Hacker is a Chinese word, both derived from English. With the emergence of Gray Pigeon, Gray Pigeon has become a hacking technology used by many people to control other people's computers in the name of hackers, so there is a separation between "hacker" and "hacker". The movie "Hacker" produced by the Movie Channel Program Center in 2012 has also begun to use the word hacker, showing the convergence of Chinese usage habits. In fact, the meanings of hacker (or hacker) and the original English word Hacker cannot be completely translated. This is due to the differences formed in the respective development of Chinese and English language vocabulary. The term originally referred to enthusiastic and highly skilled computer experts, especially designers, and was gradually divided into categories. Among them, black hat is actually a cracker. In media reports, the term hacker often refers to software crackers.
Recommended course: C Language Tutorial.
It is true that hackers are so far away yet so close to us. I accidentally got poisoned, and my friends who use windows are trembling all the time. One day I accidentally clicked on an Internet link, and my computer turned into a chicken. Now we have to give it a big health care after installing the machine. What about guards, anti-virus, bug fixes? The machine can be slower, but it cannot be poisonous. Because we are all scared by some viruses, even a panda burning incense can make people panic.
Speaking of which, I took a look at who is the author of Panda Burning Incense?
Li Jun is a computer enthusiast who has never received professional training. Panda Burning Incense written in delphi, what language is delphi? It is a well-known rapid application development tool (Rapid Application Development, referred to as RAD) under the Windows platform. Delphi launched by Borland is a new visual programming environment that provides us with a convenient and fast Windows application development tool.
It uses many advanced features and design ideas of Microsoft Windows graphical user interface, adopts a complete object-oriented programming language (Object-Oriented Language) that is flexible and reusable, and is the fastest editor in the world today. , the most leading database technology. In fact, delphi is a graphical development tool. Delphi itself is not awesome, what is awesome is its designers. Delphi should be much simpler than C language.
General hackers can be classified as using hacking tools:
1. Basics of hacker terminology: mainly clarify some common hacker terminology, such as what is webshell What is injection, what is side note, and the functions of some common tools, such as nc, sc, etc. Also, when you encounter a hacker term you don’t understand, you should first understand the meaning of the term. Go to Baidu Or GOOGLE first checked what he meant. When studying, you should not vaguely approach knowledge that you do not understand. To find out first.
2. Configuration and use of Gray Pigeon: Through learning, you must correctly configure Gray Pigeon and be able to go online normally. Operate and train its functions. Needless to say, the one that junior hackers hear the most is pigeons.
3. Web Trojan production and dissemination
4. Website intrusion
5. Trojan signature code modification
In fact, I don’t think someone who can use tools can be called a hacker. Hacker is a synonym for high-ranking people in the programming world. Only those who discover vulnerabilities like OpenSSL Heartbleed are called hackers. They are all programming masters. C/C and assembly language are the tools used by real hackers. Understand the operating principle of the program and the working principle of the system. Only in this way can the problem be fundamentally solved.
A true hacker must be a qualified programmer. Basic programming language is a must, and his knowledge is broad and deep:
1. Be proficient in C/C language and assembly language (which languages do you know)
Basically, novice hackers must learn disassemble ), which is to analyze the source code of a program through the assembly routine it runs. And tested in c language. Assembly must be mastered (stack, protectedmode, data segment, ESP, EBP...), C language (bit-field, stdcall...), python..
2. Computer principles
The analysis program data does not have decimal, only binary and hexadecimal (that is, 0101 0010 or 0xFF...), you must understand basic operations. There are also basic terms such as big/little-endian, and you can use WinHex/UltraEdit or VS's dempbin analysis program.
3. Network
TCP/IP (TCP, UDP, ICMP, DNS, IP and many other protocols), will intercept data packets, analyze frames, and combine Use telnet/ftp/c language socket and other commands to perform network robberies! This part is the most difficult and boring, and every byte of the network cannot be missed.
4. System
Understand various systems such as Windows internal API, sockets programming, IP proxy, system design pits must have loopholes, only we have mastered the principle , the melon will be touched.
Having said so much, it is not easy to be a hacker. Do you have any thoughts on this?
Also, hackers must be dark! Nowadays, many people are still making fuss at the web page level, that is, injecting some js language into the web to execute scripts that do bad things. This requires a deep understanding of the browser's core and web page language. There were still considerable loopholes in the Android browser at first. The author once modified the browser kernel code to avoid some unconventional script injections. The scope and methods of hacker attacks are endless, so being a hacker is first of all a kind of geek. Hackers have great faith that they can create things, and they work tirelessly to crack them without stopping. Isn't this the epitome of programmers working diligently to modify bugs in order to complete a project.
The above is the detailed content of What language do hackers use to program?. For more information, please follow other related articles on the PHP Chinese website!

VScode中怎么配置C语言环境?下面本篇文章给大家介绍一下VScode配置C语言环境的方法(超详细),希望对大家有所帮助!

在C语言中,node是用于定义链表结点的名称,通常在数据结构中用作结点的类型名,语法为“struct Node{...};”;结构和类在定义出名称以后,直接用该名称就可以定义对象,C语言中还存在“Node * a”和“Node* &a”。

c语言将数字转换成字符串的方法:1、ascii码操作,在原数字的基础上加“0x30”,语法“数字+0x30”,会存储数字对应的字符ascii码;2、使用itoa(),可以把整型数转换成字符串,语法“itoa(number1,string,数字);”;3、使用sprintf(),可以能够根据指定的需求,格式化内容,存储至指针指向的字符串。

在c语言中,没有开根号运算符,开根号使用的是内置函数“sqrt()”,使用语法“sqrt(数值x)”;例如“sqrt(4)”,就是对4进行平方根运算,结果为2。sqrt()是c语言内置的开根号运算函数,其运算结果是函数变量的算术平方根;该函数既不能运算负数值,也不能输出虚数结果。

C语言数组初始化的三种方式:1、在定义时直接赋值,语法“数据类型 arrayName[index] = {值};”;2、利用for循环初始化,语法“for (int i=0;i<3;i++) {arr[i] = i;}”;3、使用memset()函数初始化,语法“memset(arr, 0, sizeof(int) * 3)”。

c语言合法标识符的要求是:1、标识符只能由字母(A~Z, a~z)、数字(0~9)和下划线(_)组成;2、第一个字符必须是字母或下划线,不能是数字;3、标识符中的大小写字母是有区别的,代表不同含义;4、标识符不能是关键字。

c语言编译后生成“.OBJ”的二进制文件(目标文件)。在C语言中,源程序(.c文件)经过编译程序编译之后,会生成一个后缀为“.OBJ”的二进制文件(称为目标文件);最后还要由称为“连接程序”(Link)的软件,把此“.OBJ”文件与c语言提供的各种库函数连接在一起,生成一个后缀“.EXE”的可执行文件。

c语言计算n的阶乘的方法:1、通过for循环计算阶乘,代码如“for (i = 1; i <= n; i++){fact *= i;}”;2、通过while循环计算阶乘,代码如“while (i <= n){fact *= i;i++;}”;3、通过递归方式计算阶乘,代码如“ int Fact(int n){int res = n;if (n > 1)res...”。

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Dreamweaver Mac version
Visual web development tools

SublimeText3 Chinese version
Chinese version, very easy to use

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft

SublimeText3 Linux new version
SublimeText3 Linux latest version
