-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathhax.txt
68 lines (60 loc) · 4.39 KB
/
hax.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
+---+ +---+-------------+---+ +---+-------------+-------------+-------------+
| | | | |\ \ / /| | | |
| | | | +---------+ \ \ / / | +---------+---------+ | +-----+ |
| | | | | \ v / | | | | | | |
| +-----+ | +---------+ \ / | +---------+---------+ | +-----+ |
| | | > < | | | |
| +------+ | +---------+ / \ +---------+ +---------+ +---------+ |
| | | | | / ^ \ | | | | | |
| | | | +---------+ / / \ \ +---------+ +---------+ +---------+ |
| | | | |/ / \ \| | | |
+---+ +---+-------------+---+ +---+-------------+-------------+-------------+
+---+ +---+-------------+---+ +---+ +-------+-------+-------+-------+-------+
| | | | |\ \ / / | | | | | |
| | | | +---------+ \ \ / / | | | | | |
| | | | | \ v / | | | | | |
| +-----+ | +---------+ \ / +-------+-------+-------+-------+-------+
| | | > < | | | | | |
| +------+ | +---------+ / \ | | | | | |
| | | | | / ^ \ | | | | | |
| | | | +---------+ / / \ \ +-------+-------+-------+-------+-------+
| | | | |/ / \ \ | | | | | |
+---+-----+---+-------------+---+-----+---+ | | | | | |
| | | | | | | | | |
| +---------+---------+ | +-----+ | +-------+-------+-------+-------+-------+
| | | | | | | | | | | | |
| +---------+---------+ | +-----+ | | | | | | |
| | | | | | | | | |
+---------+ +---------+ +---------+ | +-------+-------+-------+-------+-------+
| | | | | | | | | | | |
+---------+ +---------+ +---------+ | | | | | | |
| | | | | | | | | |
+-------------+-------------+-------------+ +-------+-------+-------+-------+-------+
0. Access
Always keep access of computers and other hardware to be complete and total.
Always remove barriers between people and use or understanding of technology.
Do not waste computing power and let it go idle, always share your resources.
1. Maintenance
Do not leave maintenance and schematics to others, always keep your hands on.
Always understand fully systems which affect you, and find ways to improve.
Always check integrity of systems constantly, and find security loopholes.
2. Damages
Do not damage computers, data, people, or breach confidentiality of any person.
Do not alter files or logs, unless cleaning your tracks and ensuring escape.
Do not steal or vandalize property (money, monetary services, physical objects).
3. Information
Do not allow monetary value on information, informational services and software.
Do not bootleg (sell pirated software) or freeload (take and not contribute).
Do not allow restriction or control on information (censorship and ownership).
4. Secrecy
Always keep your mouth shut, keep a low profile, and leave no trace or trail.
No not call attention, brag, make taunts or dares inside or outside the circle.
Do not spy, snoop, or monitor others, always protect privacy and anonymity.
5. Solidarity
Do not have bogus criteria (progressive stack), always judge on merits alone.
Always practice with technology to defend against governments and corporations.
Do not trust state or corporate authorities, always promote decentralization.
6. Miscellaneous
Do not say "it cannot be done", always exceed and transcend any limitations.
Always protect the rights to communicate and associate with low or no costs.
Do not narc (turning other hackers in or joining "computer security agency").