Skip to main content

Why hacking skills might be vital to your career as an IT Professional

Hacking is in computer world what black magic is in the Kingdom of Camelot, a Kingdom where anybody who possesses magical power is burnt at stake. Irrespective of the way sorcerers were being executed, magic still remained the strength, hope and future of  Camelot through a young lad called Merlin (a role played by Colin Morgan in the movie "Merlin").
If you have seen this movie, you would have seen that there were times when it seemed the whole hope was gone like the times of war, times when King Ulther and Prince Auther who later became the King were about to die and times when the people of Camelot would suffer and die of a plague. Merlin was always there to Abracadabra these situations into good with his secret talent. There were even times when King Ulther would meet Guis off the record begging and persuading him to do everything possible including using magic to save a situation.
Just like magic, hacking can be used for good too. Here is a short story about my experience in my last job.
It was a Saturday morning when my Boss arrived at work and decided the company's domain name needed to be changed because the company's website which is being hosted on the server of a hosting provider had the same domain address as the company's domain. i.e. www.TheSameDomainAddress.com (company). www.TheSameDomainAddress.com (Web). So there is an ambiguity, you navigate to the address, instead of going to the web, it resolves to the internal domain displaying a page with an irritating look.
Yes I respected his decision of causing such a very big mess but I hated that we never  planned it. As easy as it could be to cause damage than to repair, the process of changing the domain name was very snappy and this affected about 50 client computers that depended on the server for log on. Where would the systems which had no local account logon to? It's like access a web page that has been deleted which gives you nothing but a 404 error even when you are typing the correct web address (in our case, username and password).
Boss who only visited on Saturdays, took flight on Monday and traveled to United States leaving my colleague and I to clear the mess. Once issues gets to the level of system losing password or refusing to log in, the only thing that comes to my colleague's mind is: "Format! Format! Reformat! Reformat! Format the damn Computer and re-install everything from scratch!" That was going to be the fate of those old boxes. We were going to reformat 50 computers, re-install all the necessary drivers, the business software which is very heavy and hook it up to the domain.
Considering how slow these systems were, this  whole process could take a whole month (that's if we work crunch hours) and Management wants it done between 3 to 4 days. "Foreseeing" how tedious this process was going to be, my colleague fired himself because he already had another job somewhere, leaving only me with the mess, the pressure was too much on me, the Manager showered causes on me.
Loving my job so much as an IT Support Engineer, I took it upon myself that I was going to save the world that night. All these while, I had only hacked myself and my friends, at last I was going to use my hacking skills for good. It only took me 5 hours to break into 46 of those systems, hooked them to the domain and configured a local account in case of another time remaining only 4 systems which are located in the accounting department. I guess the only thing that took most of the time was my walking around to those systems because am not such a good "walker", hahaha...!
By 5:00AM, I was already prepared for morning mass and by 6:00AM, I was receiving the Holy Eucharist at ST. Augustine's Catholic Church, Ikorodu.
After mass, I went home and had a very deep sleep and on Monday morning, I resumed work fresh and bright. I went to the accounting department and worked the remaining 4 systems, clear somethings I couldn't do on Saturday night. Let's say by 12:00 PM that Monday, everything was operational.
Management was surprised, so they reported it to my Boss who is taking refuge in the States and by the next Saturday, he came home with a brand new Samsung Galaxy S4 for me and bought me a dinner "Perero Posuski" whatever that meal was called. You see, using your hacking skills for good isn't so bad.
Take a hacking class today, to avoid getting stocked in this kind of mess.
Thanks for reading.

Comments

Popular posts from this blog

HOW TO WRITE, COMPILE AND RUN C++ CODE ON LINUX KALI

This article is for hackers who want to develop a c++ program on Kali Linux without having to install any additional software. While some would tell you that you need to install an additional software or a compiler in order to develop a simple program in c++ on Kali Linux, I am going to show you how to develop a c++ program on this distro right out of box. Your Linux Kali comes pre-installed with a c++ compiler called g++ so we are going to write a C++ hello word code and compile it with this compiler. Before we get started, first open up terminal and run to verify if this compiler is installed on you machine: g++ -v if the compiler is pre-installed, you should get the version information of the compiler, otherwise, you should get an error. Now let's jump right in. In your terminal window, type in: nano MyCpp.cpp to create a c++ file and lunch it in nano editor for editing. When nano opens, type in the following c++ code and press Ctrl+x then y and then R

LOAN MANAGEMENT SYSTEM (My Project Idea)

There are many companies that specializes on giving loan to people; they make their profits by collecting interest on any money they lend out, and before a loan can be given to any customer, the customer must provide a collateral and some details such as:  contact details and a reference/guarantor. When the loan is finally given to the customer, they charge interest based on the the amount given to the customer for a given period of time which could be daily, weekly, monthly or yearly.  For example, a company could be collecting interest based on a particular amount for a given period of time like: $200,000 loan would have an interest tag of $2,000  per month until the money is returned, and $100,000 would have an interest of $1,000 per month until the money is returned.  In  addition, the customers need to know when the time for them to pay their interest comes e.g.  at the end of the month or the timing model with which the calculation is being made. Usually, these companies sends ou

How to execute eject command on an ATM Machine using CoreXfs lib on .NET

 In this tutorial, I'm going to demonstrate how to run an eject command on an ATM using CoreXfs, a library I developed.  You can download the library from  here  and follow up with tutorial. First we need to add reference to the downloaded dll. Screen One Once the reference to the dll has been added, you can proceed to coding the application. What I did in the screen below is very simple, I opened the device on the atm using it's logical name so that I can pass in commands. Screen Two So, that's it. thanks for dropping by. You can watch the video below to see how I coded it. Note that this code can only run on an ATM machine. NCR, WINCOR, DIEBOLD, HYOSUNG