How To Ask Questions The Smart Way
In the world of hackers, the kind of answers you get to your technical questions depends as much on the way you ask the questions as on the difficulty of developing the answer. This guide will teach you how to ask questions in a way more likely to get you a satisfactory answer. Now that use of open source has become widespread, you can often get as good answers from other, more experienced users as from hackers.
70 Things Every Computer Geek Should Know.
The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field.
Dal Sabzi for Aatman: Gayatri Mantra
The Gayatri Mantra was traditionally given from the Guru Master to the disciple, while standing mid-stream. Look at the darkness. Visualize the sun rising. Offer water to the sun. The story goes that once the Devas, the Shining Ones wanted to learn the secrets of the Universe. Since learning about the Scientific aspect 'atoms' etc. did not quite work out, they went to the Lord.
ANONYMITY & PRIVACY
[ English | German ] Protection of Privacy on the Internet JAP (called JonDo in the scope of the commercial JonDonym anonymous proxy servers - AN.ON remains free of charge) makes it possible to surf the internet anonymously and unobservably. Without Anonymization, every computer in the internet communicates using a traceable Address.
The Cuckoo's Egg (book)
Summary[edit] Clifford Stoll (the author) managed some computers at Lawrence Berkeley National Laboratory in California. One day, in August 1986, his supervisor (Dave Cleveland) asked him to resolve a USD$0.75 accounting error in the computer usage accounts. He traced the error to an unauthorized user who had apparently used up 9 seconds of computer time and not paid for it, and eventually realized that the unauthorized user was a hacker who had acquired root access to the LBL system by exploiting a vulnerability in the movemail function of the original GNU Emacs. Over the next ten months, Stoll spent a great deal of time and effort tracing the hacker's origin.
How To Learn Hacking
Copyright © 2014 Eric S. Raymond The “hacking” we'll be talking about in this document is exploratory programming in an open-source environment. If you think “hacking” has anything to do with computer crime or security breaking and came here to learn that, you can go away now. There's nothing for you here. Hacking is primarily a style of programming, and following the recommendations in this document can be an effective way to acquire general-purpose programming skills.
Hacking Basics
This tutorial is for information purposes only, and I do not endorse any of the activities discussed within this guide. I nor anyone hosting this guide can be held responsible for anything you do after reading this. What you do with your day lies on your shoulders. Here with I am creating an Index.. 1.
The Egg
Author's Note: The Egg is also available in the following languages: The Egg By: Andy Weir
Digital footprint
Digital footprint refers to the traces of data that are left behind by users on digital services. [1] There are two main classifications for digital footprints: passive and active. A passive digital footprint is created when data is collected about an action without any client activation, whereas active digital footprints are created when personal data is released deliberately by a user for the purpose of sharing information about oneself.[1] Passive digital footprints can be stored in many ways depending on the situation.
Links
Unified Modeling Language (UML 2.0) There's an introduction to UML at wikipedia. The home page for UML information is at OMG.