TUCoPS :: General Information :: mulg3.txt

"Miskatonic University Learning Guides" #3 - advice for beginning hackers

Here is a small artile I wrote this is going specifically to all
the newbie's ,aoler's and idiots out there.

                 Miskatonic University Learning Guides
                             Issue # 3

                        The Rules of the Game.
        In learning to be or are a hacker you should there are some guidelines
for you to learn and live by.  These are imparted to you to help you become a
better hacker and to protect your livelyhood.  From personal experiences and 
from files I have read I have formed these rules for you to use.
                Conservative Man's Guidelines for Hacking.

(1) When possible bid your time.
        This means never rush anything that can give you away.  I personaly
    was almost got in serious trouble because I got to anxious.  I got off
    luckely.  Keep hacking to a hunter and prey game.  Learn to be very
    cautious and to carefully stalk your target.

(2) Keep invisible.
        Never let your presence be know.  Do not leave marks around.  Never
    leave your real name or anybody's real name you now.  Do not leave calling 
    cards like "Great hacker was here" or Handles as they will be eventually 
    be traced back to you.  Do not draw attention to yourself like by staying 
    on to long or signing on at weird times.  Keep visits short and normal 
    if possible.

(3) Hacking is better in a group.
        Simply put get out and meet people.  Make correspondances with people
    on bulletin boards and the Internet.  Go to BBS meetings or join computer 
    groups.  With some hard effort you can find some people from which you 
    can learn as which they can also learn from you too.

(4) Alterations and Destruction.
 a. Do not intentionally damage *any* system or file.
        If you by chance get onto a computer and you crash it or delete an 
    important file you are no hacker but a big tit.  Destroying things serves
    no purpose.  When you destroy something you make many bad moves, you let 
    people known of your presence (thus breaking rule #1).  When people lose 
    important files they get mad and when people are angry they ever more 
    diligent in catching you.  If caught charges against you are much more 
    severe as you will be charged with destruction of computer property.  
    Crashing a computer is like burning your own bridges down you lose the 
    potential of learning and systems to use.

 b. Do not alter files.
        Do not alter any system files other than ones needed to ensure your
    escape from detection and your future access (Trojan Horses, Altering
    Logs, and the like are all necessary to your survival for as long as
    possible.) *Taken from LOD Hacking guide

(5) Careful who you tell or loose lips sink ships.
        Every person will always want to tell someone about their exploits
    as it is a basic human reaction.  So when telling of your success remember
    who you tell.  Try to avoid telling people that will in turn tell on you 
    such an example is your parents, girlfriend, cops, and even sibilings.  If 
    you want tell rember rule #2 and get yourself into a trusted group.  This
    can also mean to what you post and write in e-mail.

(6) Being a little paranoid never hurt anyone.
        Get a little paranoid as it will help you.  Learn the feeling that 
    you are being tracked by the cops.  This in turn will teach you how to 
    protect yourself from getting caught or incriminated.  This can mean from 
    hiding your disks in a nuclear bomb shelter in your backyard,  calling
    from a payphone, or encrypting your e-mail with a 125 letter long phrase.

(7) Never under estimate your opponent. 
        Most people thing of cops and security people are idiots.  Do not 
    thing this for a minute, as to every 5 dumb cops there is 5 really smart
    ones.  Most of the time your opponent has the law or the system (computer 
    or government) on his side.  This gives him/her an edge over you.  One 
    such example comes to mind.  An writer for "Phrack" did an article on a
    hacker cop.  In the procces in doing it he got records about the cop.  
    When the cop eventualy caught on he called up the writer and informed him 
    of his own lifestory, going all the way from credit history to the bike he
    paid for in cash.  This incident proves that cops are not ignorant of our 
    kind and are tricks.

(8) Read everything related remotely related to computers.
        Get manuals from friends and read them.  Download textfiles and read
    them.  Type help at the prompt and read.  With all this reading you soon 
    can become very proficent in may aspects of computers.  I have seen many 
    newbies try and have other people tell them what to do and where.  This 
    rarely works or provides any knowledge gain.  As to every great hacker 
    there has been tonnes of stuff he had to read and learn.

(9) Learn to use many differnet programs.
        Download, copy, or pirate programs.  Learn to use them, find the bugs
    and little tricks and use these things for your needs.  In the long run 
    you will find some programs that can be  really useful to you.  This rule
    also reaches out to learning other operating systems.

(10) Make goals.
        This rule may sound it like it does not belong or is even releated to
    hacking but it is.  No person has ever gotten 95% to 100% by doing a days 
    worth of cramming.  The same with hacking.  Get a daytimer and begin to
    record little daily goals for you to complete, big goals like to go trashing
    at the local ma ball office, and simple tasks for you to complete.  With
    all this planning a person can become a ok hacker in faster time.

(11) Hacking is like sex.
        Hacking is similar to sex (Yes I know this is not very conservative
     but it is the best ancedote I can think of).  A person can read all the
     books about sex, watch blue movies galore, and skim every playboy but until
     that person has sex they can not relate to it.  This is the same with 
     hacking.  You can read all the text files and have all the programs but
     until you actually go out and hacked into a system you never now what it
     is like.

Brought to you by: Conservative Man
                   The Right Way ----->

Next issue of M.U.L.G.:  Miskatonic University Text Books.

Conservative Man
The Right Way ----->

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH