Are hackers really that magical?

For this topic, I think I still have the right to speak, because I have been engaged in this industry in 2008 and it has been the eighth year. How did you get into this industry? It's ridiculous to say because there was no cable TV installed at home at the time, and I was in junior high school at the time. It happened that I was an avid sports fan during the Olympics, so I could only go to Internet cafes to watch live broadcasts. I didn’t have a few yuan in my pocket and couldn’t go on for a long time, so I broke the login system of the Internet cafe so that I could watch the Olympics for a day with 5 yuan. This was my first hacking operation. Is it amazing? do not think so.

Since I had the last experience, I have become more and more fascinated by the Internet world, and I faintly feel that this is a good opportunity for me to come back.

Speaking of whether this industry is miraculous, I think it is necessary to distinguish what level of hacker it is. In this world, a group of people can hack into the central bank of any country to withdraw funds from their accounts through a computer. Even some hackers can even enter the national defense system, and he can mobilize all the aircraft, warships and submarines of the country with one click of the mouse. Such hacks are magical. They are the hacker gods.

I've seen a group of people yelling loudly and telling everyone around them that they are hackers. But they're not, they're mostly teenagers with a few sabotages of computers and cell phone systems. It's no big deal to specifically undermine other people's sense of security. In fact, acting specifically for the purpose of destroying other people's security does not make you a hacker. Just as being able to steal a car with wire doesn't make you an automotive engineer.

There are also a group of white hat hackers who work for major network security companies or corporate security departments. Their work includes monitoring vulnerabilities, killing Trojan horses, and repairing systems. From an unruly young man who does not obey the rules and makes trouble everywhere in the virtual world, to a geek who abides by industry rules and keeps himself safe is a process that many people have experienced. In exchange, the institutions they work for provide them with a secure identity, a platform with maximum freedom to attack, and a decent salary. Such people can only be called programmers or more advanced network engineers, but they are by no means hackers.

Real hackers have their own cultural idiosyncrasies. It takes someone with these qualities to become a hacker. And hackers are masters. They can help you learn and provide you with continuous motivation. If you also want to be a hacker, the most important thing is to imitate their spirit, emotion, and imitate their creative artistic atmosphere. That way I believe you will become a well-known hacker.

at last

Statistics show that there is currently a gap of 1.4 million cyber security talents in China...
Whether you are a cyber security enthusiast or a practitioner with certain work experience,
whether you are a fresh graduate or a professional who wants to change jobs ,
you all need this job. super super comprehensive information
almostBeats 90% of self-study materials on the market
And covers the entire network security learning category
to bookmark it!It will definitely help your study!

Friends, if you need a full set of network security introduction + advanced learning resource package, you can click to get it for free (if you encounter problems with scanning codes, you can leave a message in the comment area to get it) ~

CSDN spree: "Hacker & Network Security Introduction & Advanced Learning Resource Pack" free sharing

insert image description here

1. A full set of toolkits and source codes necessary for network security

insert image description here
insert image description here
insert image description here

2. Video Tutorial

Although there are a lot of learning resources on the Internet, they are basically incomplete. This is the online security video tutorial I recorded myself. I have supporting video explanations for every knowledge point on the road map.
insert image description here

3. Technical documents and e-books

The technical documents are also compiled by myself, including my experience and technical points in participating in the network protection operation, CTF and digging SRC vulnerabilities.
insert image description here

I have also collected more than 200 e-books on Internet security, basically I have popular and classic ones, and I can also share them.
insert image description here

4. NISP, CISP and other certificate preparation packages

insert image description here

5. Information security engineer exam preparation spree

insert image description here

6. Interview questions for network security companies

The interview questions about cyber security that have been sorted out in the past few years, if you are looking for a job in cyber security, they will definitely help you a lot.
insert image description here
insert image description here
Friends, if you need a full set of network security introduction + advanced learning resource package, you can click to get it for free (if you encounter problems with scanning codes, you can leave a message in the comment area to get it) ~

CSDN spree: "Hacker & Network Security Introduction & Advanced Learning Resource Pack" free sharing

Guess you like

Origin blog.csdn.net/2301_76168381/article/details/132156397