Thursday, 11 April 2013

Things Every Computer Geek Should Know


The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. If you’re that type of person and are looking for a few extra skills to pick up, or if you’re a newbie aiming to get a handhold on the honor that is geekhood, read on to find out what skills you need to know.

How to become a real computer Geek?

Little known to most, there are many benefits to being a computer geek. In our high-tech society, being a computer guru can be one of the most high paying jobs available and they are highly in demand, especially if you want to become a network administrator. By tapping into your inner geek, you can develop a most useful skill that will be sure to pay off later in life.
You may get the answer here: http://www.aagneyam.com/blog/?p=1059

The Meaning of Technical Acronyms

  • USB – Universal Serial Bus
  • GPU – Graphics Processing Unit
  • CPU – Central Processing Unit
  • ATA- AT Attachment (AT Attachment Packet Interface (ATAPI)
  • SATA – Serial ATA
  • HTML – Hyper-text Markup Language
  • HTTP – Hypertext Transfer Protocol
  • FTP – File Transfer Protocol
  • P2P -  peer to peer

1. Default Password List

One of the best list of default passwords. http://www.searchlores.org/defpasslist1.htm 1A. Usability of passwords http://www.baekdal.com/tips/password-security-usability

2. A bit, about How to hack some common gadgets.

If you rolled your eyes here, that is a good thing. If not, you have many things to learn, young padawan. It’s amazing how few people know how to do this. If you’re unsure, hit up the link below to find out how: http://www.aagneyam.com/blog/?cat=708

3. Identify Keyloggers

Internet cafes are the most likely place you’ll find them, followed by library, perhaps, and maybe even you own house if you’ve some unscrupulous friends/family. Identity theft groups warn about keyloggers and advocate checking out the keyboard yourself before continuing. Can you identify a keylogger, however, if one is plugged into the back of the system? Here’s what one looks like: Hit up this link for excellent info on keyloggers on public computers and how to protect yourself: , http://www.ghacks.net/2007/06/28/how-to-defeat-most-keyloggers-on-public-computers/

4. Surf the Web Anonymously

We won’t make any assumptions about why you may need this particular skill, but the fact remains that every geek should know how to traverse the Internet with the highest amount of security possible. Aside from the safest method–which is using a connection that is not yours–you will need the ultimate in proxies…Tor. Tor is an onion-routing system which makes it ‘impossible’ for someone to find out who you actually are.

5. Bypass a Computer Password on All Major Operating Systems

Obviously you shouldn’t use this to gain unlawful access to a computer. If you’re a geek, however, you’ll eventually end up in a situation where someone forgets their password, you acquire a machine with an operating system you cannot access, or similar situation. See this tutorial for info on how to bypass the password on the three major operating systems: Windows, Mac, and Linux. http://www.joetech.com/2009/01/29/how-to-crack-the-account-password-on-any-operating-system/

6. Find a Users IP Address on AIM

Knowing someones IP address is actually pretty useless in this case, but most people don’t realize that. If someone is harassing you via AIM and you can’t get them to stop, discovering their IP and sending it to them–with a nicely worded threat of law enforcement involvement should they not stop–is likely enough to send them scamping away with tail between legs. http://www.ehow.com/how_5529416_someones-ip-address-aim-chat.html

7. Hide a File Behind a JPEG

So you need a nice spot to hide your blackmail personal files. You could, of course, bury them deeply within a series of random, useless folders, but there’s always the chance of them being discovered. A password protected RAR is the best choice, but it’s a bit obvious despite the most boring title you could give it. A sneaky person would hide the important file behind a completely random and boring family reunion photo, where no person in their right mind would shift through. http://www.online-tech-tips.com/computer-tips/hide-file-in-picture/

Read more: http://www.aagneyam.com/blog/?p=466

No comments:

Post a Comment