A Hacker’s Code of Ethics – Must knows for a hacker

Code_of_ethics

In Short: What a hacker needs to know? We are going to talk about the ethics of Hacking.

As long as there have been computers,  there have been hackers. In the 50’s at the Massachusetts Institute of Technology (MIT), students devoted much time and energy to ingenious exploration of the computers. Rules and the law were disregarded in their pursuit for the ‘hack’. Just as they were enthralled with their pursuit of information, so are we. The thrill of the hack is not in breaking the law, it’s in the pursuit and capture of knowledge. To this end, let me contribute my suggestions for guidelines to follow to ensure that not only you stay out of trouble, but you pursue your craft without damaging the computers you hack into or the companies who own them.

  •  Do not intentionally damage  any  system.
  • Do not alter any system files other than ones needed to ensure your escape from detection and your future access (Trojan Horses, Altering Logs, and the like are all necessary to your survival for as long as possible.)
  • Do not leave your (or anyone else’s) real name, real handle, or real phone number on any system that you access illegally. They can and will track you down from your handle!
  • Be careful who you share information with. Feds are getting trickier. Generally, if you don’t know their voice phone number, name, and occupation or haven’t spoken with them voice on non-info trading conversations, be wary. V. Do not leave your real phone number to anyone you don’t know. This includes logging on boards, no matter how k-rad they seem. If you don’t know the sysop, leave a note telling some trustworthy people that will validate you.
  •  Do not hack government computers. Yes, there are government systems that are safe to hack, but they are few and far between. And the government has infinitely more time and resources to track you down than a company who has to make a profit and justify expenses.
  • Don’t use codes unless there is NO way around it (you don’t have a local telenet or tymnet outdial and can’t connect to anything 800…) You use codes long enough, you will get caught. Period.
  •  Don’t be afraid to be paranoid. Remember, you are breaking the law. It doesn’t hurt to store everything encrypted on your hard disk, or keep your notes buried in the backyard or in the trunk of your car. You may feel a little funny, but you’ll feel a lot funnier when you when you meet Bruno, your transvestite cellmate who axed his family to death.
  • Watch what you post on boards. Most of the really great hackers in the country post nothing about the system they’re currently working except in the broadest sense (I’m working on a UNIX, or a COSMOS, or something generic. Not “I’m hacking into General Electric’s Voice Mail System” or something inane and revealing like that.)
  •  Don’t be afraid to ask questions. That’s what more experienced hackers are for. Don’t expect everything you ask to be answered, though. There are some things (LMOS, for instance) that a beginning hacker shouldn’t mess with. You’ll either get caught, or screw it up for others, or both.
  • Finally, you have to actually hack. You can hang out on boards all you want, and you can read all the text files in the world, but until you actually start doing it, you’ll never know what it’s all about. There’s no thrill quite the same as getting into your first system (well, ok, I can think of a couple of bigger thrills, but you get the picture.)

One of the safest places to start your hacking career is on a computer system belonging to a college. University computers have notoriously lax security, and are more used to hackers, as every college computer department has one or two, so are less likely to press charges if you should be detected. But the odds of them detecting you and having the personal to commit to tracking you down are slim as long as you aren’t destructive. If you are already a college student, this is ideal, as you can legally explore your computer system to your heart’s desire, then go out and look for similar systems that you can penetrate with confidence, as you’re already familiar with them. So if you just want to get your feet wet, call your local college. Many of them will provide accounts for local residents at a nominal charge. Finally, if you get caught, stay quiet until you get a lawyer. Don’t volunteer any information, no matter what kind of ‘deals’ they offer you. Nothing is binding unless you make the deal through your lawyer, so you might as well shut up and wait.

Courtesy – 1000 Hackers tutorials

2 Comments

  1. Ebin K Baby August 10, 2016
    • leaswin August 10, 2016

Leave a Reply

Share This

Sharing is Caring

Share this post with your friends!