Find out more about hacking here

Learning to Hacker Chapter 1

learning hacking

Learning to hacker

In this article I will explain the concepts or techniques in hacking activities that are easy to understand in their delivery. Even though the explanation is not very detailed, but the explanation is short and concise, it is hoped that it is enough to understand the basic concepts in the hacker world, and if it is explained more broadly it will take a long time and take more than one chapter to explain it.

I will give examples of hacking actions with the latest system techniques today, addressing the many old articles using the application on old operating systems such as Windows 9x or Windows 2000, as well as using the tools here using the latest tools, although there are old tools but they can still be used. used. efforts were made to find a real hacking system.

To start practicing it, please open your computer or laptop and run Microsoft word then type the following command: rand.old () then press ENTER and see what happens. Logically, nothing should have changed / strange but this article will appear "The quick brown fox jumps over the lazy dog. The quick brown fox jumps over the lazy dog. The quick brown fox jumps over the lazy dog"

That's a glimpse of the magic of technology in the world of computers. What we did just now is known as the easter egg. Just a simple text, but to get the code sometimes we need to learn a lot.

Likewise with the world of hacking, how do we infiltrate a computer or laptop or into someone's system without the owner knowing.

Now we try another code and see the results, or write in the comments column.

Type without the quotes

"= rand (1,1)"

"= lorem ()"

What sentences do you get ??

The method or code above is not part of hacking activities, but at least we know that no matter how sophisticated a system is, there will be weaknesses or irregularities in a program. This hacking action takes advantage of the system's weakness.

This also shows that when a system is built, of course it cannot be separated from the weaknesses, there are certain points that can be exploited to be hacked.

Later in the next chapter we will also discuss how to insert a trojan file into someone else's computer / laptop.

As an opening chapter it is enough just to wait for my next article.

Please follow this blog for more information about learning to be a hacker. Don't forget to bookmark this article so that someday if you need an explanation it's not difficult to find it.

No comments:

Post a comment