tag:blogger.com,1999:blog-3121270199089759062.post989247432046017585..comments2023-10-21T01:13:03.832-07:00Comments on RHA Blog: 100 Ways To Become A Better HackerRafayhttp://www.blogger.com/profile/15944091083959815608noreply@blogger.comBlogger101125tag:blogger.com,1999:blog-3121270199089759062.post-16337454075583154982016-01-16T20:42:19.136-08:002016-01-16T20:42:19.136-08:00"Hacking is an art of exploiting humans stupi..."Hacking is an art of exploiting humans stupidity" Rakesh Manehttps://www.blogger.com/profile/12631994956299059263noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-50782338261940365442016-01-12T01:26:17.934-08:002016-01-12T01:26:17.934-08:00“Pollution is quite similar to hacking which can b...“Pollution is quite similar to hacking which can be instantly prevented but, cannot be permanently stopped” - Sathishamazinghuman.inhttps://www.blogger.com/profile/13470552032845225947noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-4720207420304162982014-01-12T06:40:42.035-08:002014-01-12T06:40:42.035-08:00Learn not only Programming and Networking Learn th...Learn not only Programming and Networking Learn the hole system.<br />Learn Every Security update.<br />Learn Learn And learn and also work work and work make you a best Hacker ...Ultimatricshttps://www.blogger.com/profile/01100019554883434170noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-39784930063678986572013-11-23T09:38:03.290-08:002013-11-23T09:38:03.290-08:00Learn Learn and Learn...Either Learn or become obs...Learn Learn and Learn...Either Learn or become obsolete . Anonymoushttps://www.blogger.com/profile/02496621376393020122noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-30308832778330797982013-11-23T08:58:34.220-08:002013-11-23T08:58:34.220-08:00The person who seeks and exploits weaknesses in a ...The person who seeks and exploits weaknesses in a computer system /computer network who are actually expert programmers and networking wizards who do work on open-source software.They are labeled 'nerd' as a badge of time they spent and ‘geek’ as a badge of pride.<br />PARANTHAMANhttp://www.facebook.com/behindinternetnoreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-37966112299395613812013-11-23T06:06:48.899-08:002013-11-23T06:06:48.899-08:00A good hacker is not one who use his knowledge for...A good hacker is not one who use his knowledge for good or positive purposes <br />but a good hacker is one who hack and never get caught :D<br />shayan malikAnonymoushttps://www.blogger.com/profile/04347308540669035668noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-46468705864352097112013-11-23T06:04:00.427-08:002013-11-23T06:04:00.427-08:00a good hacker is one who always ready to get chal...a good hacker is one who always ready to get challanges because he knows nothing in IT world is impossible for him he/she always ready for new chellenges to test his/her abilitiesAnonymoushttps://www.blogger.com/profile/01597042798511720710noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-33374979057892035722013-11-23T06:03:39.878-08:002013-11-23T06:03:39.878-08:00a good hacker is one who always ready to get chal...a good hacker is one who always ready to get challanges because he knows nothing in IT world is impossible for him he/she always ready for new chellenges to test his/her abilitiesAnonymoushttps://www.blogger.com/profile/01597042798511720710noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-9775655728977887042013-11-23T06:02:07.819-08:002013-11-23T06:02:07.819-08:00A good hacker is not one who use his knowledge for...A good hacker is not one who use his knowledge for good/positive purposes but a good hacker is one who hack and never get caught :D<br />Shayan Malik Anonymoushttps://www.blogger.com/profile/04347308540669035668noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-16249868629098013632013-11-23T05:55:26.296-08:002013-11-23T05:55:26.296-08:00Behind every successful Coder there an even more ...Behind every successful Coder there an even more successful De-coder to understand that codeAnonymoushttps://www.blogger.com/profile/16229069708275870822noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-68942774936882780502013-11-23T04:58:19.129-08:002013-11-23T04:58:19.129-08:00just read about security and you will understand h...just read about security and you will understand hacking also.aqibhttps://www.blogger.com/profile/03891647931116994027noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-43690637923128015472013-11-23T03:18:14.091-08:002013-11-23T03:18:14.091-08:00What can be created, can be destroyed. Nothing is ...What can be created, can be destroyed. Nothing is completely secure, not even your mind, you just have to find a way to hack it. Real life manipulation or social engineering is also a part of hacking (Mind Hacking), get interested