Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Linux
  3. How To Become A Hacker: A Step-By-Step Guide

How To Become A Hacker: A Step-By-Step Guide

Scheduled Pinned Locked Moved Linux
linux
20 Posts 15 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S This user is from outside of this forum
    S This user is from outside of this forum
    [email protected]
    wrote on last edited by
    #1
    This post did not contain any content.
    C gustavom@lemmy.worldG L pika@sh.itjust.worksP W 11 Replies Last reply
    0
    • System shared this topic on
    • S [email protected]
      This post did not contain any content.
      C This user is from outside of this forum
      C This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #2

      I started reading and though this was someone who had lost their marbles, by target 2 I was hooked.

      Z 1 Reply Last reply
      0
      • S [email protected]
        This post did not contain any content.
        gustavom@lemmy.worldG This user is from outside of this forum
        gustavom@lemmy.worldG This user is from outside of this forum
        [email protected]
        wrote on last edited by
        #3

        How to become a hacker

        Average Linux user: Hack the white house

        Your mom: Install pi-hole

        1 Reply Last reply
        0
        • S [email protected]
          This post did not contain any content.
          L This user is from outside of this forum
          L This user is from outside of this forum
          [email protected]
          wrote on last edited by
          #4

          Pretty fun (and funny) sci-fi story, the open source katana bit gave me unix surrealism vibes but then again what doesn't these days.

          S 1 Reply Last reply
          0
          • L [email protected]

            Pretty fun (and funny) sci-fi story, the open source katana bit gave me unix surrealism vibes but then again what doesn't these days.

            S This user is from outside of this forum
            S This user is from outside of this forum
            [email protected]
            wrote on last edited by
            #5

            Thanks! I borrowed the open source katana bit from unix surrealism

            1 Reply Last reply
            0
            • C [email protected]

              I started reading and though this was someone who had lost their marbles, by target 2 I was hooked.

              Z This user is from outside of this forum
              Z This user is from outside of this forum
              [email protected]
              wrote on last edited by
              #6

              For me it was

              — I’d seen weirder things in Perl scripts —

              Just perfect. No notes.

              1 Reply Last reply
              0
              • S [email protected]
                This post did not contain any content.
                pika@sh.itjust.worksP This user is from outside of this forum
                pika@sh.itjust.worksP This user is from outside of this forum
                [email protected]
                wrote on last edited by
                #7

                I love it.

                1 Reply Last reply
                0
                • S [email protected]
                  This post did not contain any content.
                  W This user is from outside of this forum
                  W This user is from outside of this forum
                  [email protected]
                  wrote on last edited by
                  #8

                  Fun background info: Trusted Representatives don't actually carry their shard of the key (to prevent exactly this scenario), they have (iirc) a keycard which allows them to access the secure storage medium where their different pieces are stored.

                  F 1 Reply Last reply
                  0
                  • S [email protected]
                    This post did not contain any content.
                    L This user is from outside of this forum
                    L This user is from outside of this forum
                    [email protected]
                    wrote on last edited by
                    #9

                    A beautiful read. I’ll keep checking my certificate resolutions.

                    1 Reply Last reply
                    0
                    • S [email protected]
                      This post did not contain any content.
                      ? Offline
                      ? Offline
                      Guest
                      wrote on last edited by
                      #10

                      I had a blast reading this and had some great laughs throughout–thanks for sharing and making my morning!

                      1 Reply Last reply
                      0
                      • S [email protected]
                        This post did not contain any content.
                        J This user is from outside of this forum
                        J This user is from outside of this forum
                        [email protected]
                        wrote on last edited by
                        #11

                        So good. the vatican while loop one was a lot of fun too

                        1 Reply Last reply
                        0
                        • S [email protected]
                          This post did not contain any content.
                          ? Offline
                          ? Offline
                          Guest
                          wrote on last edited by
                          #12

                          I want to see a live action of this.

                          T 1 Reply Last reply
                          0
                          • ? Guest

                            I want to see a live action of this.

                            T This user is from outside of this forum
                            T This user is from outside of this forum
                            [email protected]
                            wrote on last edited by
                            #13

                            Have you seen Blackhat from Micheal Maan. (I’m no hacker/programmer/or whatever techie)

                            ? 1 Reply Last reply
                            0
                            • W [email protected]

                              Fun background info: Trusted Representatives don't actually carry their shard of the key (to prevent exactly this scenario), they have (iirc) a keycard which allows them to access the secure storage medium where their different pieces are stored.

                              F This user is from outside of this forum
                              F This user is from outside of this forum
                              [email protected]
                              wrote on last edited by
                              #14

                              to prevent exactly this scenario

                              I'd love to be in the group that brainstormed this exact scenario

                              S 1 Reply Last reply
                              0
                              • S [email protected]
                                This post did not contain any content.
                                R This user is from outside of this forum
                                R This user is from outside of this forum
                                [email protected]
                                wrote on last edited by
                                #15

                                I don't get what the others are talking about, there is nothing after this, even through scribe or on an archive.org snapshot made recently

                                Taking him down would put the fear into the rest and, hopefully, get some intel on the other keyholders through the IRC backchannels.

                                S 1 Reply Last reply
                                0
                                • R [email protected]

                                  I don't get what the others are talking about, there is nothing after this, even through scribe or on an archive.org snapshot made recently

                                  Taking him down would put the fear into the rest and, hopefully, get some intel on the other keyholders through the IRC backchannels.

                                  S This user is from outside of this forum
                                  S This user is from outside of this forum
                                  [email protected]
                                  wrote on last edited by
                                  #16

                                  You probably have an extrnsion which removes the "Friend link" query param from the URL

                                  1 Reply Last reply
                                  0
                                  • F [email protected]

                                    to prevent exactly this scenario

                                    I'd love to be in the group that brainstormed this exact scenario

                                    S This user is from outside of this forum
                                    S This user is from outside of this forum
                                    [email protected]
                                    wrote on last edited by
                                    #17

                                    Every group worth its salt should have safeguards against Nokia nunchuck attacks.

                                    F 1 Reply Last reply
                                    0
                                    • S [email protected]

                                      Every group worth its salt should have safeguards against Nokia nunchuck attacks.

                                      F This user is from outside of this forum
                                      F This user is from outside of this forum
                                      [email protected]
                                      wrote on last edited by
                                      #18

                                      And now we move on to the second item on the agenda: Advanced Protection against Shrubbery and Why We Need It

                                      1 Reply Last reply
                                      0
                                      • T [email protected]

                                        Have you seen Blackhat from Micheal Maan. (I’m no hacker/programmer/or whatever techie)

                                        ? Offline
                                        ? Offline
                                        Guest
                                        wrote on last edited by
                                        #19

                                        Yeah I did. Honestly it's not worth your time.

                                        1 Reply Last reply
                                        0
                                        • S [email protected]
                                          This post did not contain any content.
                                          N This user is from outside of this forum
                                          N This user is from outside of this forum
                                          [email protected]
                                          wrote on last edited by
                                          #20
                                          These, after do many decades, are still stupid funny. I can't help but picture an ugly 13 year old male desperate for companion ship but not receiving any.
                                          1 Reply Last reply
                                          0
                                          • System shared this topic on
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups