Similar thread:
How to be a hacker: http://www.forumkorner.com/thread-185265.html
1. Read sci-fi books, do Tai, Chi....
.
.
2. Use AMD processors
.
.
3. Use more than 45 minutes a day on a computer
.
.
4. Use "Lunix" (Lol)
.
.
5. Wear bright colored clothes, colored spikey hair, and carry glowsticks
.
.
6. Typ3 lyK Th15 4LL th3 tym3
Public poll on hackers:
How to be a hacker: http://www.forumkorner.com/thread-185265.html
1. Read sci-fi books, do Tai, Chi....
Read science fiction. Go to science fiction conventions, which is a great way to meet hackers and proto-hackers. Consider training in a martial art. The kind of mental discipline required for martial arts seems to be similar in important ways to what hackers do. The most hacker-ly martial arts are those which emphasize mental discipline, relaxed awareness, and control, rather than raw strength, athleticism, or physical toughness. Tai Chi is a good martial art for hackers.
.
2. Use AMD processors
If your son has requested a new "processor" from a company called "AMD", this is genuine cause for alarm. AMD is a third-world based company who make inferior, "knock-off" copies of American processor chips. They use child labor extensively in their third world sweatshops, and they deliberately disable the security features that American processor makers, such as Intel, use to prevent hacking. AMD chips are never sold in stores, and you will most likely be told that you have to order them from internet sites. Do not buy this chip! This is one request that you must refuse your son, if you are to have any hope of raising him well.
.
3. Use more than 45 minutes a day on a computer
If your son spends more than thirty minutes each day on the computer, he may be using it to DOS other peoples sites. DOSing involves gaining access to the "command prompt" on other people's machines, and using it to tie up vital internet services. This can take up to eight hours. If your son is doing this, he is breaking the law, and you should stop him immediately. The safest policy is to limit your children's access to the computer to a maximum of forty-five minutes each day.
.
4. Use "Lunix" (Lol)
BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called "xenix", which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the "mp3" program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone.
Your son may try to install "lunix" on your hard drive. If he is careful, you may not notice its presence, however, lunix is a capricious beast, and if handled incorrectly, your son may damage your computer, and even break it completely by deleting Windows, at which point you will have to have your computer repaired by a professional.
If you see the word "LILO" during your windows startup (just after you turn the machine on), your son has installed lunix. In order to get rid of it, you will have to send your computer back to the manufacturer, and have them fit a new hard drive. Lunix is extremely dangerous software, and cannot be removed without destroying part of your hard disk surface.
Your son may try to install "lunix" on your hard drive. If he is careful, you may not notice its presence, however, lunix is a capricious beast, and if handled incorrectly, your son may damage your computer, and even break it completely by deleting Windows, at which point you will have to have your computer repaired by a professional.
If you see the word "LILO" during your windows startup (just after you turn the machine on), your son has installed lunix. In order to get rid of it, you will have to send your computer back to the manufacturer, and have them fit a new hard drive. Lunix is extremely dangerous software, and cannot be removed without destroying part of your hard disk surface.
.
5. Wear bright colored clothes, colored spikey hair, and carry glowsticks
If your son has undergone a sudden change in his style of dress, you may have a hacker on your hands. Hackers tend to dress in bright, day-glo colors. They may wear baggy pants, bright colored shirts and spiky hair dyed in bright colors to match their clothes. They may take to carrying "glow-sticks" and some wear pacifiers around their necks. (I have no idea why they do this) There are many such hackers in schools today, and your son may have started to associate with them. If you notice that your son's group of friends includes people dressed like this, it is time to think about a severe curfew, to protect him from dangerous influences.
.
6. Typ3 lyK Th15 4LL th3 tym3
Every Yahoo answers comment
Public poll on hackers:
I'm scared of hackers because...
They hack into NASA 5%
They steal things 4%
They are violent sociopaths 4%
They use amphetamines and speed 7%
They help Osama Bin Laden 14%
They're un-American 5%
They smell bad 58%
Votes: 11015
Any opinions here: Do you agree with these things: @Trojan @Sleep @GOR @philly @arrest @rude @thehackerhd
They hack into NASA 5%
They steal things 4%
They are violent sociopaths 4%
They use amphetamines and speed 7%
They help Osama Bin Laden 14%
They're un-American 5%
They smell bad 58%
Votes: 11015
Any opinions here: Do you agree with these things: @Trojan @Sleep @GOR @philly @arrest @rude @thehackerhd