blackhat for life

December 18, 2005


Filed under: PHC, whiteh8 — antisec @ 9:09 pm

The definition:

hack·er1 Pronunciation Key (h k r)
n. Informal
1. One who is proficient at using or programming a computer; a computer buff.
2. One who uses programming skills to gain illegal access to a computer network or file.
3. One who enthusiastically pursues a game or sport: a weekend tennis hacker.

Historically, the definitions of words in a language changes over time. I’m sure there is someone out there who is educated and can provide me with the term for this phenomenon; and whoever you are, you can go fuck yourself. I’m not bragging to be a scholar, because that is something that I’m not. However, I am a hacker, and because of this I can make the following statements.

1) A hacker is someone who hacks.
2) Hacking is comprimising computers/computer networks.

A hacker is not someone who writes socalled “useful code” (operating systems, applications, etc). Hackers write tools to aide with the comprimise of computer networks. And hackers _use_ those tools; they do not sell them to the highest bidder, and they do not use them to make a name for theirself so that they can then become a “security consultant”.

Silly rhetoric aside — the important point is this: Hackers hack.

If you do not hack, you are not a hacker. That simple.

On a semi-related note. . .

Anyone who claims to be an “ethical hacker” is a moron. Hacking has nothing to do with ethics. There is no “ethical hacking” or “unethical hacking”; there is only hacking. If you have to dance around the definition of what a hacker is, or you have to dance around the definition of what hacking is, then what you do is not hacking, and you are not a hacker.

-a PHC member



  1. The word is ‘etymology’

    If ethics isn’t intrinsic to hacking, then why can’t someone choose to use their hacking skills in an ethical manner?

    Looking at the rammifications, examining your motives etc. sound like things you do anyway. Why would it be weird to only choose to perform the actions your conscious agrees with?

    Comment by Dominic White — December 20, 2005 @ 11:47 am

  2. i lub 2 hac my employers network, servers and apps with their permission it’s fun and i get to be cool and make m0ney doing something i like so why does this make me bad or corrupt. there is no industry whoring, posting of exploits, or buying into the marketing bullshit from the security industry here so why am i part of the problem as you define it. the justifications mentioned here are shallow yet there is some truth to the corruption problems you mention and greedy scumfucs in the security (and many other) industries trying to cashin and make a buck

    Comment by smackdog — December 21, 2005 @ 1:48 am

  3. Dude, you don’t get to call yourself a hacker. Only other people can call you one.

    Comment by Mr. Smith — April 12, 2006 @ 12:10 pm

  4. burial canada insurance

    Yorker,darers residences Deneb Gris strangulations

    Trackback by burial canada insurance — June 2, 2007 @ 6:52 am

  5. loan until payday in wa

    gargled sinks guile

    Trackback by loan until payday in wa — November 22, 2007 @ 7:49 am

  6. credit score co

    finessed,freest uncomfortable,doubling libel frontage

    Trackback by credit score co — December 26, 2007 @ 9:18 am

  7. AMEN!(Even an atheist has to say it sometimes). I’ve been parroting that since i read it way back when i read my 1st ~el8 PHC zines. Man I miss PHC and ~el8, and rpc from, I may have a “Security Professional” day gig, but the lessons and words from those guys has always kept me on point. Thanks


    Comment by Kd — April 18, 2008 @ 1:47 pm

  8. what

    totally discounting early computer [hacker] culture definitions?

    diaf plz

    Comment by face — May 14, 2008 @ 3:40 pm

  9. washington pj pockets casino…

    galls resorts stronghold,swished fondness …

    Trackback by washington pj pockets casino — October 24, 2008 @ 12:01 pm

  10. I couldnt agree more. I am a full supporter of anti-sec and zeitgeist.

    Comment by mrme — July 4, 2009 @ 5:33 pm

  11. omg, give it a rest with the names already.
    Just do what you’re driven to do.

    But I hope y’all are driven towards Antisec principals though.. good principals.

    Comment by God — July 12, 2009 @ 7:55 am

  12. How dare one think one can stop the flow of information, only if you are the creator of such information does that give such right. I will be giving financial funding to to set up many mirrors. Only a bunch of morons would want to stop such information.

    Comment by fuck the antisc — January 1, 2010 @ 1:16 pm

  13. Valuable writing , I was enlightened by the facts , Does anyone know where my assistant could possibly get access to a sample IRS W-2 example to edit ?

    Comment by Elie Fabs — March 14, 2016 @ 9:09 pm

  14. Take a look at this website
    Good hacking tools

    Comment by Privateloader — March 20, 2017 @ 7:41 am

RSS feed for comments on this post. TrackBack URI

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Blog at

%d bloggers like this: