Anda di halaman 1dari 4

[Settings ] [Rules ] [FAQ] [Home]

[17 replies] [1 image] [Page 0]


[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vr / w / wg] [i / ic] [r9k] [s4s ] [cm / hm / lgbt / y] [3 / adv /
an / asp / cgl / ck / co / diy / fa / fit / gd / hc / int / jp / lit / mlp / mu / n / out / po / pol / sci / soc / sp / tg / toy / trv / tv / vp /
wsg / x] [rs ] [status / sb / @]
/b/ - Random
The stori es and i nformati on posted here are arti sti c works of fi cti on and fal sehood.
Onl y a fool woul d take anythi ng posted here as fact.
Posting mode: Reply
[Return] [Catalog] [Bottom] [Update] [ Auto]
E-mail Submit
Comment
Verification
4chan Pass users can bypass this CAPTCHA. [Learn More] [Login]
File No se ha seleccionado ningn archivo Seleccionar archivo
Password (Password used f or deletion)
Supported fi l e types are: GIF, JPG, PNG
Maxi mum fi l e si ze al l owed i s 2048 KB.
Images greater than 250x250 pi xel s wi l l be thumbnai l ed.
Read the rul es and FAQ before posti ng.
-
Important news post that covers moderation, board culture, and
shitposting, as well as a handful of changes.
I think this is the second longest news post ever, so it's probably worth reading if you're
an active user (and if you want to be put to sleep by my writing).
Our "4chan: The Official 10th Anniversary Panel" is taking place at Anime Weekend Atlanta 2013 *this
coming* Saturday, September 28th at 10:00PM ET. If you're attending the con, we hope you'll join us.
Otherwise, you'll be able to tune-in via livestream.
Subscribe to our YouTube channel to be notified when the stream goes live.
File: 1380005055389.jpg-(55 KB, 514x645, art of exploitation.jpg)
Type the text (Required)
Edit your settings
>>
>>
>>
>>
>>
>>
>>
>>
Anonymous 09/24/13(Tue)03:44:15 UTC-3 No.507622896 Replies:
>>507623015 >>507623294 >>507623450 >>507623512 >>507625272 >>507629298
>>507629665
What are some good books about hacking?
I've downloaded Hacking: The Art of Exploitation.
Anonymous 09/24/13(Tue)03:45:34 UTC-3 No.507623015 Replies:
>>507623105
>>507622896 (OP)
Wait you DOWNLOADED a BOOK!? Sounds like you're
already quite the hacker!
Anonymous 09/24/13(Tue)03:46:32 UTC-3 No.507623105 Replies:
>>507623182
>>507623015
this
Anonymous 09/24/13(Tue)03:47:21 UTC-3 No.507623182
>>507623105
that
Anonymous 09/24/13(Tue)03:48:24 UTC-3 No.507623294 Replies: >>507624870
>>507622896 (OP)
The art of deception by kevin mitnick
Anonymous 09/24/13(Tue)03:49:58 UTC-3 No.507623450
>>507622896 (OP)
Computer Networks (4th Edition) - Andrew S. Tanenbaum
Anonymous 09/24/13(Tue)03:50:32 UTC-3 No.507623512 Replies: >>507629057 >>507629654 >>507629859
>>507622896 (OP)
Yo mate, you should learn a programming language first.
Hacking doesn't just focus on one subject, there are alot of ways to hack and alot of things to hack.
You go learn a programming language first and then explore stuff you want to hack (it's more fun
that way).
Rewritten this reply because captcha fucked up my post.
Anonymous 09/24/13(Tue)04:02:42 UTC-3 No.507624870
>>507623294
That one is like belles-lettres. No real recipes.
Anonymous 09/24/13(Tue)04:03:46 UTC-3 No.507624970
>>
>>
>>
>>
>>
>>
you just posted this shit on /g/.
Fuck off nigger
Anonymous 09/24/13(Tue)04:04:36 UTC-3 No.507625058
lol skid
Anonymous 09/24/13(Tue)04:06:32 UTC-3 No.507625272
File: 1380006392240.jpg-(27 KB, 330x452, book-white.jpg)
>>507622896 (OP)
Anonymous 09/24/13(Tue)04:37:40 UTC-3 No.507628775 Replies: >>507629090
hacking is overrated. the term alone is thrown around so much it practically means nothing.
idiot: "ermagerd my facebook wuz hacked"
me: "no, your password was just compromised."
person: "somebody managed to exploit the mysql backend of my server, dropping all my tables."
me: "oh noes."
>In the computer security context, a hacker is someone who seeks and exploits weaknesses in a
computer system or computer network.
Anonymous 09/24/13(Tue)04:40:40 UTC-3 No.507629057
>>507623512
no, don't give him that advice. there are enough script-kiddie wannabe pseudo-hackers.
hmm, unless you too are a script-kiddie....
Anonymous 09/24/13(Tue)04:41:02 UTC-3 No.507629090
>>507628775
In real life context, a hacker is someone with ingenuity (usually focused on technology) to solve a
problem.
ZF0 solved media-whoring by rooting peoples' servers
old school programmers built GNU to solve the lack of free operating systems
etc etc
> preemptively defused hacker vs cracker debate
Anonymous 09/24/13(Tue)04:42:58 UTC-3 No.507629298
>>507622896 (OP)
Well, you're never going to learn it because you don't have the determination. You might want to
>>
>>
>>
[17 replies] [1 image] [Page 0]
[Settings ] [Rules ] [FAQ] [Home]
Style Yotsuba
Delete Post [ File Only] Password Delete Report
study telecommunications and network security. And networking in general, otherwise you'll never
be a GOOD hacker. You'll only know what you're directly taught.
Anonymous 09/24/13(Tue)04:46:42 UTC-3 No.507629654
>>507623512
No, just no. He shouldn't even touch programing untill he even knows what the fuck hes going to
code. If he has no basic knowledge of hacking then how is he going to learn anything from a stupid
"hello world" tutorial, if anything its just going to teach him how to code useless programs.
Anonymous 09/24/13(Tue)04:46:48 UTC-3 No.507629665
>>507622896 (OP)
I have 100s of ebooks. I might just upload it.
Anonymous 09/24/13(Tue)04:49:11 UTC-3 No.507629859
>>507623512
>Yo mate, you should learn a programming language first.
My advice is to learn everything about everything, hackers exploit more than just computer and
security systems, you can hack anything, the term really just refers to using a system in ways it
was not intended, sometimes that's to bypass security, sometimes it's just to use its function for
something else.
It means being very well educated, studying the systems you want to "hack" and then using novel
and lateral thinking to do something unintended.
If you look at any good hacking conference like DefCon the speakers will talk about all kinds of
systems, phones, computers, safes, cars, planes, slot machines, ATM machines, routers...
All the truly great hackers that discover actual vulnerabilities in systems are usually those who have
deep knowledge of just 1 field and study pieces of hardware or software for years until they know the
systems better than the people who developed them.
[Return] [Catalog] [Top] [Update] [ Auto]
[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vr / w / wg] [i / ic] [r9k] [s4s ] [cm / hm / lgbt / y] [3 / adv /
an / asp / cgl / ck / co / diy / fa / fit / gd / hc / int / jp / lit / mlp / mu / n / out / po / pol / sci / soc / sp / tg / toy / trv / tv / vp /
wsg / x] [rs ] [status / sb / @]
- futaba + yotsuba -
Al l trademarks and copyri ghts on thi s page are owned by thei r respecti ve parti es. Images upl oaded are the responsi bi l i ty of the Poster. Comments
are owned by the Poster.
Edit your settings

Anda mungkin juga menyukai