Who is a "real" hacker and how do you become one? Keep reading.
Step 1. You must be a teenager
This is an essential part of becoming a teenage hacker.
Step 2. Learn to distinguish between hackers
- Type A (Beginner): This type of hacker is interested in new technologies and hacks that other hackers are producing. What sets these hackers apart from others is the lack of sufficient computer experience to perform many / any hacks. Every hacker starts with type A.
- Type B (Beginner): Knows how to fix minor / moderate computer problems and writes basic programs. If you are a Type B hacker, you will "make" a lot of mistakes, both minor and fatal.
- Type C (Intermediate Hacker): Feels comfortable with computer hardware and software. He loves assembling computers, producing root smartphones and tablets, and testing all electronic devices for endurance. Most type C, D and E hackers have their own websites and networks.
- Type D (professional hacker): The king of all hackers. Can hack almost any software or hardware in any conceivable and inconceivable way. It takes a lot of practice and dedication to become a Type D hacker.
- Type E (business hacker): Converts computer knowledge into money. E-hackers can do work for money, such as rooting devices, selling custom-made operating systems and programs, and fixing computer problems. These people are also often type C or D hackers.
- Type F (illegal hacker): Some call them "crackers", you you do not want become one of them.
Step 3. What makes a hacker "real"
In the context of computers, a real hacker can be called a person who can make a computer do things that he could not do before or did not do it well.
Step 4. Limit the scope
What will you focus on, software or hardware? Don't choose "both", as you will work with both anyway. By your decision, you will determine what to focus on first.
Step 5. Learn to use a computer
Learn every function, every component. This will show you the area in which you will be working and focus your attention on it.
Step 6. Read everything you can find on this topic
Examine what was done and how. It teaches you what to do and helps you focus. You can even find something that interests you.
A great first step is to copy everything that someone else has already done
Step 7. Begin experimenting with hardware and software to figure out how to perform tasks on your computer that you never knew before
Step 8. Learn the high-level programming language of your choice
The high-level programming language sits high above machine language (1s and 0s), and uses more English words than you understand. The programs are then converted by the compiler into machine code or language that the computer understands and can work with. Some of the programming languages we offer to learn are C or C ++, Java or BASIC. Also for the x86 platform - assembly and a scripting language such as Perl. Learning how to write scripts in Batch will do a lot of good, as the language is simple enough to give you a lot of control on Windows computers.
- Learn everything. Try it. You won't succeed the first time, but you have to try.
- Listen to others. Make friends. Have fun. Geeks can be both girls and guys.
- Concentrate. Try it. If you stop liking this, then you may not become a hacker.
- Ask about everything, especially about what you are sure of.
- Portable hard drives and lots of useful portable software are your best friends.
- If you find a helpful community, it may help you get started.
- Memorize your RFCs and make it holy to you (if you can change RFCs while you are a teenager, change them without hesitation).
- Google, Linux, Firefox, Wikipedia, and wikiHow are perfect.
- Don't do it for money. Greed holds back profit. Computer fraud can lead you to jail!
- Do this for a "neat hack".
- Don't do this to "change the world." The world is changing itself. You would like to change the world, but no one will give you its source code.
- Macintosh is not the most ideal hacking or computer trick tool since it cannot execute.exe files.
- Don't break the law. You will end up behind bars.
- You can hack into someone else's computer. Be careful.
- You can hack hotmail (MSN) accounts. This has already been done, but the process is the most difficult. Think about it. You want to hack into a system that is made by the same people who released the operating system you are running on (but in the case of Hotmail, they have a known security vulnerability).