Sahil's Life

Official Blog of Sahil. Get to know interesting stuff

Archive for the tag “profile image”

How to Become a hacker!

So now i am going to post about how to become a hacker for a few days as i get many questions regarding this so i am fed up with those questions!! all of you just sub. to my blog and enjoy!! Happy hacking!

There is a community, a shared culture, of expert programmersand networking wizards that traces its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture originated the term ‘hacker.’

There is another group of people who loudly call themselves hackers, but aren’t. These are people who get a kick out of breaking into computers and phreaking the phone system. Real hackers call these people ‘crackers’ and want nothing to do with them. Real hackers object that being able to break security doesn’t make you a hacker any more than being able to hotwire cars makes you an automotive engineer.

There are people who apply the true hacker attitude to other things, like electronics or music — but in the rest of this article we will focus the skills s of the shared culture that originated the term ‘hacker.’Become a Hacker

THINK LIKE A HACKER

Adopt the mindset of a hacker. Hackers solve problems and build things, and they believe in freedom and voluntary mutual help. To be accepted as a hacker, you have to behave as though you have this kind of attitude yourself. And to behave as though you have the attitude, you have to really believe the attitude. So, if you want to be a hacker, repeat the following things until you believe them:

  • The world is full of fascinating problems waiting to be solved. Successful athletes get their motivation from a kind of physical delight in making their bodies perform, in pushing themselves past their own physical limits. Similarly, you have to get a basic thrill from solving problems, sharpening your skills, and exercising your intelligence.
  • No problem should ever have to be solved twice. The thinking time of other hackers is precious — so much so that it’s almost a moral duty for you to share information, solve problems and then give the solutions away just so other hackers can solve new problems instead of having to perpetually re-address old ones.
  • Boredom and drudgery are evil. When hackers are bored or have to drudge at stupid repetitive work, they aren’t doing what only they can do — solve new problems. To behave like a hacker, you have to want to automate away the boring bits as much as possible.
  • Freedom is good. The authoritarian attitude has to be fought wherever you find it, lest it smother you and other hackers. Not all authority figures are authoritarian, however; authoritarians thrive on censorship and secrecy. And they distrust voluntary cooperation and information-sharing.
  • Attitude is no substitute for competence. Hackers won’t let posers waste their time, but they worship competence — especially competence at hacking, but competence at anything is valued. Competence at demanding skills that few can master is especially good, and competence at demanding skills that involve mental acuteness, craft, and concentration is best.

Learn the Language of Programming

Learn how to program. The best way to learn is to read some stuff written by masters of the form, write some things yourself, read a lot more, write a little more, read a lot more, write some more, and repeat until your writing begins to develop the kind of strength and economy you see in your models. To be a real hacker, however, you need to get to the point where you can learn a new language in days by relating what’s in the manual to what you already know. This means you should learn several very different languages. Besides being the most important hacking languages, the following represent very different approaches to programming, and each will educate you in valuable ways.

  • Python is a good language to start off with because it’s cleanly designed, well documented, and relatively kind to beginners. Despite being a good first language, it is not just a toy; it is very powerful and flexible and well suited for large projects. Javais an alternative, but its value as a first programming language has been questioned.[1]
  • If you get into serious programming, you will have to learn C, the core language of Unix (C++ is very closely related to C; if you know one, learning the other will not be difficult). C is very efficient with your machine’s resources, but will soak up huge amounts of your time on debugging and is often avoided for that reason (unless machine efficiency is essential).
  • Perl is worth learning for practical reasons; it’s very widely used for active web pages and system administration, so that even if you never write Perl you should learn to read it. Many people use Perl to avoid C programming on jobs that don’t require C’s machine efficiency.
  • LISP is worth learning for a different reason — the profound enlightenment experience you will have when you finally get it. That experience will make you a better programmer for the rest of your days, even if you never actually use LISP itself a lot. You can get some beginning experience with LISP fairly easily by writing and modifying editing modes for the Emacs text editor, or Script-Fu plugins for the GIMP.

Familiarize Yourself With Unix

1Get one of the open-source Unixes and learn to use and run it. Unix is the operating system of the Internet. While you can learn to use the Internet without knowing Unix, you can’t be an Internet hacker without understanding Unix. For this reason, the hacker culture today is pretty strongly Unix-centered. So, bring up a Unix (like Linux but there are other ways and yes, you can run both Linux and Microsoft Windows on the same machine). Learn it. Run it. Tinker with it. Talk to the Internet with it. Read the code. Modify the code.

  • There are other operating systems in the world besides Unix. But they’re distributed in binary — you can’t read the code, and you can’t modify it. Trying to learn to hack on a Microsoft Windows machine or under any other closed-source system is like trying to learn to dance while wearing a body cast. Under Mac OS X it’s possible, but only part of the system is open source — you’re likely to hit a lot of walls, and you have to be careful not to develop the bad habit of depending on Apple’s proprietary code.
  • Download Linux online[2] or (better idea) find a local Linux user group to help you with installation.
  • While other distros have their own areas of strength, Ubuntu is far and away the most accessible to Linux newbies.
  • A good way to dip your toes in the water is to boot up what Linux fans call a live CD, a distribution that runs entirely off a CD without having to modify your hard disk. This is a way to get a look at the possibilities without having to do anything drastic.

HTML is Important

  1. 1

    Learn how to use the World Wide Web and write HTML. Most of the things the hacker culture has built do their work out of sight, helping run factories and offices and universities without any obvious impact on how non-hackers live. The Web is the one big exception, the huge shiny hacker toy that even politicians admit has changed the world. For this reason alone (and a lot of other good ones as well) you need to learn how to work the Web. This doesn’t just mean learning how to drive a browser (anyone can do that), but learning how to write HTML, the Web’s markup language. If you don’t know how to program, writing HTML will teach you some mental habits that will help you learn. So build a home page. Try to stick to XHTML, which is a cleaner language than classic HTML.

 

Learn English

  1. 1

    If you don’t have functional English, learn it. English is the working language of the hacker culture and the Internet, and you will need to know it to function in the hacker community. Translations of technical books written in English are often unsatisfactory (when they get done at all). Being a native English-speaker does not guarantee that you have language skills good enough to function as a hacker. If your writing is semi-literate, ungrammatical, and riddled with misspellings, many hackers will tend to ignore you. While sloppy writing does not invariably mean sloppy thinking, the correlation is strong. If you can’t yet write competently, learn to.

 

Earn Respect

  1. 1

    Earn respect as a hacker. Like most cultures without a money economy, hackerdom runs on reputation. You’re trying to solve interesting problems, but how interesting they are, and whether your solutions are really good, is something that only your technical peers or superiors are normally equipped to judge. This is why you aren’t really a hacker until other hackers consistently call you one. Specifically, hackerdom is what anthropologists call a gift culture. You gain status and reputation in it not by dominating other people, nor by being beautiful, nor by having things other people want, but rather by giving things away: your time, your creativity, and the results of your skill.

    • Write open-source software. Write programs that other hackers think are fun or useful, and give the program sources away to the whole hacker culture to use. Hackerdom’s most revered demigods are people who have written large, capable programs that met a widespread need and given them away, so that now everyone uses them.
    • Help test and debug open-source software. Any open-source author who’s thinking will tell you that good beta-testers (who know how to describe symptoms clearly, localize problems well, can tolerate bugs in a quickie release, and are willing to apply a few simple diagnostic routines) are worth their weight in rubies. Try to find a program under development that you’re interested in and be a good beta-tester. There’s a natural progression from helping test programs to helping debug them to helping modify them. You’ll learn a lot this way, and generate good karma with people who will help you later on.
    • Publish useful information. Another good thing is to collect and filter useful and interesting information into web pages or documents like Frequently Asked Questions (FAQ) lists, and make those generally available. Maintainers of major technical FAQs get almost as much respect as open-source authors.
    • Help keep the infrastructure working. The hacker culture (and the engineering development of the Internet, for that matter) is run by volunteers. There’s a lot of necessary but unglamorous work that needs done to keep it going — administering mailing lists, moderating newsgroups, maintaining large software archive sites, developing RFCs and other technical standards. People who do this sort of thing well get a lot of respect, because everybody knows these jobs are huge time sinks and not as much fun as playing with code. Doing them shows dedication.
    • Serve the hacker culture itself. This is not something you’ll be positioned to do until you’ve been around for a while and become well-known for one of the four previous items. The hacker culture doesn’t have leaders, exactly, but it does have culture heroes and tribal elders and historians and spokespeople. When you’ve been in the trenches long enough, you may grow into one of these. Beware: hackers distrust blatant ego in their tribal elders, so visibly reaching for this kind of fame is dangerous. Rather than striving for it, you have to sort of position yourself so it drops in your lap, and then be modest and gracious about your status.
Advertisements

5 Real Life Zombies

The thought of our bodies walking around and operating without our personal conscious or as the more spiritual believe without our soul is an idea that has intrigued and captivated the minds of human beings for centuries. Whether it be the living-dead and body snatchers of Hollywood movies or the stories of voodoo priests using potions to turn rivals into mindless drones to do their bidding, myths, movies, and stories about zombies have been a mainstay in human culture. But the idea of our bodies walking around without freewill or after we have passed may be closer to the realm of the natural than we all thought.

We have all been in the situation where we see a hideous bug in our sink or bathtub and instead of squishing it we take a more timid approach and turn the water on and drown the pest. Imagine you try to that and you watch the ugly sucker spin down the drain. You return to the bathroom later to make the horrifying discovery that the bug had returned from the dead. There are two possibilities: either you have a bathroom infested with bugs or you are dealing with a wolf spider, whose appearance is even more terrifying than its name.

01

LINK

Scientists at the University of Rennes in France collected 120 Wolf Spiders and submerged them underwater and waited for them to die. After all signs of life left their little spider bodies (some stayed submerged for 40 hours) the scientists laid the corpses out to dry so they could later weigh them.

A few hours later the spiders rose from the dead. Even though they were not craving brains, the spiders still appeared to be zombies. When threatened with drowning the spiders enter a comatose state where their metabolism virtually stops and all signs of life cease (the description of this comatose state sounds like death). After things get dry they awake and carry on with their business as if nothing ever happened.

02

LINK

The weta is s large insect (some species growing as large as 4 inches long) that are native to New Zealand. They have a very painful bite and can inflict painful bacteria laced scratches with their spiny legs. Their physical appearance is cricket-like but with a few distinguishing features. These creatures mere existence is terrifying but combine that with the fact that these insects are undead and you have one formidable zombie bug.

The tree weta have a protein in their blood that prevents water from freezing. Weta can survive being frozen alive for months at time in temperatures as low as -10°C by putting themselves in a suspended animation, like Sly Stallone in Demolition Man.

03

LINK

This is an impressive feat, but it is also important to note that while in this suspended animation the weta’s heart and brain dies then recovers upon thawing out. This bug is technically a zombie.

04

LINK

The jewel wasp is a solitary wasp that is known for its bizarre reproductive practice. The wasp stings a roach, herds it like a sheep into its nest, and then proceeds to lay an egg on the roach’s abdomen so its little baby will have plenty to eat upon hatching. So how does this relate to zombies?

The jewel wasp systematically stings the roach in the abdomen. This temporarily paralyzes the roach’s front legs so the wasp can now finish its work. Next, the wasp stings the roach in the brain. The venom of the wasp then disables the roach’s escape reflex getting rid of the cockroach’s will to live.

The wasp has created a zombie roach, but it is not done. Eventually the roach can walk again, but now has no desire to run from the wasp. The wasp then begins walking the roach like dog using the roach’s antenna as a leash. What happens next is perhaps best described by science writer Robert Zimmer: “The zombie roach crawls where its master leads, which turns out to be the wasp’s burrow.” Once there the roach allows the wasp to lay an egg on its abdomen. Then the zombified cockroach quietly sits in the wasps burrow and awaits the egg to hatch. Once the egg hatches, the wasp larva will live inside the roach until it emerges from it as an adult. Good luck getting to sleep tonight…

In the movie Alien, The extraterrestrial species featured lives out a larvae stage inside a host until it reaches another stage and bursts free from the host. What if I told you that Alien is based on a true story and the true story is a bit more horrifying than what was featured in the movie?

05

LINK

Glyptapanteles is a species of wasp that lays its eggs, sometimes as many as 80 at a time, inside a caterpillar, and to ensure that the caterpillar’s red blood cells does not kill the larvae, the mother wasp also injects a virus that occurs naturally in their bodies into the caterpillar, disabling its immune system. The larvae are then free to grow and they eventually chew their way out of the caterpillar. It gets better.

The caterpillar does not die. Instead it spins a coocoon over the wasp larvae to protect them so they can finish developing. The caterpillar also sticks around and protects the cocoon from danger. It’s as if the larvae are somehow controlling the caterpillar’s actions. Even more eerie is that the caterpillar dies at almost the same exact time the adult wasps emerge.

06

LINK

I don’t mean metaphorical human zombies like in the sense that we are all zombies because we lumber about our daily routines, go to our nine-five jobs, come home, go to bed, and repete. Even though that is a great subject for a poem, I mean literal human zombies!

Clairvius Narcisse was a Haitian man who was declared dead on May 2, 1962. His two sisters, Marie Claire and Angelina, buried him in a small cemetery near his hometown. 18 years pass and his family has carried on with their lives. Angelina is in the marketplace of her village when her deceased brother approaches her and introduces himself. How is this possible?

Certain kinds of poisons, like the secretion of a Japanese blowfish, can put someone in a comatose state and make them appear dead even to a doctor. Narcisse had ingested some poison like this and when he slipped into his death-like state was buried. Then someone came and dug him up. Upon awakening he was giving doses of a “zombie powder” which contained the drug Datura stramonium. The drug puts the user in an emotionless, trance-like state, but the user can still perform menial tasks. In Narcisse’s case he was used as slave labor on a sugar plantation. He was a zombie-slave for 18 years.

You don’t like zombies of the voodoo variety? Are you disappointed because when you read “Zombie Humans” you were hoping for overly aggressive, mindless killing machine as seen in almost every zombie movie since Night Of The Living Dead (1968)? Well don’t worry because human zombies like that are not out of the realm of possibility.

Seretonin is a chemical in our brain that helps keep us calm, but according to one scientific study done with mice, it also keeps us from being aggressive killing machines. A group of scientists created a group of mutant mice whose brains lacked the receptors to process seratonin and this resulted in the mice acting overly aggressive toward other organisms. Now Imagine a virus with the ability to prevent human brains from processing seratonin.

07

LINK

You could also imagine a parasite that takes control of our brain and makes us do unimaginable things. Not possible you say? Evolution tells us otherwise. Spinochordodes tellinii is a parasite that gets inside grasshoppers and releases a protein that interferes with their brain and makes them commit suicide by downing. Euhaplorchis californiensis gets inside the brain of killi fish and makes them swim and flop around on the surface of the water so it is more likely for it to get eaten by a bird. There is also a parasite that some scientists believe already changes human behavior.

Toxoplasma gondii is a parasite that is normally found in cats. It gets there by getting into rats through the filth they eat. It affects the rat’s behavior by making them friendlier toward cats so they are more likely to be eaten by said cats. Once inside the cats it begins reproducing (sounds like a morbid Dr. Seuss book). The parasite also gets inside humans and causes no physically harmful effects, but according to one psychological study it does change our personality. The study found that people tend to get more insecure when infected with the parasite (perhaps this explains emo kids). It also changed the personalities of men and women differently. It made men more jealous and suspicious and made women more affectionate.

10 Steps to Master Twitter

I  know that many of people who read AndFarAway are not only very active on Twitter, but use it much more effectively than I do.  The reason I’m writing this post because I am really, really tired of people giving up on Twitter after half a second and then deciding to claim that those who know how to use it are “dumb” and “narcissistic”.

Seriously. It’s easy. Just follow these awesomely easy 10 steps to use Twitter like a rockstar. I mean if all those lame celebrities can do it, I’m sure you can too.

10 Ways to Learn Twitter

1. Download the HootSuite Firefox pluginTweetDeck application, or Echofon Firefox plugin.
Maybe even all three, because the truth is: the twitter.com interface sucks, and you won’t be enjoying Twitter if you’re stuck in your browser window.

2. RT. RT. RT.
RT stands for “retweet”, and you RT a tweet when you want to share something interesting said by someone else with your followers. An RT is like a personal recommendation. It’s very important to RT only interesting stuff, because it defeats the purpose otherwise. Be social. Support tweeps who said something useful or have an event they want to publicize.

3. Reply.
I don’t practice this point as much as I should, but as is the case with blogs, replying to tweets that you were tagged in is really very important.

4. Play Twitter Games.
Twitter games like FollowFriday and MusicMonday can make Twitter more fun and introduce you to interesting tweeps.

5. Share interesting links.
I mean, we all read stuff online all day, and there are so many awesome links that should be shared. Your followers would appreciate a great link, trust me.

6. Keep it simple, stupid.
There’s so much beauty in 140 characters. Mainly that people who shouldn’t blab can’t blab. Anything can be said in such a short format if it’s worth it.

7. Brand yourself consistently.
Choose one Twitter profile image and stick to it, for god’s sake. People who keep changing their Twitter profile pictures are so annoying, because when you’re looking at the stream, you are looking at icons, not names.

8. Schedule tweets.
Use HootSuite or any other similar tool to schedule tweets to assure that your account is constantly updated. Even if it’s a weekend.

9. It’s actually okay to tell your followers what you had for lunch.
As long as that’s not the only thing you say all week.

10. Notice the time pattern.
Depending on where you are in the world, you’ll notice that there are different time patterns. In Jordan, for example, tweeps are most active early in the morning (9:30 AM), around 12:00 PM, and around 4:00 PM. Target your coolest tweets at these times.

I hope this answers the question I am always being asked, “Why the hell do you like Twitter?”

ANY QUESTIONS? OR JUST WANNA TALK OR KNOW INTERESTING STUFF? Then http://bit.ly/ThisIsMyTwitter\

Post Navigation