into it, if you don't like digital technicality.Tyson Kinghttp://pc-techie.blogspot.comnoreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-9996027541000884612013-11-23T02:31:18.409-08:002013-11-23T02:31:18.409-08:00its all about passion you have, without this Aha n...its all about passion you have, without this Aha not possible at all.saifullah qayoominoreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-19576125728126494942013-11-22T07:43:58.804-08:002013-11-22T07:43:58.804-08:00Heyy...i want to learn hacking..so please tell me ...Heyy...i want to learn hacking..so please tell me which e-books i should prefer Anonymoushttps://www.blogger.com/profile/11440683825089619160noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-81883764823602389092013-11-10T09:50:04.139-08:002013-11-10T09:50:04.139-08:00Whenever you are given a account to hack(let's...Whenever you are given a account to hack(let's say a account that can be hacked easily),never feel it below your dignity.A real hacker is a hacker that makes most of his opportunity.<br />Makrandhttp://techbiz.tknoreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-42922437908850716762013-11-09T16:03:15.097-08:002013-11-09T16:03:15.097-08:00Don't call yourself a hacker because you can d...Don't call yourself a hacker because you can do x with a tool. True hackers don't label themselves as a hacker.<br /><br />PS: Python, a programming language? Disagree, it requires an interpreter instead of being compiled.Jazzlenoreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-21708584495081615062013-11-09T01:39:45.319-08:002013-11-09T01:39:45.319-08:00Be anonymous and leave no traces~SriramBe anonymous and leave no traces~SriramAnonymoushttps://www.blogger.com/profile/02866959293341703968noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-55061938555276365322013-11-09T01:28:17.517-08:002013-11-09T01:28:17.517-08:00To be a better hacker, become an IT professional f...To be a better hacker, become an IT professional first. Then fill the gaps through broadly studying and practicing. The most important thing - DO NO HARM !!Rolandhttps://groups.google.com/forum/#!forum/cissptaiwannoreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-66225931033019127672013-11-09T00:35:37.783-08:002013-11-09T00:35:37.783-08:00Think different, be a HackerThink different, be a HackerAAAnoreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-43388678650563189862013-11-08T22:50:09.549-08:002013-11-08T22:50:09.549-08:00Don't ever hack from your home use cafe wifi o...Don't ever hack from your home use cafe wifi or internet cafe LAN ,Always use VPN and proxy and encrypt your trafficVishwahttps://www.blogger.com/profile/10196193303154359671noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-14175375286958476642013-11-08T20:08:06.462-08:002013-11-08T20:08:06.462-08:00If web application hacking - Start off with HTML t...If web application hacking - Start off with HTML then to JS, PHP, backend DBs, basics of JSP/ASP<br />If native application hacking - The specific language in which the program is written in, assembly<br />If you want to build malwares - CPP, Assembly, reverse engineering concepts<br />Hacking is a really wide field, decide on what you want to do and proceed.. Chrystzhttp://chrystz.blogspot.innoreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-14906316941191508012013-10-21T11:37:44.482-07:002013-10-21T11:37:44.482-07:00if you want to learn hacking to veneer yourself th...if you want to learn hacking to veneer yourself then you will never able to become hacker (simarcingh)simarcinghnoreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-14228917290975293212013-09-14T11:04:27.953-07:002013-09-14T11:04:27.953-07:00I am going to take a Seminar on Ethical Hacking at...I am going to take a Seminar on Ethical Hacking at my uni on Mon, lets see how it goes.<br />I love Hackerz, but did'nt know it Professionally yet. I am SEO by Profession & goes deep inside things & explore them out<br />Is it necessary to know Coding & Programming to Hack? or just Assumption works etc.. :)<br />Rep if poss thnxAli Razanoreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-68522760286477158622013-08-25T05:37:16.154-07:002013-08-25T05:37:16.154-07:00Always Stay Hunger to learn And Hacking is not onl...Always Stay Hunger to learn And Hacking is not only about web/software try for Hardware Hacking As well Think different ,never give up try till you reach success that's what make you a real hacker. Chandrakanthttps://www.blogger.com/profile/16213734564468622554noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-4837113439565376792013-08-11T13:38:48.897-07:002013-08-11T13:38:48.897-07:00solve puzzle,play chess,be cleversolve puzzle,play chess,be cleverAnonymoushttps://www.blogger.com/profile/06616044653921993668noreply@blogger.com