• Home
  • Posts RSS
  • Comments RSS
  • Edit
  • Basic Hacking Part l

     Hacking Equipment Fundamentals

    You may wonder whether hackers need expensive computer equipment and a shelf full of technical manuals. The answer is NO! Hacking can be surprisingly easy! Better yet, if you know how to search the Web, you can find almost any computer information you need for free.

    In fact, hacking is so easy that if you have an on-line service and know how to send and read email, you can start hacking immediately. The Basic Hacking Part I will show you where you can download special hacker-friendly programs for Windows that are absolutely free. And we'll show you some easy hacker tricks you can use them for.

    Now suppose you want to become an elite hacker? All you will really need is an inexpensive "shell account" with an Internet Service Provider. In the Basic Hacking Part II, we will tell you how to get a shell account, log on, and start playing the greatest game on Earth: Unix hacking!

    You can even make it into the ranks of the Uberhackers without loading up on expensive computer equipment. In Vol. II we introduce Linux, the free hacker-friendly operating system. It will even run on a 386 PC with just 2 Mb RAM!  Linux is so good that many Internet Service Providers use it to run their systems.

    In Vol. III we will also introduce Perl, the shell programming language beloved of Uberhackers. We will even teach some seriously deadly hacker "exploits" that run on Perl using Linux. OK, you could use most of these exploits to do illegal things. But they are only illegal if you run them against someone else's computer without their permission. You can run any program in this series of Guides on your own computer, or your (consenting) friend's computer -- if you dare! Hey, seriously, nothing in this series of Guides will actually hurt your computer, unless you decide to trash it on purpose.

    We will also open the gateway to an amazing underground where you can stay on top of almost every discovery of computer security flaws. You can learn how to either exploit them -- or defend your computer against them! 

    Blah Blah ...

    All we need to have is a computer to run on, that's it. got it? yea.