The Reality of Hacking

January 5, 2017 | Views: 6675

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

When we hear the word hacking, we see it as gaining an unauthorized access to the system and having a control over it. Normally, we think that the “system” I mentioned was just all about computers.  But it is wrong, hacking is not limited just to computer stuff.  Many beginners who wanted to learn how to hack (like me) think that hacking is just using the computer; however, understanding how it works and how to properly use tools to perform the hack involve a deeper understanding of not just computers (and similar devices), but also the reasoning behind it, and who “hackers” really are. An oversimplified definition of hacking is the way of making something do what you want it to do as opposed to what should it really do. That “something” I mentioned is not just a computer in general. A good analogy would be the use of a paper clip. This paper clip is simply designed to clip papers. But you see we can use the paper clip to make the wires of our laptop charger to stay in place when we curl it or we use the paper clip to clip it to the side of a thin table then we use the metal holder to hang our wires of our laptop charger. This is already called a hack because we just use the paper clip for any purpose we think we can use it for, as opposed to what it was originally intended to do. You may have heard the term/phrase “life hacks” or “life hacking.” This refers to ways of accomplishing a task by using a thing or object (originally designed for a specific purpose) for something else.

So what is the relation of that in the world of IT? I just want to emphasize that hacking is not just limited to computer stuff. But why, when we hear the word “hacking,” do we often think that it is about computers? That is because we are in the age where technology has risen to the top and forefront of people’s lives and minds, and almost every form of information we can think of is stored on computers or uses computers as a medium to transfer information, which can easily be done by the use of IoT devices. That is why computers became the target of “hacking” because the information across them is quite sensitive and can affect the living of the person in reality so many other people attempted to gain access to it. That sensitive information includes things such as bank accounts, credit card numbers etc., which can bring danger in a person’s life in the real world. That is why in order to become a real hacker, we should not limit ourselves just to computers but apply it in whatever things we could think of in our life. Remember that in order to become a hacker, you must think like one. Learning to apply that thinking to computers will expand your area of hacking which is similar to how computers expand our lives.

Share with Friends
Use Cybytes and
Tip the Author!
Share with Friends
Ready to share your knowledge and expertise?
  1. Good article. Hacking is really about perception. It’s looking at a system or process (software, hardware, operations) understanding how it all fits together and interacts; then realising that it’s not all together unique and there are other things that it can do or you can do to it to create or do something new or different

  2. i need help with basic coding programming?

    • Try something like Python. It is very easy to comprehend, and can be used for a wide range of tasks from basic administrative actions to designing small games with the various libraries that support it. Al Sweigart offers a free online version of his book “Automate the Boring Stuff” at:

      His work is based on Python 3, the newest version of Python, and while a lot of people argue about the slow-going adoption of Python 3 versus earlier versions due to a substantially smaller amount of libraries currently available, this is a great way to catch on early and future-proof your programming education for the direction the platform is heading in anyway.

      Check out for everything you need to get started.

  3. U made realize everyone who think that hacking is just limited resource

  4. quiet a brilliant post

  5. teach me please

Page 3 of 3«123
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge


We recommend always using caution when following any link

Are you sure you want to continue?