ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Hacker Perspective

Updated on July 2, 2021

This article was published in the magazine 2600 Hacker Quarterly

August, 2019 issue

Hello friends, are hackers born, or do they become hackers after getting a Sega Dreamcast with a Gameshark? If you think that's a silly question to ask, please read on, and I'll take you down a path of wonder, awe, and more questions. I began to get my feet wet in hacking when I was a teenager. While many adversities were afflicting my life, I felt like a stereotypical teenage hacker rebel. After all, sometimes stereotypes are true. Society and life had given me a reason to stand up to the system I live in and say I will do what I want. I started off as an online hacker, exploiting flaws in games like Phantasy Star Online. A vulnerability in the game would allow you to PK(People Kill) people in a non-player-vs-player area of the game. Now, at the time, this was a cheap and straightforward sadistic thrill. An attack called a Resta spell would take away all of the players' health points. But to use it, you had to modify a specific hex value in the game. This has initially been great fun having the power to do things that other people couldn't. But as time went on, I learned that the sort of hacking I was doing was a black hat, and more important, it was mean and wrong.
What caused me to lay to rest my old ways of black hat exploitation? Well, in short, I grew a conscience. They say there are many different bits of intelligence people can possess. When I was younger hacking Phantasy Star Online, the intelligence I didn't own was an emotional one. However, one day after I had PKed someone, something happened to me that stood out for the rest of my teen years. A person with a more advanced hacking method came in and did the same thing to me, only worse. I felt powerless and was very deep in despair. I thought to myself, "Is this all that life amounts to? A dog eat dog world where there is always a bigger fish seeking to devour a smaller, weaker morsel?" As it turned out, that little experience inside a somewhat Massively Online Multiplayer game was one of the main turning points in my life. It made me see that just because someone can do something doesn't mean they should do it. I also learned by watching players that didn't exploit the vulnerabilities in the game. They were, in essence, sitting ducks, but they seemed like they were having more fun. In that way, I found out that vulnerability is a strength rather than a weakness.
I realized with my black hat hacking pursuits that it all seemed to boil down to control; this mainly stemmed from the fact that I felt helpless in real life. It looks like if the thrill of having control over things leaves you, you start seeing things from a more altruistic perspective. At least, this is what happened to me during my teen years. I left behind the shadowy arts of black hat game hacking for more benign things that helped others. These were things like volunteering at a local computer recycling shop and helping my mom and grandma with their computers. This was where my black hat changed to a halo, or more specifically, a white hat. Some people never reach the level of calling themselves a white hat hacker or go from white hat to black hat. However, like life, hacking has many varying shades of grey. As stated earlier, the black hat hacking I did when I was younger was not without its pitfalls. People would get mad at me in the game and say some very distressing things. This brings me to a big point about life. I found that doing the wrong thing was straightforward and took minimal effort to gain monetary or mood benefits. But in life, doing the right thing is difficult. I had this epiphany when I was around 17 years old and walked down the street in the city I grew up in. I thought about infamous hackers such as Kevin Mitnick and how he could recover his stance in the world after being locked up for social engineering. This contrasts with people like Bill Gates, who always seems to do the right thing. Up until the time I found my way, my friends and I would participate in questionable hacking activities, i.e. (building cantennas, trying to make virii, and general teenage hacker shenanigans). Later, I found out that the time I had spent doing these things would have probably been better spent looking for a job.
So, what really is a hacker, and what do they do? People can always look at a hacker and say, "They exploit things." But you have to realize that the only way to mend a broken bone is by knowing it is broken in the first place. Along those same lines, the same code that makes us weak also makes us strong. If, for instance, you find a zero-day vulnerability inside of your own machine, you could use that for nefarious means or benefit others by releasing the information. In that way, life is proved to be both a gift and a curse at times. Hackers demonstrate this notion because some hack because they feel as though they're caste down in the world. After all, isn't it a psychological tenant to human nature that people who feel powerless want to gain it, even by force? But in doing so, some have fallen farther than they ever stood to gain from their activities. I know I've heard of many hackers on the news getting long jail sentences for stealing. This is what changed my mind about being a black hat hacker. I learned that you close up the vulnerability within yourself for people to act against you by doing the right thing. Really then, the intelligent hackers are the ones that try to build up their community, friends, and family and not try to break it down. Besides, there are other ways to keep progressing as a hacker without breaking the law. It may not be the most glamorous form of hacking to help family or friends remove viruses from their machines, but it feels way better than exploiting others. Other areas such as open-source contributions over GitHub would be the primary way I see to hone one's skills and still remain in the right by the law. Another way would be to create your own home network and hack it for fun. I plan on trying both of these things shortly.
My message to the younger generation of hackers out there and hackers in general. It is to not view hacking as a political, social, or monetary tool, but mainly as a manifestation of self, without getting too deep in my personal psychological analysis of why people hack. I'd say that most people hack primarily because they're curious. It wouldn't seem proper to say that this curiosity always kills the cat. But there are many instances of people in history that were too curious for their own good. Take Marie Curie, for example; I consider her to be a hacker in a way because she was curious about radiation. She and many other scientists ended up getting sick or dying over their experimentation with radioactive elements. Many scientists are hackers because they hold knowledge as tantamount to life. And both hackers and scientists run experiments, although hackers' investigations often take the form of debugging a piece of software. We then must be careful that we do not also die by it if we live by the hack.
Being a hacker is one of the many things I have experienced in my life. There is always the person that is purposely vulnerable that makes you question the whole basis of why you hack or the person that has more skill than you that makes you feel like the victim. Going back to the beginning of the article, when I talked about the game Phantasy Star Online, it wasn't playing the game that taught me a lesson. It was trying to game the game that taught me a lesson. Some studies in life don't come about no matter how many times you read a book or go down the same road. Hacking has taught me that to learn, you must try things in novel ways. You must experiment with your surroundings and transfer skills from one aspect of life to another. I've read in scientific papers that stepping outside your comfort zone is one of the best ways to master a new skill. If that is true, then hacking must be one of the best ways of learning there is. This is because, in hacking, you're constantly adapting to a new architecture, programming language, or platform.
If you're an aspiring hacker trying to get into the scene, I recommend going down the path less traveled by. As Smash Mouth sings in the famous song All-Star, "what's wrong with taking the back streets? You'll never know if you don't go." So shine in whatever path you choose to take in hackerdom. Whether you're simply hacking together a spreadsheet or getting paid to pen test some vulnerability in Google. To me, the exceptional hacker is the one that spends the most time on a seemingly trivial facet of something others overlook. After all, while everyone else is using python for an Artificial Neural Network, you can be the brave explorer and find out why not to use PHP for the same endeavor. At least that's what I'm doing. We don't learn in life by doing what everyone else is doing. My advice is to step outside of your comfort zone and do something new to be an exceptional hacker.
There have been many good things that had come about because I hacked things when I was younger. I was able to get my Information Technology associates degree with relative ease. This involved taking fundamentals of programming and web design basics classes, which was already right up my alley. Also, hacking has given me the insight to know that there is always more than one way to skin a catfish whenever I see a problem. Yes, the skills I learned in hacking are translatable to other areas of life. That's why you don't always need the right tool for the right job. What is required, instead, is the right mind for the right job.
If this article finds its way among the other great articles I've read in the 2600 magazine over the years, I hope it helps someone. I've tried to incorporate some life lessons I've learned from being a hacker. Sometimes the lessons were harsh, and other times they were easy. But in the end, a hacker is just a word. The word means many different things to many different people. I ask that if you're reading this and have a negative view of hackers, you realize that we are people. Some of us even have lives. We're not always the bad guys that the media portrays as stealing a massive amount of information online. We are sons, daughters, fathers, grandfathers, and most importantly, we are human beings. We vary as greatly as the life on the planet Earth, and we are curious enough about life to teach you a thing or two about what we've learned along the way.


This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

Show Details
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)