The term ‘geek’, once used to label a circus freak, has morphed in
meaning over the years. What was once an unusual profession transferred
into a word indicating social awkwardness. As time has gone on, the word
has yet again morphed to indicate a new type of individual: someone who
is obsessive over one (or more) particular subjects, whether it be
science, photography, electronics, computers, media, or any other field.
A geek is one who isn’t satisfied knowing only the surface facts, but
instead has a visceral desire to learn everything possible about a
particular subject. A techie geek is usually one who knows a little
about everything, and is thus the person family and friends turn to
whenever they have a question. If you’re that type of person and are
looking for a few extra skills to pick up, or if you’re a newbie aiming
to get a handhold on the honor that is geekhood, read on to find out
what skills you need to know.
How to become a real computer Geek?
Little known to most, there are many benefits to being a computer geek. In our high-tech society, being a
computer guru
can be one of the most high paying jobs available and they are highly
in demand, especially if you want to become a network administrator. By
tapping into your inner geek, you can develop a most useful skill that
will be sure to pay off later in life.
You may get the answer here:
http://www.aagneyam.com/blog/?p=1059
The Meaning of Technical Acronyms
- USB – Universal Serial Bus
- GPU – Graphics Processing Unit
- CPU – Central Processing Unit
- ATA- AT Attachment (AT Attachment Packet Interface (ATAPI)
- SATA – Serial ATA
- HTML – Hyper-text Markup Language
- HTTP – Hypertext Transfer Protocol
- FTP – File Transfer Protocol
- P2P - peer to peer
1. Default Password List
One of the best list of default passwords.
http://www.searchlores.org/defpasslist1.htm 1A. Usability of passwords
http://www.baekdal.com/tips/password-security-usability
2. A bit, about How to hack some common gadgets.
If you rolled your eyes here, that is a good thing. If not, you have
many things to learn, young padawan. It’s amazing how few people know
how to do this. If you’re unsure, hit up the link below to find out how:
http://www.aagneyam.com/blog/?cat=708
3. Identify Keyloggers
Internet cafes are the most likely place you’ll find them, followed
by library, perhaps, and maybe even you own house if you’ve some
unscrupulous friends/family. Identity theft groups warn about keyloggers
and advocate checking out the keyboard yourself before continuing. Can
you identify a keylogger, however, if one is plugged into the back of
the system? Here’s what one looks like: Hit up this link for excellent
info on keyloggers on public computers and how to protect yourself: ,
http://www.ghacks.net/2007/06/28/how-to-defeat-most-keyloggers-on-public-computers/
4. Surf the Web Anonymously
We won’t make any assumptions about why you may need this particular
skill, but the fact remains that every geek should know how to traverse
the Internet with the highest amount of security possible. Aside from
the safest method–which is using a connection that is not yours–you will
need the ultimate in proxies…Tor. Tor is an onion-routing system which
makes it ‘impossible’ for someone to find out who you actually are.
5. Bypass a Computer Password on All Major Operating Systems
Obviously you shouldn’t use this to gain unlawful access to a
computer. If you’re a geek, however, you’ll eventually end up in a
situation where someone forgets their password, you acquire a machine
with an operating system you cannot access, or similar situation. See
this tutorial for info on how to bypass the password on the three major
operating systems: Windows, Mac, and Linux.
http://www.joetech.com/2009/01/29/how-to-crack-the-account-password-on-any-operating-system/
6. Find a Users IP Address on AIM
Knowing someones IP address is actually pretty useless in this case,
but most people don’t realize that. If someone is harassing you via AIM
and you can’t get them to stop, discovering their IP and sending it to
them–with a nicely worded threat of law enforcement involvement should
they not stop–is likely enough to send them scamping away with tail
between legs.
http://www.ehow.com/how_5529416_someones-ip-address-aim-chat.html
7. Hide a File Behind a JPEG
So you need a nice spot to hide your blackmail personal files. You
could, of course, bury them deeply within a series of random, useless
folders, but there’s always the chance of them being discovered. A
password protected RAR is the best choice, but it’s a bit obvious
despite the most boring title you could give it. A sneaky person would
hide the important file behind a completely random and boring family
reunion photo, where no person in their right mind would shift through.
http://www.online-tech-tips.com/computer-tips/hide-file-in-picture/
Read more: http://www.aagneyam.com/blog/?p=466