Page 2 of 2 FirstFirst 12
Results 11 to 14 of 14
  1. #11
    Junior Member
    Join Date
    Feb 2003
    is the word 'hacking' forbidden ?, surely if a system is secure, it should be able to handle multiple hacking attemps, how else are we to be re assured that a particular server is indeed safe, bank's employ hackers to check there on-line security all the time, i beleive hacking is an essential part of evolving systems.
    If anybody else thinks im daft, let me know, and ley me why ?

  2. #12
    Trumpet-Eared Gentoo Freak
    Join Date
    Jan 2003
    No, 'Hacking is not forbidden' , but it's just the way you ask things about it.
    It's just the way you formulate things. Lots of newbies try a little 'social engineering', like
    ' Hey, I have this OS, how can i in without noticing ?'. The most around here aren't dumb , they see immediatly what those want to have.

    As Alcatraz said :

    Where can I learn about hacking?
    At lots of places. Try doing a search on the subject at www.google.com. There are hundreds and thousands of these sites. Here’s the link to the Hacker FAQ at the alt.hacker forum: http://www.antionline.com/showthrea...perating+system . /Quote

    Hope this helps you,

    Come and check out our wargame-site @ http://www.rootcontest.org
    We chat @ irc.smdc-network.org #lobby

  3. #13
    Join Date
    Dec 2002
    Nice 1,
    straight good informative stuff that really useful.
    keep it up

  4. #14
    Junior Member
    Join Date
    Jul 2003
    I noticed the programming languages brought up. I have took classes on HTML, C++, and an Intoduction to Java. I was wondering how important do everyone here think JAVA is? The intro course did not really cover a lot, and I have to pick another class soo- would some other lang be more useful or should I go for advanced JAVA? Thanks for any input.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts

We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.