the Game.³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ In learning to be or are a hacker you should there are some guidelines for you to learn and live by. These are imparted to you to help you become a better hacker and to protect your livelyhood. From personal experiences and from files I have read I have formed these rules for you to use. ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ» º Conservative Man's Guidelines for Hacking.º ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ (1) When possible bid your time. ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ This means never rush anything that can give you away. I personaly was almost got in serious trouble because I got to anxious. I got off luckely. Keep hacking to a hunter and prey game. Learn to be very cautious and to carefully stalk your target. (2) Keep invisible. ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ Never let your presence be know. Do not leave marks around. Never leave your real name or anybody's real name you now. Do not leave calling cards like "Great hacker was here" or Handles as they will be eventually be traced back to you. Do not draw attention to yourself like by staying on to long or signing on at weird times. Keep visits short and normal if possible. (3) Hacking is better in a group. ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ Simply put get out and meet people. Make correspondances with people on bulletin boards and the Internet. Go to BBS meetings or join computer groups. With some hard effort you can find some people from which you can learn as which they can also learn from you too. (4) Alterations and Destruction. ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ a. Do not intentionally damage *any* system or file. ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ If you by chance get onto a computer and you crash it or delete an important file you are no hacker but a big tit. Destroying things serves no purpose. When you destroy something you make many bad moves, you let people known of your presence (thus breaking rule #1). When people lose important files they get mad and when people are angry they ever more diligent in catching you. If caught charges against you are much more severe as you will be charged with destruction of computer property. Crashing a computer is like burning your own bridges down you lose the potential of learning and systems to use. b. Do not alter files. ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ Do not alter any system files other than ones needed to ensure your escape from detection and your future access (Trojan Horses, Altering Logs, and the like are all necessary to your survival for as long as possible.) *Taken from LOD Hacking guide (5) Careful who you tell or loose lips sink ships. ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ Every person will always want to tell someone about their exploits as it is a basic human reaction. So when telling of your success remember who you tell. Try to avoid telling people that will in turn tell on you such an example is your parents, girlfriend, cops, and even sibilings. If you want tell rember rule #2 and get yourself into a trusted group. This can also mean to what you post and write in e-mail. (6) Being a little paranoid never hurt anyone. ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ Get a little paranoid as it will help you. Learn the feeling that you are being tracked by the cops. This in turn will teach you how to protect yourself from getting caught or incriminated. This can mean from hiding your disks in a nuclear bomb shelter in your backyard, calling from a payphone, or encrypting your e-mail with a 125 letter long phrase. (7) Never under estimate your opponent. ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ Most people thing of cops and security people are idiots. Do not thing this for a minute, as to every 5 dumb cops there is 5 really smart ones. Most of the time your opponent has the law or the system (computer or government) on his side. This gives him/her an edge over you. One such example comes to mind. An writer for "Phrack" did an article on a hacker cop. In the procces in doing it he got records about the cop. When the cop eventualy caught on he called up the writer and informed him of his own lifestory, going all the way from credit history to the bike he paid for in cash. This incident proves that cops are not ignorant of our kind and are tricks. (8) Read everything related remotely related to computers. ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ Get manuals from friends and read them. Download textfiles and read them. Type help at the prompt and read. With all this reading you soon can become very proficent in may aspects of computers. I have seen many newbies try and have other people tell them what to do and where. This rarely works or provides any knowledge gain. As to every great hacker there has been tonnes of stuff he had to read and learn. (9) Learn to use many differnet programs. ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ Download, copy, or pirate programs. Learn to use them, find the bugs and little tricks and use these things for your needs. In the long run you will find some programs that can be really useful to you. This rule also reaches out to learning other operating systems. (10) Make goals. ÍÍÍÍÍÍÍÍÍÍÍ This rule may sound it like it does not belong or is even releated to hacking but it is. No person has ever gotten 95% to 100% by doing a days worth of cramming. The same with hacking. Get a daytimer and begin to record little daily goals for you to complete, big goals like to go trashing at the local ma ball office, and simple tasks for you to complete. With all this planning a person can become a ok hacker in faster time. (11) Hacking is like sex. ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ Hacking is similar to sex (Yes I know this is not very conservative but it is the best ancedote I can think of). A person can read all the books about sex, watch blue movies galore, and skim every playboy but until that person has sex they can not relate to it. This is the same with hacking. You can read all the text files and have all the programs but until you actually go out and hacked into a system you never now what it is like. Brought to you by: Conservative Man The Right Way -----> Next issue of M.U.L.G.: Miskatonic University Text Books. -- Conservative Man The Right Way ----->