What you need to know to do this: YouTube: Hackers have fun ? Namely, what technologies, OSI levels, etc. need to know well?

Closed due to the fact that it was off-topic by Athari , VenZell , andreycha , fori1ton , Yura Ivanov participants on Apr 5 '15 at 14:25 .

It seems that this question does not correspond to the subject of the site. Those who voted to close it indicated the following reason:

  • "Most likely, this question does not correspond to the subject of Stack Overflow in Russian, according to the rules described in the certificate ." - Athari, VenZell, andreycha
If the question can be reformulated according to the rules set out in the certificate , edit it .

6 answers 6

  • The first is to run. It is good to run, because as they catch up, they will give them well.
  • Secondly, you need to understand what is now fashionable to call "smart home" - when light, heat and other communications are centrally controlled. It is clear that if the light is turned on only with a conventional switch, then if you are a hereditary “hacker” in the tenth knee, it will not work. Therefore, it is very good to study electronics and electrical engineering, at least at the basic level of an RTF-type faculty. To be able to hold a soldering iron in your hands is welcome.
  • The third is English. Just a lot of literature on it and with it will be much easier.
  • Fourth, given the latest trends - and Chinese (that would read the docks in the original).
  • Fifth - tetris / shooter to be able to write, then display is not a thing. But you need to be able to. It is advisable to study with ++ / assembler. Other languages ​​do not disdain.
  • And finally - a lot of free time, the desire to learn and not give up and a little luck.
  • 6
    about running around it yes))) - Palmervan
  • 2
    And you need a good lawyer. - skegg
  • 3
    > And you need a good lawyer. That if caught. And on the video - "fake" pure water. In the west, light bulbs are usually energy efficient, with a large delay in switching on. In galaxy at this speed you will not play, and the brightness is the same everywhere :) - mega

I think that for this you need to know well the program for video editing. What we have there is now the most popular, Adobe Premiere, Sony Vegas? Because even a person with basic knowledge of physics, electrical engineering, logic will understand that this is montage and computer graphics. Enumerate all the shortcomings does not make sense, but the picture really looks far from life.

About how you can hack a real smart home, I can quote my teacher, who once said: "If you want to learn how to hack a system, first learn how to protect it." Otherwise, I think other posts have already opened the topic.

  • one
    It is clear that installation. But that's not the point. - skegg
  • one
    to protect it, you need to know how to break it. Do not confuse order. If you have seen spears and bows, you will not put a wall from the tank. - Sh4dow
  • one
    @ Sh4dow, I can argue. A tank is at one time, and a consequence of the fact that the wall is from mines and bows, and the reason is that now the wall will also be from the tank. On the other hand, when there is protection from everything, you need to find something from which there is still no protection. So both of you are right about something. - Dex
  • one
    If you look a little wider than the computers, it becomes obvious that the weapon appeared earlier than the defense) Well, in general, the logic is strange - to hit someone with a sledgehammer, it is not necessary to know how to protect. But on the contrary - still necessary. - Sh4dow

The most important advice for a hacker - a beginner -> hack a resource from your home computer. Start experimenting, then share your impressions.

  • 3
    And for what a minus? Justify please. - Vyacheslav Kirichenko
  • one
    Would you like to hack your resource? - skegg
  • one
    Thank you for your answer, I just wanted, that Mr Egorov would simply first collect relevant information, and then ask frankly stupid questions. - Vyacheslav Kirichenko
  • 2
    If the question is purely theoretical, then this is normal. But I am afraid that the immature youthful brains may, after seeing such nonsense, dare - skegg
  • one
    Good job. Just NEVER LOSE IN AN ALIEN COMP with COMPA, WHICH you can be trite to calculate :) Good luck. - Vyacheslav Kirichenko

Hmm, why for so many years no one even mentioned that one of the most important elements ( if not the most important one ) is the team , like-minded people, people who share interests and are obsessed with a common idea. After all, the very enthusiasm, the true hacker spirit, in which the power is contained, comes from communication and feeling of integrity with them;)


PS And let the video - just a fake, but through it you can clearly see how important teamwork.

    How to become a hacker?

    Becoming a hacker is easy!

    It is enough to learn and understand: mathematical disciplines (mathematical analysis, the theory of functions of a complex variable, algebra, geometry, probability theory, mathematical statistics, mathematical logic and discrete mathematics), engineering disciplines (physics, hardware, computers, radio electronics, communication networks and defense information from technical intelligence), disciplines in programming and computing (computer science, high-level programming languages, programming techniques, language mblera, operating systems, DBMS and computer networks), special disciplines (cryptography, and the theoretical foundations of the protection of computer systems).

    This is a fairly comprehensive list. But if you want to become not a simple hacker, but a real expert in your field, you must also know:

    • cryptographic methods in the protection of state, confidential and commercial information;
    • cryptographic methods in the systems of information protection and decryption;
    • mathematical models of the processes arising from the protection of information;
    • methods for solving probabilistic, statistical and algorithmic problems of cryptographic analysis, synthesis of encryption systems and cryptographic protocols;
    • methods for constructing mathematical models of protected information, ciphers and cipher systems;
    • methods for converting information in networks of various types;
    • ensuring the reliability of the hardware encryption and testing of software and hardware implementations of cryptographic algorithms;
    • general methodology of cryptographic analysis and estimation of the cryptographic strength of encryption systems;
    • identification of information leakage channels by measuring and calculating parameters of dangerous signals;
    • the main provisions of the theory of electrical circuits;
    • basic principles of organization of communication systems and networks, features of modern network architectures;
    • main types of ciphers, cipher systems, cryptographic protocols and security systems;
    • features of the development and maintenance of software for working groups and paraprogramming.

    (c) B.Lavrentiev (COMPUTERWORLD / KIEV)

      Know the fundamentals of the assembler, and be able not to burn the iron with the help of the assembler, and then it will all be done by itself

      • four
        And the Criminal Code. :) Moreover, it is desirable to have several countries at once (the existence of which you accidentally found out) But in general - nonsense. Such videos can be done in batches. It's funny, the main thing is not to take it seriously and ... not to try to repeat it in real life :) - Ruslan