background preloader

The glider: an Appropriate Hacker Emblem

The glider: an Appropriate Hacker Emblem
The Linux folks have their penguin and the BSDers their daemon. Perl's got a camel, FSF fans have their gnu and OSI's got an open-source logo. What we haven't had, historically, is an emblem that represents the entire hacker community of which all these groups are parts. This is a proposal that we adopt one — the glider pattern from the Game of Life. About half the hackers this idea was alpha-tested on instantaneously said "Wow! Cool!" I first proposed this emblem in October 2003. When you put the glider emblem on your web page, or wear it on clothing, or display it in some other way, you are visibly associating yourself with the hacker culture. Yes, as of a mere four days after this proposal was floated, there are mugs and T-shirts. If you think is about breaking into other peoples' computers, those of us the emblem was invented for do not want you displaying it. I used to have a prohibition against commercial use here. The glider is not copyrighted or trademarked.

http://www.catb.org/~esr/hacker-emblem/

Related:  Hacking tutorials sites & toolsmosheelns

Learn Ethical Hacking Online - HackingLoops There’s a seemingly endless number of free open-source tools for penetration testing, and most of them seem to gravitate around the Kali Linux distribution. But with so many free tools, it’s easy to miss out on some of the best ones. So today we’re going to take a closer look at Armitage, define what it is, and define how it works. Top of the Web Follow Springo on : Find top sites My top sites 80+ Best Free Hacking Tutorials Learning to become hacker is not as easy as learning to become a software developer. I realized this when I started looking for learning resources for simple hacking people do. Even to start doing the simplest hack on own, a hacker requires to have in depth knowledge of multiple topics. Some people recommend minimum knowledge of few programming languages like C, Python, HTML with Unix operating system concepts and networking knowledge is required to start learning hacking techniques.

100 Useful Tips and Tools to Research the Deep Web By Alisa Miller Experts say that typical search engines like Yahoo! and Google only pick up about 1% of the information available on the Internet. The rest of that information is considered to be hidden in the deep web, also referred to as the invisible web. So how can you find all the rest of this information? This list offers 100 tips and tools to help you get the most out of your Internet searches. Top 15 Open Source/Free Security/Hacking Tools 1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing.

26 Free (or Free-to-Try) Content Curation Tools Content is still king, but it isn't always practical or cost effective for marketers to produce brand-new, meaty, thought-leadership level content pieces on a regular basis. That's where curating content can come in handy. Content curation offers a nearly limitless method of fueling your inbound marketing efforts. Unearthing and sharing the quality content of others allows you provide your audience fresh content on a regular basis to serve any interest, industry, or market.

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". HIGH TIMES 2014 Vape Pen Buyer’s Guide Since our first pen-sized vaporizer review was published last fall, it’s been one of the most viewed and referenced features on our website. It seems a lot of you out there want to buy vapor pens, and you look to us to tell you which ones to get. Well, we take that responsibility seriously, and with the flood of new pens on the market, we figured it was high time for round two.

Painfully Computer Pranks ~ Computer Hacking Computer pranks to freak out your friends and make them crying for mummy I've been posting many articles about computer pranks on this blog (Deadly Virus Prank, The Ultimate Virus, How to Create a Fake and Harmless Virus and Facebook Virus Prank). Today , I will show you 5 great computer pranks that will frustrate your victims very much. These pranks could be very painfully, so please use them at your own risk ;)

Related: