How to tell if your son is a hacker - Complete Bull$hit!!!
GeneralThis forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
"the crazy names of each Linux release hint at its renegade nature."
"In these times when hacking and viruses are commonplace, it defies belief to learn that
no anti-virus software is available for Linux. To add insult to injury, there is no Linux version of
the popular ZoneAlarm firewall. By using Linux, you are issuing an open invitation to the
hordes of ne'er-do-wells on the Internet."
Distribution: Ubuntu 11.4,DD-WRT micro plus ssh,lfs-6.6,Fedora 15,Fedora 16
8. Is your son obsessed with "Lunix"?
BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called "xenix", which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the "mp3" program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone.
Your son may try to install "lunix" on your hard drive. If he is careful, you may not notice its presence, however, lunix is a capricious beast, and if handled incorrectly, your son may damage your computer, and even break it completely by deleting
Windows, at which point you will have to have your computer repaired by a Professional.
If you see the word "LILO" during your windows startup (just after you turn the machine on), your son has installed lunix. In order to get rid of it, you will have to send your computer back to the manufacturer, and have them fit a new hard drive.
Lunix is extremely dangerous software, and cannot be removed without destroying part of your hard disk surface.
you're right, total bull$hit, 'lunix'?, BSD? Mandrake? Debian? ILLEGAL HACKER TOOLS? how can Anyone except a total ignoramus, or a representitive of Microsoft, be that stupid, after all those operating systems (linux) are also used by VERY serios professionals from big corporations. and there are books on the subject at barnes and noble bookstores and the library telnet, a hacker program? no more a hacker tool than a dumb terminal and UNIX wasn't developed by MS, it was developed by bell labs yes, very hoaky.
Popular hacker software includes "Comet Cursor", "Bonzi Buddy" and "Flash" - er, yeah, ok matey. Whatever you say.
AMD chips are never sold in stores - no, they don't sell them in your local supermarket.
A few titles to be on the lookout for are: "Programming with Perl" by Timothy O'Reilly and "The Cathedral and the Bazaar" by Eric S. Raymond. - hmm, really?
5. How much time does your child spend using the computer each day? (couldn't be bothered to post entire section) - oh, please. At least get the fscking terms right!
Quake is an online virtual reality used by hackers. It is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms. - how many people have you ever seen trying to fire off a .45 by holding a joystick or looking for its <alt> button?
Even when confronted, your son will probably find it difficult to talk about this problem to you. He will probably claim that there is no problem, and that you are imagining things. He may tell you that it is you who has the problem, and you should "back off" and "stop smothering him." - hmm, sound like stereotypical teenager-hood, not hacker/crackerdom.
an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos - I thought he was from Europe and now worked in this guy's beloved country (no offence to any Americans here). And I would love to hear how a program called telnet can break into other peoples computers without using a phone line.
My favourite, however, has to be the following:
In extreme cases, over-exposure to computer radiation can cause schizophrenia, meningitis and other psychological diseases. - Now, being a Biology degree student I find this exceptionally interesting, how computer radiation (which should be minimal since your hacker son has asked for a nice new bloody expensive monitor) can cause bacterial/viral infection (meningitis).
Well, if I wasnt's ROTFLMBO I would find this quite offensive. But, hey, it's all fun and games.