Image default
Softbook

Softbook 4 DAYS BEING A HACKER

This is a book is little bit a thing in that time, and now it has become an old school technique, but i think its okay for sharing knowledge. Free softbook:

Hackers and their communities, especially in Indonesia are already very well known in the world … but the most famous is the crime that is often committed. People who like hackers are people who like to rob, being a bandits, being a gangsters, network brokers and those who are even more sick are people credit card breaker. This is marked by the term ‘hacker stuff’, which is the item obtained by breaking into another person’s CC (Credit Card). Maybe as a person who does not know the hacker manifesto, I think it’s normal. but who knows about that ?? um, you want to be considered as a carder who is actually a criminal ??? Kekekekekek! This Is Absolutely Misguided !!! Nor can the hacker community be included in this misguidance, the underground community or other communities labeled as troublemakers. Unfortunately, the community only provides lessons that are not in formal or permanent schools in Indonesia. Is it wrong for a community to teach a science? Is it wrong for a hacker to break into the system just to find out about the security hole. so do the virus makers ?? is it wrong that the programming experts share knowledge about community virus system programming? Or the Indonesian nation has diluted the idealism that science is only for yourself? The conclusion is better hacker communities develop on this Indonesian earth. Compared to government officials who make a RUU (ITE and so on) that cannot yet be upheld as upright or make an MOU with one of the largest software in the world that aims to improve themselves, not to make a better world through computers.

CHAPTER I

SEKURITI SEEN FROM THE VIEW OF A THIEF AND A HACKER

What is this??? Equate a hacker with a thief ??? Hahahahah no is not, hackers have nothing to do with thieves, but thieves have little to do with a hacker …. but only a few, or little do they intersect … umh …. Both smart and clever , but different apply for sciences. For example, if hackers work, they penetrate the computer network, but if thieves penetrate the door of the victim’s home

chapter II

SEARCH AND RESEARCH INFORMATION A SERVER

Finding and observing server information is very important, how can you approach a women (future lover) if you do not know the information about your crash, as well as the server, how can we break down the server without knowing all the information about the server …

chapter III

MEDITATE LEARNING HACKING STANCE

To be able to foster server, you have to know the moves first, share the server without a solution, just like you fight without weapons, or carry weapons but with empty bullets and ammunition …

Chapter IV

DOWN THE MOUNTAIN TO PRACTICE SCIENCE HACKING

The implementation of the moves you have learned is very important in the world of hacking. Prove that you already understand the theory now just go down the mountain to bring a laptop or computer and practice it

Chapter V

DAMNN… GET ARRESTED

Being a hacker is new goal for kids nowdays, but don’t forget, as long as Indonesia still has a very weak law or Cyberlaw Act, its influence will have no effect … but if the law in Indonesia is enforced upright … wkwkwkwkwkwk maybe there might be experiences like this…

Please download the softbook here:

4 DAYS BEING A HACKER

 

Related posts

Softbook LIBAS VIRUS LOKAL

adminviro

Softbook BOOK OF ARTS PROGRAMMING VIRUS

adminviro

Leave a Comment