Networking 04

Welcome back to another installment of hacking tutorials. If you haven’t read the other previous articles I suggest you start off here. Today we will be going over networking and how it created the hacker into what we know them as today.

A long time ago, when the internet was in its infancy, the only hacker was someone who took computers and made hardware for them, that would either aid them in some way or destroy them. When the internet was established in 1969, it opened a big door for anyone that wanted to be a hacker. The ironic thing is that the hacker culture that we know of today can be dated to 1961, when MIT received the first PDP-1. These early working of the very first hackers were outlined in the first part of Steven Levy’s book Hackers. I suggest that everyone should read that book at least once because it’s a classic.

I personally suggest that you buy a website server and have at least one domain on it. This way you will learn how to do server side stuff on your website while learning web development and making sure your website isn’t too vulnerable to website attacks. You will learn a good bit about networking and the internet in general if you just do this.

Next you are going to want to get a few certs these will ensure that you know the ins and outs of networking and the internet, I will have a couple of links to good certification websites if you would like to check them out in the bottom of this article. Certifications will also help you tremendously if you would like to get a job hacking or even working on network systems in general.

After you have done these things you will be proficient in networking and you will be ready to start the real hacking. By now you should know the ins and out of Linux, how to program like a computer guru (Not using Stack Overflow for every line of your code), and should have a good understanding of networking. In the next part of this series we will go over computer hardware and how it applies to hacking.

Be sure to come back and check out the next article. If you would like a notification to when it becomes available follow us on twitter @hackernews_us. Thanks for reading we appreciate each and every visitor that we have.

Thank you

-Bloodsplatter16