Tip 1: Who is the hacker?

Tip 1: Who is the hacker?

For a term like a hacker, there isa lot of different definitions, some believe that hackers are intruders trying to find out the user's confidential information, but this is not always the case.

Who is a hacker?

Who is a hacker?

The concept of a hacker is characterized by two definitions,one of which is the most popular and from this the more truthful. For most people, a hacker is an intruder who is trying in some way or another to find out confidential information stored on a personal computer, cause a system crash, or simply download a virus. For such people is characterized by a different definition, namely "crackers" - people who hack a computer. As an example, one can consider that a person capable of hacking into a computer's security system does not make him a hacker, in fact the same thing as the ability to open cars, does not make him a car master. Another definition of the word hacker - programmers, who in fact created the Internet, the Unix operating system, namely what it is today, they provide the work of the World Wide Web. As a result, one word has two different definitions, the main difference between which is that hackers build things, and crackers break them.

How to become a hacker

It turns out that people trying to become hackerscan either deceive or steal information from other people, or they really are trying to become a programmer who is well versed in their kind of activities, helping other people, etc. Being such a hacker is undoubtedly a pleasure, but it requires a lot of effort. Such people get pleasure from solving various tasks that stand in the way before them, from honing their skills to perfection, and so on. Otherwise, if a person does not want to improve in this way, then, most likely, it is inherent in it is the philistine definition of this term. It is understood that a person, in order to become at least a "cracker", will need certain knowledge in the field of automation of information processes, programming in basic languages, knowledge of information security and many others. Do not forget that if you are not able to think logically or you simply do not like to solve the complex tasks that arise on your way, it is better to abandon the idea of ​​becoming a hacker, since this kind of activity requires basically the presence of logical thinking, and only then perseverance and other character traits. Sometimes it may seem that what a hacker does is a monotonous and boring job, it is in this connection that a person who is not possessing perseverance can hardly become a hacker.

Tip 2: How to get a mailbox on xaker.ru

E-mail today won amongInternet users are popular as a number one tool for messaging. All this is due to the many free services offering registration and use of mailboxes with almost no restrictions. One of these services is NextMail, which offers mail registration in several beautiful domains, including the domain xaker.ru. Such a decision can be approached by someone who is telling someone the address of the mailbox, wants to declare their belonging to a community of hackers, programmers or experienced users.

Hacker

You will need

  • - the Internet;
  • - Mail service NextMail.

Instructions

1

Go to the website. Open the NextMail web page at http://nextmail.ru/ and click the "Register" button in the upper left corner of the page. Next, you will open the mailbox registration form.

2

Enter the required information. In the form that appears, specify the desired box name,which will be used in the future and select the domain "xaker.ru" from the drop-down list. Set the password to access the box and enter the verification code (CAPTCHA). Then you need to click the "Next" button and you will go to the final stage of registration.

3

Complete registration. The final stage of registration is the completioncontact information in Yandex.Passport. This need is connected with the acquisition by Yandex of the NextMail web service. After entering all the required data, click the "Complete registration" button and you will be taken to your new box, ready for use.

Tip 3: What is a hacker attack?

They sit in the night at the flickering monitors. Sort keys on the keyboard, typing strange strings of encoded phrases. They strive to gain access to information, hack the server, just joke or commit a crime. These are hackers - geniuses and villains of the computer age.

Great and mighty internet
In understanding who a hacker is, there are manyconjectures, legends and myths, poorly retold on the pages of various sites. For some people, they are computer geniuses who are well versed in hardware and software. Able to literally work wonders with one mouse click. For others, these are tricky teenagers trying to find an interesting disk or password for accessing the right server. Psychologists who deceive users. Thieves stealing access to credit cards. There is no common opinion, but the fact remains that hackers exist and sometimes they create problems.

Geniuses and villains

He became famous when he was seventeen. For the sake of pampering, hacked telephone networks and redirected calls from subscribers. And one of his greatest achievements was the illegal access to the Pentagon's computer. The most famous and most gifted hacker in history is Kevin Mitnick. As a result, was caught and received a sentence in prison. Currently, he has left and is running his own company to protect against hacker attacks. Another genius got access in five minutes to the live broadcast of NBC, he managed to organize his own performance and everything for the sake of self-indulgence. McDonald's, Yaho, Microsystems, Microsoft - and this is not a complete list of companies affected by Adrian Lamo, a well-known eighties hacker. Now he also works as a security specialist, like Kevin. He took a regular box of oat flakes, found a toy whistle inside and began using it to break into telephone networks. By "lucky" chance it turned out that the signal transmitted by whistle, coincides with the frequency of the electric signal of access to the telephone network of long-distance communication. John Draper is rightfully considered one of the first hackers in history, as he was arrested for his activities in the far 1970s of the last century. In fact, a hacker attack is illegal access to various servers of official organizations. It could be the same Pentagon, NASA, security services. However, formally hacker attack can be called even hacking a computer neighbor on the site. It is characterized by knowledge of the psychology of users. For example, you can call in some organization, officially introduce yourself as a security specialist who checks the company's network for vulnerability and access to the corporate network. This trick, of course, was very popular in the eighties and nineties, when computer literacy was not up to par. But now it sometimes works. It is possible to organize an attack by means of a virus infection of the target computer. Or access it with the help of remote PC management software. There are a lot of ways and a significant number of them are known only to specialists.

Good or evil

On the one hand - a hacker, this is a kind ofa hooligan, dreaming to study the computer thoroughly and declare himself. Sometimes it's just a playful teenager, sometimes an adult man with megalomania. On the other hand - a hacker, this villain, transferring money from the accounts of citizens to his. With the third - a specialist in computer security, who will gladly hire a well-known company.