Welcome to the Matrix,Buddha welcomes U,Remember the Matrix has U!!!

                                         

                                        "Welcome to the Matrix"

 

                      Finally a site for knowing everything in hacking. I am matrixguy and am going to tell u all about hackers and hacking "The real meaning of Hacking" Unfortunately publications and journalists all over the world use the word hackers and hacking  in the wrong way, What they don't know is they r not talking about hackers but r talking about crackers"." WHAT CRACKERS".....YES crackers the devils who spoil the name of hackers and get there kicks from destroying data and selling data illegally by getting into the systems of corporate and other firms who have data on the Hard-Disks BUT hackers are totally different from crackers, In fact a u can call them a different spices all together, and they r ashamed of even having there names in the same document as that of a reference of a cracker, hackers r intelligent people and help the society as a whole by finding out the loop holes of the existing systems with data worth billions on them and at the same time make patches for them so no one else can take advantage of the crack in the system.

                                   Sadly, due to the traditional ignorance and sensationalizing of the mass media, the once-noble term hacker has become a perjorative. Among true computer people, being called a hacker is a compliment. One of the traits of the true hacker is a profoundly antibureaucratic and democratic spirit. That spirit is best exemplified by the Hacker's Ethic. This ethic was best formulated by Steven Levy in his 1984 book Hackers: Heroes of the Computer Revolution. Its tenets are as follows:

  Access to computers should be unlimited and total.

Oh dear - no Java!!!! Get some


"Welcome to the Matrix,Buddha welcomes U,......Rememeber the Matrix has U"

As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizard hacker?". Oddly enough there don't seem to be any other FAQs or web documents that address this vital question, so here's mine.

"How to become a Hacker"

                               The literature on hacking is actually quite broad and filled with more than its share of what might be described as indigenous writing – written by self-styled hackers themselves – and popular writing as well. Here are a of approaches to the hacker, approaches which could be seen as representative, and which are certainly current.

Before u go ahed some ETHICS U SHOULD Know  "Hacker Ethics"

                                      One can suppose that any word is slippery, it’s meaning fluid, nudged in one direction or another over time by the practice of society and day-to-day culture. One should be uncomfortable stating that the term "hacking" is any more a Proteus than any other word, but perhaps I will say it anyway; after all, "hack" is one of those verbs which the dictionaries have not caught up with yet, a plastic term which can mean anything from writing to "cutting with rough blows." So we go beyond the dictionaries and enter the movie theatre, where we find hacking bursting from the seams of such films as Sneakers, Johnny Neumonic, The Net, and, best of all, Hackers. Yet this doesn’t seem right either; "hacking" here seems little more than a plot device, perhaps a representation of how "hacking" is preceived, a dramatic tool that might well be a motor boat or a magic wand or something else. A prop.

                                      There has also been significant journalistic and popular writing on hacker culture, the most notable of which has been Bruce Sterling’s The Hacker Crackdown and Hafner and Markoff’s Cyberpunks; these writers tend to employ a journalistic technique of interviewing principles after the events themselves take place. Beyond this, there is a dearth of scholarly work on computer hacking in general, and nothing which I have yet been able to find in the hacking culture.

(INCase U r interested in finding out wheteher u r hacker material or not take this TEST)

HACKERS Purity TEST(ver.1)

(Free Email account for life with hackermail)

                              Later on U can continue with the Ethics and Stuff and if u reading this line after all the things u have read till now on my matrix, You have taken your first step to self enlightment "Welcome To The Matrix!!.Remember The Matrix Has U".....Matrixguy & HackerBuddha Welcome U!!

                     Now u can read about the Culture and the concepts of hacking in here " Hackers Culture " 

                                With all this writing about hackers, one might begin to think that they are like the Carthaginians of the ancient Mediterranean: their history written only by their enemies. But there is a significant body of writing by hackers available, if one wishes to look for it. While academic writing about computer hacking is not common, there are literally hundreds of texts from hackers themselves. In fact, almost the entire construction of "hacking" by hackers takes place in text: the cool ASCII of email, Usenet, and the UNIX command. It is within a textual space that hacking is, for the hackers themselves, constructed.

                                    Ultimately, this is what is important. We see, too often I think, writers making poor guesses about what constitutes hacking. I think of Levy here in particular: certainly, a philosophy of sorts developed around computer hobbyists, a philosophy which was absorbed in part into the "computer community" and into the "hacker community."

                            Maybe it doesn’t matter whether his "hacker ethic" has any legs; I am starting to think of it as a principle of art: Dada into Surrealism into Abstraction, each for the moment right, dragging concepts along with them all through a confused century...........

and remember if u think hacking is all goodies and destroying data and getting in to systems after all the matter i have given above then  u r as disturbed as the guy above in the pic is!!!!!!" Once Again "Welcome to the Matrix" and keep checking this site for further updates, and hey one more thing ,there are plenty of downloads on this page software's,So ur test starts now."Find it and get it"Till then Adios,Chaooo, And take good care of ur self.....

Here below is just a small piece of the electronice version of the hacker's crackdown by Bruce sterling click here for the whole 361pgs book free

aand also an excellent book on "Data for thoughts"some really cool booksONline

his s the electronic version of the famous book by Bruce Sterling the Ultimate book on hackers crackdown right from where it all started(361 pgs) (Click on the applet to stop scrolling)  ff(Enter your Matrix here (Black-box,logs,leaks,and lots more)for further info contact mailto:maxzpai@yahoo.com------U    Uwill get all info regarding how the security systems are so weak and how people take advantage of them

For people who want to learn JAVA and C++ here are few notes from me..

Check out what the latest "Freaks are trying to do hotmail"

Some Links for resources,E-com, E-biz

NeNews update Live!!

next page here

Your are the

1114

Visitor on this page.

Copyright © 1994-2002 Max Ross Pai Inc. All rights reserved

Back Home