Is Your Son a Computer Hacker?
Is Your Son a Computer Hacker? is the name of a eight year old magnificent essay on Adequacy.org. Written by a wonderful human being with many redeeming qualities, the lulzy article is infamous for exposing hackers for who they really are: 13 year old boys who aren't really hackers. However, anyone under the age of 18 knows that it's nothing more than the misinformed musings of a concerned parent. They were, of course, wrong and posted hate mail, proving themselves to be idiots. Also notice how the names are characters from the Brady Bunch.
Eleven signs little Billy is a computer hacker
- Child asks to change ISP's.
- Child installs programs which aren't AOL or Calculator as all others are Autorun.gen.
- Child wants to upgrade his computer.
- Child wants to read books without the words Playboy or Bible in the title.
- Child wants to waste more than 30 minutes on the computer.
- Child plays Quake.
- Child swears.
- Child installs Lunix.
- Child dresses differently from others.
- Child sucks at school.
- Child is a furry
|“||I keep a fatherly eye on the CDs they listen to and the shows they watch, the company they keep and the books they read. You could say I'm a model parent.||„|
|“||Most American families use trusted and responsible Internet Service Providers, such as AOL.||„|
|“||Popular hacker software includes "Comet Cursor", "Bonzi Buddy" and "Flash".||„|
|“||You can best ensure that you are buying legal, trustworthy hardware by only buying replacement parts from your computer's manufacturer.||„|
|“||Any father who has had a seventeen year old daughter attempt to sneak out on a date wearing make up and perfume is well aware of the effect that improper influences can have on inexperienced minds.||„|
|“||[...] If you find any of these hacking manuals in your child's possession, confiscate them immediately. You should also petition local booksellers to remove these titles from their shelves. You may meet with some resistance at first, but even booksellers have to bow to community pressure.||„|
|“||They may also be used to break into people's stereos to steal their music, using the "mp3" program.||„|
|“||Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to YouTube on the internet without using a telephone.||„|
|“||If you see the word "LILO" during your windows startup (just after you turn the machine on), your son has installed lunix. In order to get rid of it, you will have to send your computer back to the manufacturer, and have them fit a new hard drive. Lunix is extremely dangerous software, and cannot be removed without destroying part of your hard disk surface.||„|
|“||If your son is failing courses in school, or performing poorly on sports teams, he may be involved in a hacking group, such as the infamous "Otaku" hacker association.||„|
—Anonymous Reader, 
—Anonymous Reader, 
—Anonymous Reader, 
Is Your Daughter a Computer Hacker?
Is Your Son a Computer Hacker? is part of a series on Security Faggots
2cash • AnonOps • Brian Salcedo • Dshocker • Fearnor • Fry Guy • Gadi Evron • g00ns • Hack This Site • Hacking Team • hann • Joanna Rutkowska • John Field • Joseph Camp • Lizard Squad • LulzSec • Mark Zuckerberg • MarshviperX • Masters of Deception • Michael Lynn • Krashed • Raven • r000t • Ryan • Steve Gibson • th3j35t3r • The Regime • Sabu • Zeekill
Avira • Back Orifice • Botnet • Brute Forcing • Caller ID Spoofing • Cain and Abel • Ciscogate • CISSP • Cloudflare • Conficker • CyberDefender • Dangerous Kitten • DEF CON • Embedded Files • Encryption • Ethical Hacker • Exploit • The Gibson • The Great Em/b/assy Security Leak of 2007 • h4xx1n9 • Heartbleed • I GOT NORTON! • Is Your Son a Computer Hacker? • NSA • Operation Sundevil • PIFTS.exe • Social engineering • Stylometry • SubSeven • Tor • Zone-H
Is Your Son a Computer Hacker? is part of a series on
Visit the Softwarez Portal for complete coverage.