When people think about hackers they usually think of them as people who like to do things in the dark and do not need any kind of recognition for their exploits.
For the most part this is not true.
Even though they may not try to become famous from some of their adventures, when they do something newsworthy, they like people to know about it.
They might just put that information out there in the form of an online handle but they want their peers to be impressed in the technical achievement that they were able to accomplish.
One of the many ways that hacker accomplishments come to the light is through the use of Ezines.
These are old school online magazines that will occasionally interview an accomplished hacker but, for the most part, they shows how to do attacks.
There are some ezines which are in normal HTML format but most of the hacker ezines that you will find out there are in plain text format.
It is an old school tradition that still holds to this day.
If you actually take a look at some of these ezines (I’ll leave you to Google up some popular ones), especially some of the more underground versions, you will see some of the actual blueprints of attacks that they have pulled off on different web site servers.
If you are a person who is in IT, or you have your own web site, then you might want to take a look at some of the attacks that they were able to pull off; see some of the mistakes that the IT guys made and try not to duplicate them.
If you want to be able to get inside of the head of a hacker, then there is no better way to do it.
They are not shy about releasing some of their best tricks in ezines such as these.
Remember, they are trying to impress their peers, so to do that, they need to pull out the good stuff.
Reading ezines is a good way to learn about this underground culture but you might want to try and go to some of the forums as well.
In these ezines you will see mentions of some of the forums that they like to hang out at.
Go and check out these forums and see if you are able to pick up any more knowledge from these places as well.
If you want to be able to protect your web site or your IT network, then you must be able to think like the person who is trying to attack them.
To do this you can read some of the literature that they put out.
Use this to your advantage.