How hackers look, What they like and What They Think?
·
Self-educated hackers are more
respected in community of hackers. Because that person is really interested in
hacking and he passed a lot of things that are not Teached in schools and
college.
·
The most common things hackers
do is computers electrical engineering, physics, mathematics, linguistics and
philosophy.
·
However, like every developer is
not the hackers, hackers do not always have the skills of programing, but some
of them have.
Clothing Styles:
·
Hackers dress simply, casually,
jeans, T-shirt and shoes. T-shirt are usually with some humorous slogans.
·
Today there are T-shirts with
pictures of penguin (trademark of Linux) or daemon. A Smaller number of hackers
prefers hiking boots.
·
This prefer wearing of block
cloths. Hackers care more about comfort, practicality and ease of maintenance
of cloths. They hate business suits.
Other Interests:
·
Hobbies that hackers do are
widespread. Mostly they like science fiction, music, medievalism, chess, war
gamers and intellectual games of all types, logical puzzles and other areas
that are closely related to hacking or that include linguistics and acting.
·
Hackers prefers cats then dogs.
Because cats have hacker’s nature.
·
All Hackers have terrible
handwriting.
·
Annoyed by stupid people, don’t
like to listen soft music, or watch television, except for cartoons and science
films.
·
Hackers hate lies, incompetence and
boredom.
Activity and Sport:
·
The Large number of hackers are
generally not engaged in physical activities.
·
Among those who practice them,
interest in the sport is not big avoid team sports.
·
Hackers sports are always
individual, including concentration and ability: cycling, auto racing, skating,
sailing, hiking, gliding. Just to mention, their team play soccer and freestyle
football, but don’t like to watch it on TV.
·
Most hackers don’t use
cigarettes and alcohol.
They don’t like
to use drugs because brain damage.
Most hackers
use the coffee and sugar and soda to stay awake all night during the hacking.
No comments: