How do Hackers Look Like and What They Think?

How do Hackers Look Like and What They Think?

How do Hackers Look Like and What They Think?

EDUCATIONAL PROFILE: Almost all hackers finished college or reached that level by self-education. Self-educated hacker is  more respected in hackers community because you really need to have passion to become professional hacker. The most common areas in which people can engage in hack, with computers electrical engineering, physics, mathematics, linguistics and philosophy. However, as every developer is not necessarily the hackers, so hackers do not always have the skills of programming (I think they have to know programming)!

DRESS STYLE: Hackers are dressed simply, casually: jeans, T-shirt and shoes. T-shirts are usually with some humorous slogans. By 1990, they were distributed T-shirts with computer imagery, but as the hacker culture eventually developed their own symbols, today there are T-shirts with pictures of Penguin (trademark Linux) or daemon (BSD). A small number of hackers prefer hiking boots. After 1995, hackers are falling under the influence of punk, gothic and rave subculture. This was reflected in the wearing of black clothes. Hackers care more about comfort, functionality and ease of maintenance wardrobe. They don’t like business suits. Even if they wear it, be sure to break the conventionality with a humorous tie.

OTHER INTERESTS: Hobbies that hackers exercise are widespread. These are primarily science fiction, music, medievalism, chess, war games and intellectual games of all types, logical puzzles and other areas that are closely related to hacking or that include linguistics and acting.

THINGS HACKERS AVOID: On this list are all Microsoft products, Smurfs and all forms of striking beauty. THEY HATE bureaucracy and stupid people, do not like to listen to soft music, or to watch television, except for cartoons and science fiction films. THEY HATE dishonesty, incompetence and boredom. From programming languages avoid COBOL and BASIC, as well as programs whose appearance is based on the text (not the icons).

PHYSICAL ACTIVITY AND SPORT: The largest number of hackers are generally not engaged in physical activities. Some of them practice it, but interest in the sport is not that big. Avoid team sports. Hacker sports are always individual, including concentration and motor skills: cycling, auto racing, skating, sailing, hiking, gliding … (I actually like to play football, but hate to watch it and I don’t have any favorite team).

Most hackers consume cigarettes and alcohol. In 1995, there was a trend among Linux hackers to drink exotic beers, influenced by Linus Torvalds who like Guinness. The limited use of cannabis, LSD, nitrus oxide used to be more accepted than in mass culture. On the other hand, the use of opioids is rare because hackers do not want to use a drug that blunts them. Most hackers use a coffee and / or sugar (ENERGY DRINKS, mmm 😉 ) in order to stay up all night during the hacking.

 
2 Kudos
You are
awsome 🙂

How to upgrade your ordinary router with functionality of a high cost one with Tomato firmware

router

Here is how to install Tomato firmware on your cheap Wi-Fi router to attain functionality of a high cost router.

What if you could simply enhance your router’s functionalities just by some software alteration. well, Few people understand why some routers cost $15 and some hundreds of dollars.

There are hardware differences and… software differences.

Using a custom firmware (if supported by the router) can give you options/features available on much more expensive hardware.

Such a firmware is Tomato USB. Its an open source firmware for Broadcomm based routers.

The first step is to see if your router is supported by Tomato, so please check Shibby Tomato Builds. If it is, get the newest version and flash it on the administration interface.

Usually, there are some flavors: AIO (All in One) or VPN (few features, smaller size, perfect for most users).

If it cannot be flashed through Web interface (like Asus RT-N53), you must use the emergency procedure (see router documentation) to upload the custom firmware to the router.

After you install and set up all the usual settings on Tomato (WIFI, LAN etc.), you can go further, and with some work, you can install many programs, for example a webserver with PHP support or Transmission Torrent client (the router must have USB ports).

Different routers have different flash memory sizes. Inside the flash reside the firmware and settings. Depending on the flash size and firmware size (VPN or AIO), some unused space might still remain, so you can create a JFFS partition to install software. This is critical for routers without USB or if you do not want to use a USB drive. If you do want to use a USB drive, read here how to create a partition, and after you create it, continue this tutorial from Step 3.

Okay lets start.
Step 1: Create a JFFS partition.
Go to Administration – JFFS – Enable – Format Erase

In the text box paste:

mount -o bind /jffs /opt

Wait a few minutes, and if you do not get any message, reboot the router.

Step 2:
Go to Administration – Admin Access and modify the default port settings for router administration (ex: 8082).
This will allow you to access your router on specified port.

http://ip_router:8082
default: http://192.168.1.1:8082

Step 3:
3. Access the router on SSH using Putty (Windows) or Terminal (Mac).

On Mac, the command is:

ssh -l root IP

Username must be root and the password of the admin user.

Step 4:
Install Optware package manager by using the following code.

cd /tmp

wget http://tomatousb.org/local–files/tut:optware-installation/optware-install.sh -O – | tr -d ‘\r’ > /tmp/optware-install.sh

chmod 755 optware-install.sh

sh optware-install.sh

Note that it may take time depending on your internet speed and your router’s processing power.

Step 5:
Install nano (text editor), lighttpd (webserver), and PHP

ipkg install nano
ipkg install lighttpd
ipkg install php-fcgi

Step 6: Edit the lighttpd configuration file.

nano /opt/etc/lighttpd/lighttpd.conf

and add this:

server.event-handler =”poll”

Modify the default running port of the webserver (default is 8081).

server.port = 80

Save everything and close nano.

Step 7:
Restart the webserver.

/opt/etc/init.d/S80lighttpd restart

Now you can put files and scripts in /opt/share/www/

If you want your webserver to be accessible from WAN, you need to add those lines to the Firewall script (Administration – Scripts – Firewall):

iptables -t filter -A INPUT -p tcp –dport 80 -j ACCEPT
iptables -t filter -A INPUT -p tcp –dport 443 -j ACCEPT

Its done! now enjoy the features on your budget router. Do post your queries or suggestions in the comments.

 
1 Kudos
You are
awsome 🙂

The 11 Phases of a Web Developer’s Career (As Illustrated by Memes)

The career of a web developer is an interesting one with many slopes. Considering a learning curve this steep, you can fully expect to live through periods of frustration, enlightenment, self-righteousness, and every mindset in between. In this article, we’ll have some fun, by reviewing each of these phases through the lens of a meme!

Complete Noob

We all have warm feelings for the early days of our careers; the period when you have absolutely no clue what you’re doing. Like a fish out of water, each new line of code is a mystery. Doctype? Huh? What the heck does a <div> do? The first phase is an intimidating, scary, but exciting one. How many dang languages are there?

(more…)

 
10 Kudos
You are
awsome 🙂

Top 10 JavaScript Libraries For Web Projects

web tools, web development, web development framework, javascript, libraries, JS, node.js, IO.js, Intercooler,js, matter.js, immutable,js, format,js, anima.js, is.js, miniblock.js, conditioner.js.

There are number of tools available on the Internet to help you with your development project. You can refer to online guides to get all the necessary information that you need in your coding project. In case of web development, developers prefer JavaScript for front-end development. This scripting language is relatively easy to use and create intriguing user interface for website and web apps. Today we have listed top ten JavaScript libraries that you can use for your web project in this year.

(more…)

 
4 Kudos
You are
awsome 🙂

Password secrets: Your Passwords Aren’t As Secure As You Think

There is one thing that make us so vulnerable is ignorance. Today, everything is going to be depended on the internet. Yes, and you know it better! and a concept that we use to secure our internet accounts and all is our passwords. but is it enough to set password and feel that we are secure? Are you really aware about of how to use passwords?

(more…)

 
3 Kudos
You are
awsome 🙂

The Life of a PHP Developer

People are really mean about PHP.

I read this great article the other day about How False Stereotypes Turn Into Technical “Truths”

Subjective perceptions about languages impact more than just debates between idling programmers, affecting important decisions like hiring and funding.

(more…)

 
3 Kudos
You are
awsome 🙂

How To Find Out Who’s Behind That Email Address

Picture this. You have received an email claiming that you have won some prize or amount in a lucky draw or maybe you’ve received an email that looks quite interesting. Before you can trust the message conveyed via email and before sending your reply, it’s important that you properly identify the person who is associated with this email. (more…)

 
12 Kudos
You are
awsome 🙂

Ultimate Guide To Web Optimization (Tips & Best Practices)

Web optimization is a vital part of web development and maintenance but also something often overlooked by webmasters. Just think of the money you can save, and how it can potentially help increase your readership and traffic when they are properly done.

web optimization guide

If you have not done any optimization to your website (or blog) so far or merely curious how it can help speed up your site, please take a look at this list of optimization tips we’ve put together. (more…)

 
5 Kudos
You are
awsome 🙂

Coinbase Review

Coinbase Review: A+

 

In my mind, nothing comes close to Coinbase in terms of ease of use and security. You link a bank account to the San Francisco-based start-up, and then send them money to buy Bitcoin at the currently offered price. They wait up to a few days to ensure your transaction clears (Bitcoin is a murky financial area, and they don’t want to risk identity theft or other problems until they have banks on their side), (more…)

 
5 Kudos
You are
awsome 🙂