Thinking about a programming problem has a general concept higher than any programming language. Hackers often encounter various situations when attacking the target system, which requires him.
Write a program to achieve the purpose of "cracking" or "invading". Hackers' programming level is "refined", generally in two ways: one is to look at other people's programs.
Code. A hacker pays great attention to "practice testing" when watching the program. He is familiar with the function of this code before reading it, and often executes, debugs and follows the program by himself.
Trace it several times until it is completely "digested and absorbed". Second, write your own program. Hackers usually think carefully for a long time before writing programs.
The model, algorithm and framework of the sequence are clear, easy to write and have little debugging time. Unlike us ordinary people, we write in a programming tone.
Trying often takes several times as long as writing code.
Second, study and analyze UNIX seriously (many people also use Linux now). Almost certainly, hackers are masters of UNIX (or Li nux). he
There are two reasons why students are so proficient in UNIX (or Linux): First, they can get the source code. Hackers are hungry for operating system source code. They can
I don't use an operating system, but I can't stand being ignorant of the source code of my own operating system. They read the source code of the operating system and know every operation command.
Internal implementation of. And constantly modify this operating system to make it more powerful and convenient to use. Second, UNIX is the "experimental bed" for intern et. Accounts payable to the United Nations
IX has powerful multi-user, multi-task processing ability and excellent support for large-scale key applications. All Internet applications are tested for the first time on UNIX platform.
Work, such as WWW, FTP, Telnet, E-mail, etc. So the * * * between Unix and In ternet has reached an unbreakable level, so that people
When it comes to network operating system, I think of UNIX (or Linux). Thirdly, UNIX is the most widely used platform for large servers. There are many versions of UNIX, but its core
It's basically the same. Although Microsoft has always claimed that its NT has occupied more than half of the server market, NT is mostly used by individual users, which is the key to adaptation.
Few eNTerprise servers use nt. It is reported that 65% of servers in the US government and military use Solaris (UNIX version of Sun Company).
Make a system. Hackers usually target large servers, not personal computers.
Third, use common Internet services and study their protocol standards. "Geographical location" is a major advantage of the establishment of diplomatic relations between the two countries; You must study it carefully before you can compete with the best players.
Duel field; Internet is the battlefield where hackers "wage war", so hackers naturally need to be familiar with and master it. For hackers, it is necessary to attack through the Internet.
Strike at each other, but if you are proficient in Internet protocol, you can use the weakness of the protocol itself to restrain each other's "fighting power" and increase your "killing power".
Achieve the goal of "invincible without network".
Fourth, use the World Wide Web and learn to write HTML.