Saturday, January 5, 2008

Are You Really A Hacker

We arise a question that “Are you really a hacker?” .We are working on this topic since 6 months. We wrote this article according to our own views. We saw that most of the persons, who say that they are hackers, use already designed software to hack servers and computers. They do not have complete knowledge about computer networks and programming. They do not know how to write programs for connecting one computer to other computers and they do not have knowledge that how to write their own programs to hack other computers. Already designed tools are easily detectable by anti viruses and Internet securities software. They think that they are hacker.
But according to our views the actual hacker is that who has huge knowledge about computer networking and programming. He must know how to program hacking tools and design their own tools for hacking.
The purpose of this article is to encourage hackers to learn programming and computer networking. We want to say that if you can program hacking tools, than you can also program security (anti hacking) tools, which are necessary for secure networking.
At last we say only if you want to be an ethical hacker then programming is very important. “If you want to be A Real Ethical Hacker, Then think about hacking the source code of Linux kernel”.
Amandeep Kansal

2 comments:

TheBrilliantHacker said...

A Linux addict?...I thought I sensed one (Sabayon). Might I recommend the hackers symbol (the glider)? You are spot on about what a hacker is NOT. I greatly appreciate your efforts to fight the improper use of the word "Hacker" in place of the word "Cracker." If you need any programming advice, I would be more than happy to surrender my incompetence for the greater good of hacking. Unfortunately, my expertise in networking are lost in the abyss along with that Vista source code and any sanity within Microsoft. ;) -TBH

Mage.... cursed to slave for music ;) said...

can't agree more, tools like metasploit framework.
and best of all remote-exploits : backtrack has made it look easy!!!